<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decision-Making Methods and Models for Intelligent Business Analytics Systems in Online Tourism</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victoria Vysotska</string-name>
          <email>victoria.a.vysotska@lpnu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Burov</string-name>
          <email>yevhen.v.burov@lpnu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Hnatushenko</string-name>
          <email>hnatushenko.V.V@nmu.one</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lyubomyr Chyrun</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sofia Chyrun</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liliia Diakoniuk</string-name>
          <email>liliia.diakoniuk@lnu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liubov Kolyasa</string-name>
          <email>kolyasa.lubov@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oksana Huhul</string-name>
          <email>OksanaHuhul@gmail.com</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Naum</string-name>
          <email>oleh.naum@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dnipro University of Technology</institution>
          ,
          <addr-line>av. Dmytra Yavornytskoho, 19, Dnipro, 49005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ivan Franko Drohobych State Pedagogical University</institution>
          ,
          <addr-line>I. Franko Street, 24, Drohobych, 82100</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ivan Franko National University of Lviv</institution>
          ,
          <addr-line>University Street, 1, Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepan Bandera Street, 12, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>West Ukrainian National University</institution>
          ,
          <addr-line>Lvivska Street, 11, Ternopil, 46004</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article offers a formal specification of a situational model for intelligent systems of business analytics in the online tourism field. The presentation of the situational model in the XML language is also described. Business analytics models in the intelligent decision support system have been developed to support online tourism. A general scheme for using the resource model has been developed. The architecture for the simulation environment and functional specifications of its services are described.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Business analytics</kwd>
        <kwd>model</kwd>
        <kwd>online tourism</kwd>
        <kwd>intelligent decision support system</kwd>
        <kwd>system architecture 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introductions</title>
      <p>
        Intelligent systems for online tourism are a new class of business systems that serve a large
number of loosely connected organizations that provide services to tourists, such as airlines,
hotels, transport organizations, restaurants, etc. Clients of tourist systems are characterized by
high mobility both in the sense of movement in space and in the sense of frequent changes in
types of activity. The works [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ] noted such properties of the tourism industry as globality,
dynamism and interdependence of services, heterogeneity of data formats, incompleteness of
information, and proposed a method of using executable conceptual models that receive
information from the context for making decisions on tourist service in conditions of incomplete
information. An important task of tourist IS today is also the constant support of the client during
his journey, the provision of services in the context of the specific situation in which the tourist
is. Solving this task requires the creation of a mobile intelligent information environment that
monitors and identifies the current situation and makes decisions about the relevance, content
and scope of the offered services. At the same time, all the information necessary for IS
decisionmaking is obtained from the contexts of the identified situation, the tourist, and his journey [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        The construction of such an environment requires solving several problems and tasks, in
particular, the organization of semantically interpreted access to information, the development
of methods and technologies for processing the context, methods for identifying the current
situation, etc. These problems are studied by several related scientific fields, such as the semantic
web, contextual technologies, technologies of distributed intelligent environments, and decision
support technologies. In particular, a popular direction of research in the e-tourism field, aimed
at solving the problems of dynamism and incompleteness of data, is the application of methods
and technologies of the Semantic Web [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. At the same time, it is often believed that existing
sites have enough information to provide semantically oriented services, but only semantic
markup is lacking. Works [
        <xref ref-type="bibr" rid="ref5 ref8 ref9">5, 9, 8</xref>
        ] show that in reality, such basic information is often lacking,
which is a significant obstacle to the Semantic Web services introduction in the tourism field. In
work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the application of semantic Web methods for building dynamic packages of tourist
services is considered. Such packages combine different types of services from different
companies. An ontology of the e-tourism field has been developed, which allows the user to obtain
additional information about the place of his trip. To solve the problem of obtaining data from
disparate sources, it is proposed to use semantic mediators (mediators) that form a hierarchical
structure that corresponds to the structure of concepts in the ontology. A dynamic service
package is generated by a web process. At the same time, IS [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is not flexible enough, does not
support dynamic rescheduling of the service package, and works only in manual mode. One of the
ways to solve the problem of incomplete data about the client is to obtain additional information
from the context, the development of contextual services for the provision of services in the field
of tourism. The issue of context-dependent services is currently being actively researched. For
example, in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], an overview of the basic technologies and the architecture of context services
developed within the framework of the CONTEXT research project funded by the European Union
is proposed. This work demonstrates the possibility of building context services for creating
mobile work environments, and fault-tolerant communication services. At the same time, the
approach proposed in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] does not use intellectual, semantically oriented systems, the content
of the concept of context is determined in advance for each application. The scientific direction of
artificial intelligence, related to the construction of distributed intelligent systems and
environments (pervasive, ubiquitous computing, ambient intelligence) solves similar tasks [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
Today, within this direction, the construction of mobile computing infrastructure is taking place,
which is expressed in the development and distribution of mobile computers and services. Some
popular services, including Google Places [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], provide context-sensitive services in the context
of the user's current location, reporting important and interesting objects in the environment. At
the same time, existing services mainly focus on using only the context of the accommodation or
the context of the person (personalization services), and do not take into account what the tourist
does - and, more generally, the context of the situation in which he is. The task of assessing a
problematic situation is one of the central tasks of the theory of decision support systems
(situation awareness – SA). A correct assessment of the current situation is necessary for making
a correct decision. Solving this problem by an expert (decision-maker), as a rule, is carried out in
the presence of incomplete, poorly structured, often contradictory information about the subject
area, constant changes in the state of this area, large volumes of data irrelevant to
decisionmaking, as well as strict restrictions on the time of decision-making [
        <xref ref-type="bibr" rid="ref14 ref5">5, 14</xref>
        ]. The use of
decisionmaking support information systems aims to help the decision-maker in the correct assessment
of the problem situation by quickly selecting the information necessary for decision-making and
presenting it in a form convenient for the expert to perceive. One of the most difficult components
of this task is determining which data in the problem area are relevant to the set goal or identified
problem. Traditionally, this problem is solved by the expert himself, guided by his experience in
solving similar problems. At the same time, human determination of data relevance is
timeconsuming and expensive. Today, in the theory of decision support systems (DSS), the direction
of cognitive CDSS (Cognition decision support systems) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] has been determined, which aims to
formalize the expert's experience in the form of significant configurations of domain parameters
that reflect previously identified and solved problems. Experience formalized in this way in the
form of relevant models is used by the decision support system to search for relevant information
in similar situations in the future. In IS of active conceptual modelling, formal conceptual models
are constantly updated with SA data, providing the expert with relevant and relevant data on a
defined range of problems in real-time [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-16</xref>
        ]. At the same time, existing decision support systems
are usually aimed at DS by an expert, and not at automatic identification of the existing situation.
This article purpose is to develop methods and models for identifying the situation and working
out its context for the SA provision of tourism services.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        2.1. The architecture of processing situational models in an intelligent service
The tracking changes task in the context of a tourist trip requires taking into account the
relevance of changes occurring and other information in the context of this trip [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Determining
the relevance of this or that information is a difficult expert task, the solution of which should be
entrusted to an expert. Thus, the expert predicts and foresees the possible situations in which the
tourist may find himself, determines the rules for their identification and the actions that must be
performed when this or that situation occurs. The situations defined in this way are formalized
in the situational conceptual models form. The intelligent system periodically checks the facts of
the information base for the presence of this or that situation and automatically initiates the
actions specified by the corresponding model if the situation is detected. Thus, the situational
conceptual model consists of 2 parts. The first specifies the conditions that the facts of SA must
meet to identify the situation. These conditions are specified as requirements for the presence or
absence of facts of specified types with specified properties. The second part of the situational
model is the action specification that must be performed when the specified situation is detected.
Actions are defined as command sets with parameters determined based on the properties of the
facts of the information base and the context of the situation. An important feature of situational
models, the solution of which is reflected in the metadata of the model, is the determination of
the conditions when and how often it is necessary to analyze the state of the software, that is, to
activate the model. At the same time, it is necessary to take into account both the features of the
situation detected by the model, in particular the expected probability of its occurrence, and the
loading of the modelling system. So, if you activate the model too often, the modelling IC will be
overloaded and may not have enough resources to execute other models. On the other hand, if
you rarely activate the model, you can miss an important situation and react to it too late. If the
IS envisages the simultaneous processing of many situational models, then it becomes
appropriate to implement a separate component - the model launch manager. This component
reads from the metadata of the models their launch conditions, summarizes them and initiates
the launch of all models according to the defined conditions. The model launch manager monitors
the degree of use of IS simulation resources and optimizes this use by unifying the launch of
models that they have the same launch conditions. The launch manager determines with which
data the models work and, if necessary, formulates tasks for monitoring services to replenish the
DB with such data. The functions of the model interpreter can also be delegated to the model
launch manager. In the previous sections, the architecture and principles of operation of an
intelligent system that uses executable conceptual models are given. Support for situational
models adds new components to the proposed IS modelling (Fig. 1). The central component of IS
modelling is the subject area ontology, which provides a semantic interpretation of all the facts
of the information base. Models are also built based on this ontology [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The information base is
constantly updated with new facts that reflect the state of the subject area. The sources of such
facts are employees, IS of travel companies and companies that are providers of travel services,
as well as specialized context providers - for example, those that provide the location of a tourist
in real-time, or compare this location with a certain organization or institution, for example, a
restaurant, or a museum. A separate place among the sources of replenishment of the information
base is occupied by monitoring services, which periodically read the specified data in the subject
area and enter them into the database. The work [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] formulated the principles of processing
contextual information for a tourist portal and described a system that works within the context
of a tourist trip. In the case of a designed tourist service, situational models process information
that comes from the general context of a person-tourist, or more precisely, from three parts of
this context: the tourist's data, his location, and the context of the task that the tourist is currently
performing [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Context data
services
Monitoring
services
Websites</p>
      <p>Databases
Web services</p>
      <p>Knowledge base
ІInformation
base</p>
      <p>Ontology
semanticall
y interprets
the facts in
the fact
baseв</p>
      <sec id="sec-2-1">
        <title>2.2. Formal specification of the situational model</title>
        <p>
          The scheme of the situational model consists of the BodSit model body and MtdSit metadata [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]:
 = ( ,  ). The body of the model defines the logic of the model and its actions:
 = ( ,  ) and consists of the signature specifications of the SgSit model and the
AcSit actions. The signature is a predicate given on Fci facts from the InBd information base.
        </p>
        <p>=  ( (   ))|   ∈  . (1)</p>
        <p>
          The information base is a time base and contains facts that took place in the past. We present
the signature as a disjunctive normal form of individual Asrij predicate statements given on the
facts of the base [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>= (  11 ∧   21 ∧. . .∧    1 1) ∨. . .∨ (  1 ∧   2 ∧. . .∧     ). (2)
An AcSit action specification is a set of actions defined in a type ontology.</p>
        <p>=  (   )| (   ) ∈  . (3)</p>
        <p>
          Such actions can be, for example, loading a Web page or accessing a Web service. The most
general type of action is the execution of the algorithmic model MdAlg, specified on the facts of
the information base [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]:
        </p>
        <p>=  ( (   ))|   ∈  . (4)</p>
        <p>MtdSit model metadata includes several sections, but the most important to the operation of
the situational model is the ActCd activation condition section, which is passed to the model
launch manager for launch scheduling. An activation condition is a disjunction of conjunctions of
atomic predicates that are true if a specified period has passed or a specified event has occurred.</p>
        <p>
          = (  11 ∧   12 ∧. . .∧   11) ∨ (  12 ∧. . .∧   22) ∨. . .∨ (  1 ∧   2 ∧. . .∧    ), (5)
where atomic predicates Cdij can be [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]:
 predicate TimeIntCd(TimeInt) – is true if a period of TimeInt has passed since the last
activation;
  ( (   ))|   ∈  – is the arbitrary predicate on the facts of the base;
 a reference to the model that is activated and returns a Boolean value. Thus, for example,
you can set time-fixed moments of activation, or activation with a defined repetition mode;
 predicates tied to specific types of fact-based events, including the addition of new facts
or modification of fact types.
        </p>
        <p>Let's consider in more detail the processing of contextual data by the tourist service, taking
into account the situation. As an example, a tourist service has been developed that provides the
necessary auxiliary information for the tourist depending on the context of the situation and the
tourist's geographical location. The ontology developed in the DERI project
(http://etourism.deri.at/ont/e-tourism.owl) was adopted as the basis of the ontology for the service and
modified by adding new entities and connections. A fragment of this ontology, which displays
contextual data used to solve problems, is shown in Fig. 2. The same figure shows other structural
components of the intelligent service.</p>
        <sec id="sec-2-1-1">
          <title>External services</title>
          <p>Coordinates</p>
          <p>service
Websites of
museums
Hotel sites
Websites of
restaurants
Other services</p>
          <p>Action
specification
uses</p>
          <p>Situational models</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Ontology and information base</title>
          <p>Voyage
Participant
Destination
DatePeriod</p>
          <p>Purpose
ScheduleRef
Is a
Person
Name
Gender</p>
          <p>Age
Citizenship
Position
CurLocation
Preferences
PrevVoyages
Is a</p>
          <p>Schedule</p>
          <p>ScheduleEntry
Is a</p>
          <p>LIsoacation
Coordinates
Country
State
City
Street
Is a</p>
          <p>Is a
Is a
ScheduleEntry
Date
Time</p>
          <p>Location
ActivityDesc
RelatedInfo
Is a
Site
URL
Location
Description</p>
        </sec>
        <sec id="sec-2-1-3">
          <title>Provider of information services</title>
          <p>Launch
condition
Model launch
manager</p>
          <p>Location ScheduleEntry</p>
          <p>Preferences</p>
          <p>
            Voyage and Person are the main components of the ontology whose context is used in the
system. Information about tour participants, tour schedule, places of interest planned to be
visited during the tour, and addresses of providers of information about them are obtained from
the context of the tour. From the context of the person, the preferences of the person are derived,
which are used in situational models to select information. In addition, the current location of the
person is also obtained from this context, which is also used in the models [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ].
          </p>
          <p>
            The model launch manager periodically activates the models according to the specified
activation modes. Activated models check for the conditions specified in the models. Such
conditions, for example, include verification of the correspondence of the current time and the
time of the planned event in the event, verification of the coincidence of the current location of
the tourist with the given area of the location of the object visited on the tour, etc. If necessary,
situational models receive additional information from the context of the tourist or tour person
and use it to make a decision [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ]. If the situational model has detected the presence of the
specified trigger conditions, then the algorithmic model is activated, which specifies the sequence
of actions to be performed. In the case of the tourist service, the class of actions was considered,
which consisted of providing the tourist with additional information, and the task of information
filling for the tourist's current information page. In the process of its work, the intelligent service
uses the services of external services that provide information about the location of the tourist,
information from the sites of the objects visited by the tourist, etc. [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ].
          </p>
          <p>2.3. Presentation of the situational model in the XML language</p>
          <p>
            Situational models are created in the "Model Editor" tool and saved in XML format. Let's
consider an example of presenting a situational model for a planned tourist service. Let's consider
a simple model, which detects the situation based on the coincidence of two conditions - the
presence of a tourist near the object planned to be visited and the presence of a visit to this object
in the tour plan at present [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ].
&lt;Model&gt;
&lt;ModelMetadata&gt;
&lt;GeneralInfo&gt;
&lt;ModelId&gt; id &lt;/ModelId&gt;
&lt;ModelType&gt; SituationalModel &lt;/ModelType&gt;
&lt;OntologyURI&gt; www.acme.org/TourismOntology&lt;/OntologyURI&gt;
&lt;InfoBaseURI&gt; www.acme.org/InformationBase &lt;/InfoBaseURI&gt;
&lt;ModelRepositoryURI&gt;www.acme.org/ModelRepository&lt;/ModelRepositoryURI&gt;
&lt;/GeneralInfo&gt;
&lt;ActivationInfo&gt;
&lt;Condition&gt; &lt;ConditionId&gt; cd1&lt;/ConditionId&gt;
&lt;ConditionBd&gt; CurrentDate()in InBase(Voyage.DatePeriod) &lt;ConditionBd&gt;
&lt;/Condition&gt;
&lt;Condition&gt;&lt;ConditionId&gt; cd2&lt;/ConditionId&gt;
&lt;ConditionBd&gt; Every(5 min) &lt;ConditionBd&gt;
&lt;/Condition&gt;
&lt;Activate&gt; (cd1) and (cd2)&lt;/Activate&gt;
&lt;/ActivationInfo&gt;
&lt;/ModelMetadata&gt;
&lt;Signature&gt;
&lt;Condition&gt;
&lt;ConditionId&gt; sigcd1&lt;/ConditionId&gt;
&lt;ConditionBd&gt; InBase(Some(Site).Location) nearDistance InBase(Person.CurLocation) &lt;ConditionBd&gt;
&lt;Result&gt; InBase(Site)&lt;/Result&gt;
&lt;/Condition&gt;
&lt;Condition&gt;
&lt;ConditionId&gt; sigcd2&lt;/ConditionId&gt;
&lt;ConditionBd&gt; CurrentTime() nearTime InBase(Some(Voyage.Schedule.ScheduleEntry.Time))&lt;ConditionBd&gt;
&lt;Result&gt; InBase(Voyage.Schedule.ScheduleEntry)&lt;/Result&gt;
&lt;/Condition&gt;
&lt;Condition&gt;
&lt;ConditionId&gt; sigcd3&lt;/ConditionId&gt;
&lt;ConditionBd&gt; Result(sigcd1, InBase(Location)) nearDistance Result(sicd2, InBase(Location))
&lt;Result&gt; &lt;/Result&gt;
&lt;/Condition&gt;
&lt;Execute&gt; (sigcd1) and (sigcd2) and (sigcd3)&lt;/Execute&gt;
&lt;Signature&gt;
&lt;ActionSpecification&gt;
&lt;ActionType&gt;LoadContentfromURL&lt;/ActionType&gt;
&lt;URL&gt;Result(sigcd1,URL)&lt;/URL&gt;
&lt;/ActionSpecification&gt;
&lt;/Model&gt;
          </p>
          <p>
            The model description contains metadata sections and the model body. In the metadata
section, for simplicity, only two subsections are given - general data and activation mode. The
general data section lists the model identifier, its type, and links to the ontology, model repository,
and fact base used. In the subsection of the activation mode, two activation conditions are
indicated - the model is activated only during the duration of the tour and every five minutes. The
body of the model has subsections of the firing signature and the action specification. Three
conditions are specified in the signature subsection. The first condition determines the fact that
the tourist is near one of the objects that are planned to be visited. The condition uses the
NearDistance predicate, which evaluates to true if the two placements match within a specified
margin of error. If the condition is fulfilled for some object, then its placement is remembered as
a result of the condition check. The second condition checks whether a visit to a certain object is
planned for the current time. In this case, the NearTime predicate is used, which takes the value
true if the two times coincide within the specified error. If such a visit is scheduled, its ID is also
stored as a result of the condition check. Finally, the third condition combines the results obtained
in the two previous conditions and checks whether a visit to the object near which the tourist is
located is planned [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ]. In the action specification section, the type of action is indicated - receiving
information content from a certain URL, and a link to this URL. The proposed approach to
modelling and identification of the current situation is illustrated in the example of the field of
electronic tourism, it is advisable to expand and apply it in other fields as well. The
implementation of such an approach will allow the creation of IS and services that quickly
respond to changes in the environment [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and methods</title>
      <p>
        3.1. Semantic structure development for business analytics of the subject area
The task of building an ontology for solving BA problems is one of the mandatory research tasks,
because only with the use of such an ontology can you build models for solving problems and
performing BA operations. The form of presentation, essence and relation of this or that ontology
depends on the SA and the tasks of a specific study. Thus, in [17], an ontology for building business
models was developed, which covers product characteristics, interactions with customers,
infrastructure, and financial aspects of the business model. This ontology mainly takes into
account the economic aspects of business activity. In this work, the main attention is focused on
the part of the general business model, which is performed to a large extent with the use of
computer technology and is promising for the introduction of automation - the level of process
implementation (process, implementation layer [
        <xref ref-type="bibr" rid="ref1">1, 17</xref>
        ]). The task is to build the upper level of the
BA ontology, which would allow the addition of new objects for different SAs, into which the work
results are implemented. The ontology is based on the existing BPMN business process modelling
language supplemented and modified by several new objects. The main entities and relations of
the developed BA ontology are presented in Table 1-Table 2.
      </p>
      <p>Teams and services
A service that accepts commands generated by the simulation
system
A separate team
A script as a sequence of commands</p>
      <p>Rules and Restrictions
A business rule set at the firm level
The limit is set at the organization level
Mandatory restrictions formulated in-laws
No Mandatory restriction or recommendation</p>
      <p>Additional, meaningful details
10 Decide</p>
      <p>An entity is part of another entity
An entity is a variety, a subclass of another entity
Determines the sequence of execution of operations and processes
General association
Defines resources used in business processes
Used in access control models
Ownership relationship between the Person (Organization) and the
resource
Have the right Defines the rights to perform a defined range of operations
Initiate execution Defines the launch for the execution of specified commands, or access to
the service</p>
      <p>Defines a decision-making operation</p>
      <sec id="sec-3-1">
        <title>3.2. Development of business analytics models</title>
      </sec>
      <sec id="sec-3-2">
        <title>3.2.1. Decision support models for business processes</title>
        <p>
          One of the directions of building new-generation business analytics systems is the integration of
the model-oriented approach of MDA and methods of knowledge engineering and IS [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. The
purpose of this section is to validate the proposed approaches in practice by designing data
structures and layout of a real ISBA and decision support. The contractual process for concluding
a software development agreement was chosen as the SA. Taking into account that the
negotiation process typically requires an intensive exchange of e-mail messages, the final result
of the work is a mock-up of a software complex that processes e-mail messages and tracks the
negotiation process and related artefacts (agreement text, and other documents). The process of
agreeing occurs as a result of the contractual process, which takes place through the exchange of
        </p>
        <sec id="sec-3-2-1">
          <title>Performer</title>
        </sec>
        <sec id="sec-3-2-2">
          <title>Participates</title>
        </sec>
        <sec id="sec-3-2-3">
          <title>Intelligent system</title>
        </sec>
        <sec id="sec-3-2-4">
          <title>Fulfills requests, serves</title>
        </sec>
        <sec id="sec-3-2-5">
          <title>Customer</title>
        </sec>
        <sec id="sec-3-2-6">
          <title>Participates</title>
        </sec>
        <sec id="sec-3-2-7">
          <title>Documents</title>
        </sec>
        <sec id="sec-3-2-8">
          <title>Formed as a result</title>
        </sec>
        <sec id="sec-3-2-9">
          <title>Supports</title>
        </sec>
        <sec id="sec-3-2-10">
          <title>Contractual process Saves versions, changes</title>
          <p>
            e-mail messages between the Customer and the Contractor. During this process, documents
related to the agreement (text of the agreement, technical proposal) are changed and
supplemented. The process is considered successful and completed when the text of the
agreement and technical proposal is acceptable to both process participants and is ready for
signing. The process is considered unsuccessful if it is interrupted at the initiative of one (or both)
participants before its completion (Fig. 3) [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ].
          </p>
          <p>
            Presentation of knowledge in the system. Knowledge in IS is stored in the form of ontology,
models and rules [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ]. Models are used for analysis and forecasting, storage of information about
process events, ontologies - for providing model elements with content and conducting logical
inference, rules formulate decision-making restrictions and provide corporate and regulatory
rules and restrictions. Data and knowledge in the system are organized hierarchically, on three
levels (Fig. 4). At the top level are common models, ontologies and rules. They do not belong to
the selected SA and can be used by different systems. An example of such knowledge is time
models and ontologies, based on which an understanding of the time dependence of terms is
formed, as well as general knowledge about documents, physical and legal entities, etc. At the
same level, the model of the process of exchanging mail messages and the model of the message
itself are stored. At the middle level, there is knowledge related to the selected SA - the software
development project and the contractual process in particular. The ontologies and models
available at this level describe the stages of the project and dependencies between them,
requirements for the content of the agreement, types of agreements and restrictions related to
them, and other documents that are formed during the contractual process. Corporate rules and
restrictions are kept at the same level.
          </p>
          <p>Temporal
models and
ontologies</p>
          <p>Software
development
process</p>
          <p>Person models
and ontologies</p>
          <p>Normative
models of
documents</p>
          <p>General
models of
documents
Role models
for individuals</p>
          <p>Email models</p>
          <p>Corporate
rules and
restrictions
General working
models</p>
          <p>Working process
models</p>
          <p>Document models</p>
          <p>General
models
Normative
models
Робочі
моделі</p>
          <p>At the lower level, some models are formed during the contractual process. They structurally
reflect real events, and changes in documents concerning both time and defined semantic
elements of the agreement, process participants and other constituent parts of the model.</p>
          <p>
            Top-level models (generic models). Temporal models and ontologies are used to correctly
interpret the following terms: "before", "after", "past", "future", "now", "hour", "day", "week",
"month", "year", "period", "moment", "today", "tomorrow", "yesterday". It also stores models of
the working day and working week with restrictions arising from labour legislation, the model of
the work schedule. The block of time models also contains calendar information with the
indication of holidays and weekends for all participants in the contractual process. Temporal
models are used to interpret the elements of user requests, in the formulation of constraints and
rules. Person models and ontologies store knowledge and define semantic dependencies between
such concepts as "person", "employee", "role (position)", "qualification", "natural person", "legal
entity" (organization). They are used to interpret in SA models such concepts as "Customer" and
"Executor", definition of persons - participants in the contractual process, human resources
necessary for the execution of the contract [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            General models of documents define the generalized concept of a document, forms of its
submission, software associated with certain forms of document submission, document
properties, restrictions and rules. The type of document is determined in the system according to
its content, for example, "agreement", "technical proposal". Document submission form – word
processor file, video or audio recording, mail message. The restriction that the agreement and the
technical proposal must be submitted as a text document is accepted. Supporting and working
documents may exist in other forms. E-mail models contain knowledge about the structure of an
e-mail message (sender, recipient, subject, message text, attached documents, time of sending or
receiving), and about processes related to correspondence (reply to a letter, sequence of letters
about united by a common theme). E-mail models contain associations with time models and
ontologies, models of persons, documents. In addition, there are procedures that allow you to find
both the message itself and to select its individual parts [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Medium-level models (normative models). Medium-level models describe knowledge
specific to a chosen SA and specific to a specific developer firm and its production processes
[
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. The models of this level are a detailing and concretization of the general models of a higher
level and reflect the regulatory requirements of the company - the developer and the customer
regarding the organization of the process, the content and form of documents, etc.
          </p>
          <p>
            A model of the software development process and the contractual process. The work
uses a classic waterfall model with such stages as pre-project work (concept), analysis
(formulation), development (implementation), support (sustaining) [18]. The model specifies
that the contractual process is part of the pre-project works. As a result of this process, the text
of the agreement agreed and signed by the Customer and the Executor is formed. An appendix to
the agreement is a document - a technical proposal in which it is determined how the executor
plans to perform the agreement, the platforms and means for execution are determined, the risks
are analysed, the resources and the work schedule are determined. Permissible types of
agreements are also defined here (for example, with a fixed price, with a price based on actual
costs, with payment of employees at specified rates). A list of business events and related
documents and metadata is defined. For example, such standard business events are receiving
(sending) a letter, a meeting, a teleconference [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Document models. They contain models (templates) of such documents as an agreement and
a technical proposal. The text of these documents is divided into meaningful sections and
structured in the XML language with a semantic interpretation of the content and purpose of the
sections [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ]. Individual fields of the agreement, such as the customer, the executor, the price,
the period of validity, the phased plan is formalized and semantically interpreted, which allows
the system to follow the change of values in these fields, apply the relevant rules and make
decisions. In addition to the main documents, the form of additional, working documents is
defined here.
          </p>
          <p>
            Role models for individuals and legal entities. The role models of participants in the
contractual process are defined - the customer, the executor (legal entities), the project manager
of the executor, the project manager of the customer, the main managers, the head of the quality
control group, etc. Authority to perform operations and change and access to certain sections
(fields) of the agreement for each role is defined [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Corporate rules and restrictions are set on elements of models of middle and higher levels
and cover complexes of interconnected models. For example, the rules stipulate the mandatory
presence of a certain list of documents, the permission to correspond with the customer only to
the project manager and the main manager. It is quite simple to formulate and follow the basic
rules of correspondence, for example, such that every letter from the customer must be answered
within the same working day. Violation of the rules causes certain defined actions - a reminder, a
warning, informing the chief manager [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Lower-level models (working models). Models of this level contain information about real
events and objects. They are formed during the negotiation process based on ready-made
templates (prototypes) defined at the upper levels. Individual elements of these models contain
links and specify dependencies with models and ontologies of higher levels, which allows for
analysis, interpretation of changes, decisions and monitoring of the execution of corporate rules
during the negotiation process. Lower-level models can be divided into [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ]:
 general, containing permanent information about the project;
 process models containing information about events in the negotiation process are
ordered by time;
 document models with version support and tracking of editorial changes and comments.
          </p>
          <p>
            General working models. In these models, information about the customer and the executor
is stored, identifying who exactly performs the roles in the project with the definition of
additional parameters for these persons (surname, postal address, etc.). Process models are
formed as a sequence of business events ordered in time. Receiving (sending) a letter, meeting,
meeting, or teleconference is considered a business event. Participants in the process create their
events, marking certain milestones of the project. For each event, set dependencies with
documents and common models. So, for example, for a received letter, a dependency is
determined by the document that is attached to the letter and the editorial changes that were
made in this document compared to the previous version. For the teleconference event, its date
and time, participants, reference to the decision protocol and changes in the documents that were
made based on the results of the teleconference are determined. Document models contain
information about the content of real documents that are developed in the contractual process.
Such models support versioning and track all changes in documents, their authors, and comments
on changes. In addition, changes in all formalized fields are monitored using corporate rules and
restrictions related to the content of these fields [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Procedure of IS for supporting decision-making. The contractual process takes place in the
course of communication between representatives of the customer and the executor through IS.
This system is intended to support the work of representatives of the executor, in particular the
project manager. In the process of communication, a working model is built, which acts as a
repository of data and knowledge about the progress of negotiations, documents and events
related to negotiations. Some components of working models are determined manually, others
automatically. For example, business events are automatically generated upon receipt or sending
of e-mail messages, connections of this business event with documents attached to the message,
changes in the agreement and formalized fields initiated by the message are established. The
project manager manually defines meaningful connections and dependencies with other
documents, business events, and formalized fields. The manager manually enters such events as
meetings, teleconferences and determines their meaningful connections. This activity contributes
to a deeper understanding of the progress of the process by the manager, the formed model is
used in the future to analyse the progress of negotiations. For each business event, its context is
defined as a set of associated objects. At the same time, both direct associations and inheritance
and obtained by logical deduction are taken into account. For example, a specific mail message is
associated with the date of its receipt, the stage of the process, the author and recipients, changes
in the text of the agreement and other documents, the content fields of the agreement that were
changed as a result of receiving the letter, the content of the message, the sequence of messages
in which this message is included, etc. [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
          <p>
            Training of the system, i.e. the formation of new models, rules and ontology, is done both
manually by the system administrator and auditor, who monitor the integrity of the data and
taking into account corporate rules, and by the user - the project manager. If a certain concept
used by the user in the query does not have a definition in the system, then the user is informed
about this, who formulates a definition that is stored for the future. For example, let the user
formulate the query "How long have the negotiations been going on?". To find the answer, the
system decides to apply the time duration model for the "negotiation" object. The duration model
attempts to define duration as the time interval between two events. The final event of the
interval is "today", and the initial event is the beginning of negotiations. If the event - the start of
negotiations is not defined, the system asks the user to define the corresponding rule (or
constant). Let the user define the start of negotiations as the business event date of receiving the
first letter. This rule (at the request of the user) will be saved and the system will further
determine the start of negotiations upon the beginning of the correspondence process (including
for subsequent projects). The user interacts with the system using a set of text and graphic
interface tools. For text interaction, a language similar to the "action language" (action language)
[19] or the semi-formal language given in [20] is used. Such a language uses and relies on the SA
terms defined in the top-level and middle-level ontologies. A significant advantage of the
proposed system is the ability to work on the project regardless of the user's location. All logic,
knowledge and documents of the system are stored on the server, and only copies (snapshots) of
documents, letters, and other project information necessary for decision-making are transferred
to client computers [
            <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments, results and discussions</title>
      <sec id="sec-4-1">
        <title>4.1. Resource access control models</title>
        <p>
          Currently available resource access control mechanisms include such approaches as selective
(DAC - Discretionary Access Control), mandated (MAC - Mandatory Access Control), and one that
uses roles (RBAC - Role-based access control). In DAC, the access policy is defined by the
userowner of the object. The owner grants rights to other users. Therefore, with this approach, each
managed resource has an owner. In practice, in many enterprises, users do not "own" information
resources, but the sole owner is the enterprise itself. In addition, it is not always advisable to give
ordinary users the right to provide access to other users [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. DAC does not always adequately
reflect existing dependencies between subjects and access objects. Using DAC, it is difficult to
administer some resources, and it is impossible to define and maintain complex access policies.
In the MAC method, the access policy is determined by the system, not by the owner. MAC is used
in multi-level access control systems where each computer can handle many levels security labels
associated with resources. To obtain permission to access a resource, the access subject must
have an access level no lower than the label associated with the specified security object
(managed resource). The main problem solved by MAC is the control of access to confidential
information. MAC is widely used in military systems where there is a need to control access to
classified documents and the number of levels of secrecy is relatively small. For use in industrial
systems, the abstraction with access labels is not flexible enough and does not reflect the realities
of industrial BAs [
          <xref ref-type="bibr" rid="ref1 ref2">1-2, 21</xref>
          ]. In role-based access control (RBAC), access rights are also determined
by the system rather than by the user owning the resource as in DAC. A role in RBAC corresponds
to a set of resource access rights. The RBAC mechanism allows you to define access to complex
business operations, such as transactions. Users are granted the appropriate rights by association
with certain roles. Roles are grouped into hierarchies in which the permissions of higher-level
roles are inherited by lower levels. Access control using roles has the greatest effect when there
are many users in an enterprise with the same set of access rights, which boil down to defined
roles. At the same time, changing access rights for a role immediately applies to all users
associated with this role. [21]. Role-based access control is currently the most advanced approach
to access control. Draft standards have been developed for RBAC [22]. At the same time, in RBAC,
access rights are assigned manually by the administrator and are static. In work [23], the main
shortcomings of the RBAC access control mechanism are identified [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]:
 large organizations have many users whose access rights sets change and depend on the
current tasks being performed. Access control using RBAC in these circumstances results in
the creation of a large number of roles that are difficult to administer collectively;
 when new subsystems are added to the existing system, the number of roles increases in
arithmetic progression, which at a certain stage makes effective administration impossible;
 changing the content of roles requires correcting their definition. These functions should
naturally be performed by business employees who make decisions and issue tasks for
execution. However, correcting resource access permissions requires significant technical
knowledge that business employees do not possess. Therefore, support for RBAC requires a
staff of technical workers - system administrators, the number of which increases with the
increase in the complexity of the system;
 over time, access rights for employees expand, because new rights are added when
performing new tasks. The reverse process (withdrawal of rights) is not carried out in practice
or is carried out with a significant delay. As a result, employees receive unreasonably large
access rights, which reduces the overall degree of system security and contradicts the
principle of minimum access rights.
        </p>
        <p>
          In [23], to solve the last problem, it is suggested to periodically audit the system and remove
irrelevant rights. At the same time, such an operation requires considerable time and is quite
complicated [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. The principle of least rights [21] is generally accepted in the administration
practice. It consists of the fact that the user is granted access rights no more than the tasks that
this user performs require. Compliance with this principle makes it impossible for the user to
perform unnecessary and potentially dangerous actions. In practice, compliance with the
principle of least rights requires a detailed specification of the necessary access rights in the
conditions of constantly changing tasks performed by the user, which is a difficult task [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. The
evolution of methods of managing access to information system resources largely took place in
two directions [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]:
 solving the problem of single-user registration and authentication within the existing IS.
At the same time, the user is authenticated not to work on a specific server, but in the entire
information system, or part of it - the domain. Directory services with appropriate
authentication infrastructure and system-wide policies were developed to solve this problem;
 consideration of business abstractions to create a correspondence between business
processes and user access rights. Such business abstractions are users, groups, positions,
organizations, organizational units, and roles. Abstractions and related mechanisms for
assigning access rights are described in detail in [24].
        </p>
        <p>Existing access control approaches have the following significant drawbacks.
 lack of documented justification for the decision to grant or revoke access rights;
 access management decisions are not related to the business processes and rules existing
in the enterprise. At the same time, actual business processes and rules are the source and
basis for assigning access rights;
 the request for the assignment of access rights is accepted by the system administrator,
who is a technical employee, not a project manager or another person who is authorized to
make management decisions and directly manages the execution of business processes;
 the manual nature of the assignment of access rights, often reactive, and the
nonproactive assignment process, leads to delays in the execution of processes;
 lack of templates, typical configurations of access rights that can be reused for different
users leads to unproductive use of human resources;
 the availability of various managed IT resources, such as file systems of different
computers, DBMS tables, access to premises (electronic locks), and various information
services, is not taken into account. The lack of planning access to various IRs in the context of
the performance of a certain production task or role leads to a lack of coordination of access,
errors and delays in the performance of tasks;
 the presence of different types of managed resources, which store separate versions of
accounts of the same person, leads to the need for the user to remember a large number of
passwords. Password complexity is limited by a person's ability to remember it. If you refuse
to remember the password, you can create longer and more complex passwords and thus
better protect the system.</p>
        <p>
          As a result, assigned access rights are often inadequate to the tasks performed by the employee
- there are too many or too few access rights [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. The lack of access rights leads to the
impossibility or significant delays in the performance of the task, which negatively affects the
business process as a whole. An excess of access rights, although it creates additional
opportunities for the employee to choose different ways of solving the task, generally reduces the
security of the information system and does not comply with the principle of the least access
rights. The use of models makes it possible to develop a method of managing access to resources
that takes into account the structure of business processes and largely solves the above problems.
Management of access to resources using models occurs in IS based on modelling and supporting
the execution of business processes [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Constituent parts of this modelling system (Fig. 5) are
the fact base, ontology, and model repository. Ontology occupies a central place in the system
because all other components are formulated on its basis. So, facts from the fact base are objects
defined in the ontology. Each model from the model repository is formulated using concepts also
defined in the ontology. In the ontology, general restrictions and dependencies between types of
objects are formulated, which are taken into account when creating and using models [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>Modeling system</p>
        <p>Fact base</p>
        <p>Ontology
semantically
interprets thefacts</p>
        <p>in the fact base
Models interpret facts,</p>
        <p>solve problems,
establish relationships</p>
        <p>Ontology
MСoхdеeмlsи</p>
        <p>Models
semantically
interpret business
events</p>
        <p>Business
events</p>
        <p>
          Models are used to perform operations in the system. Each model is designed to solve one
specific problem and is relatively simple. At the same time, a model in the process of execution
can activate other models. In this way, complex conglomerates of models are formed, which
collectively solve complex tasks. Models are created by a person-expert and reflect his knowledge
about how to solve a specific problem. Work [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] defines two types of business models used in the
system - regulatory models and working models. Working models reflect real events, documents,
and business operations as ontology objects (facts). Working models are used and created during
the execution of business processes. To ensure correspondence between the realities and the
facts of the fact base, the information system mustn't allow other ways of conducting business
operations than through the mediation of the modelling system. Normative models reflect
business rules, standard procedures, and document templates and impose additional restrictions
on working models to achieve compliance with corporate and state standards [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Resource
access management models (hereinafter - resource models) are essentially regulatory models
that limit access to specified resources and are associated with individual operations of the work
model of the business process, managed resources, and with a certain set of workers [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Fig. 6
shows the general scheme of the resource model. A resource model generally specifies the
functional roles of employees and the resources needed to solve a specific (often typical) business
task [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. A set of roles and a set of resources are defined in the model. Business abstractions
that are understandable to a business employee (for example, a document, an e-mail service, or
the Internet) are used as resources. Relationships are defined between roles and resources,
weighted (parameterized) by such characteristics as access restrictions (for example, read-only)
and quantitative restrictions (for example, maximum traffic). Before starting a task, role models
are associated with specific employees who perform these roles. This operation is implemented
by a manager, not a system administrator. After carrying out such an association and under the
condition that the corresponding business model is active, the associated employees acquire the
access rights defined by the resource model. After the completion of the task, the granted access
rights are automatically withdrawn. Granting access rights occurs by creating XML files with the
model that contain all the necessary information and sending these files to the appropriate
resource management services. Resource models work with the semantic abstraction of a person
- a company employee, not a computer user, as is done, for example, in operating systems. This
allows you to track access rights to various resources in the context of the employee's
performance of production tasks. Accordingly, the fact base for each employee stores information
about budgets, usernames and passwords with which this employee works with various services
and computers of the information system. This information is used to provide access to specific
resources. The employee may not have information about his accounts and passwords. At the
same time, it is necessary to ensure its authentication at the working beginning with the system
using, for example, biometric methods or smart cards [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>Employee1
Employee2
EmployeeK</p>
        <p>Role 1
Role 2</p>
        <p>Role N
Businessprocess model</p>
        <p>Resource model</p>
        <p>П
П
П
П</p>
        <p>Tasks</p>
        <p>Resource 1
Resource 2
ResourceM</p>
        <p>XML
XML
XML</p>
        <p>Resourcemanagement</p>
        <p>service 1
Resourcemanagement</p>
        <p>service 2
Resourcemanagement
service M</p>
        <p>
          Models are associated not only with individual operations of the business process model but
also with certain facts of the fact base. This ensures the granting of rights to the employee
depending on his position, age, and gender, and supports the implementation of corporate-wide
access policies, regardless of the tasks performed by the employee. For example, such rules as
"Every employee of the company has access to the e-mail service", "Every employee of the
company has access to the corporate intranet portal", and "The project manager is allowed to
initiate international calls" are implemented in this way. Let's consider the resource model used
in the business process example of creating a Technical Proposal for a software development
project (Fig. 7). The process of developing a technical proposal begins after receiving a request
for a technical proposal (RFP) from a potential customer. In the request, the customer's
requirements regarding the final product, technologies and development process, and business
expectations regarding development terms and product quality are formulated. In the process of
developing a technical proposal, a document is created - a "Technical proposal" in which the
components, technologies and method of development are determined, the terms, stages and
intermediate stages of development are determined, the functional capabilities of the final
product are specified, additional limitations and the cost of development are determined. The
technical proposal is developed by a narrow circle of experienced specialists under the leadership
of the project manager. As a rule, in the development of a technical proposal, in addition to the
project manager, who is responsible for planning and technical implementation, the head of the
quality control (QA) department, who is responsible for the development of the product quality
control process at all stages of its development, participates. If necessary, if the product is
technically complex enough or requires testing on many hardware and software platforms, an
expert in Configuration Manager is also involved in the development of the proposal [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. This
expert plans the processes of purchasing additional equipment, installing it, and setting it up.
        </p>
        <p>RFP
received</p>
        <p>RFP</p>
        <p>Petrenko
Sydorenko
Maruschak
Quality control</p>
        <p>manager
Configuration
manager</p>
        <p>R/W
R/W
R/W</p>
        <p>Resource model</p>
        <p>Technical
proposal
(project)
associated
PreliamnianlyasryisRFP initiated Deavpetreloocpphomnsiecanaltl of completed</p>
        <p>Reviewing</p>
        <p>yes
approved
no</p>
        <p>Technical
proposal is
complete</p>
        <p>
          The procedure for developing a technical proposal is determined by corporate standards. Let
the development of the proposal begin after the approval of the RFP by the senior manager and
the formation of the project team. The manager also associates workers with model roles. An
initial technical proposal document is generated based on a template and stored in a document
repository with controlled access, such as VSS [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. During the creation of the document, the
members of the project team have access to the document both for reading and writing. They
create separate sections of the document and read and comment on information added to the
document by others. The final responsibility for the content and quality of the document generally
rests with the project manager. When the document is created, it goes to the reviewer. At the
same time, the proposal creation model ceases to be active and all members of the project group
are deprived of access rights. The reviewer is a senior manager. He reads but does not change the
sentence, or express his comments. If the draft technical proposal is approved by the reviewer, it
is sent to the customer. If changes need to be made to the document, it is sent to the project team
for revision. At the same time, the proposal creation stage model becomes active again and all
members of the team again get full access to the document. After that, the process is repeated
until the document is approved or finally rejected by the reviewer. Compared to the RBAC
resource access control method, the proposed method has the following advantages [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]:
 the granted access rights correspond to the tasks performed by the employee at this
moment in time and, in general, to the set of business processes performed in the organization;
 dynamic nature of assigning and withdrawing access rights;
 lack of expansion of access rights over time;
 more detailed access control using semantic abstractions. Ability to build complex access
control rules using business object properties, time parameters, and all relevant knowledge
base facts;
 granting access rights is performed by a business employee authorized to make
management decisions, not a system administrator. This simplifies the process of assigning
rights and frees system administrators from routine work;
 granting of access rights is documented and retained even after the model becomes
inactive. The document becomes the resource model itself. This simplifies system auditing;
 the possibility of reusing resource models reduces the labour intensity of the assignment
of rights;
 an opportunity is created to standardize business processes and individual business
operations, as well as appropriate resource models and ensure compliance by employees;
 the task of allocating access rights is solved simultaneously and in combination with the
tasks of planning the task execution process, estimating the required number and parameters
of resources;
 automatic assignment and withdrawal of rights according to the formed resource model.
        </p>
        <p>
          The disadvantage is the greater complexity of the system, and the need for preliminary
implementation of the business process modelling system using the knowledge base. Formally,
the resource model is presented as a tuple [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]:
        </p>
        <p>MdRes=( (Rol),M(Res),M(LnRolRes)), (6)
where M(Rol) is a set, all elements of which are objects of the Role class defined in the On
ontology: Role:  ( ) = ( | ( ) =  ) similarly,</p>
        <p>( ) = ( | ( ) =  ), (7)
 (LnRolRes) = (LnRolRes|Type(LnRolRes)=LinkResourceRole).</p>
        <p>
          Ontology classes corresponding to roles generally form a class hierarchy. For each class,
hierarchies define rules and restrictions that are relevant to the given class and must be followed
by all derived classes. So, for example, you can define a general class Role, and a more detailed
class PMRole to describe a role, for example, the role of a project manager. In the PMRole class,
restrictions valid for project managers and independent of a specific resource model will be
displayed [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. In turn, the Rol object is itself a class, but defined and valid only within the MdRes
resource model. In this sense, different instances of these objects can exist in different instances
of MdRes. As a class, Rol contains additional constraints formulated at the MdRes model level [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]:
Rol=( (SlRol),M(CsRol)), where M(SlRol) are the properties (slots) of the role, M(CsRol) are the
restrictions defined for the role. The most important category of CsRol restrictions is the
restriction on the characteristics of the people who are allowed to assign a role to a Rol. Such
restrictions may, for example, be requirements regarding experience, length of service, position,
etc. Among the properties of SlRol roles, both properties inherited from parent classes M(SlRol)inh
and properties defined at the model level M(SlRol)md [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] are defined:
 (SlRol)=M(SlRol) ℎ ⋃ (SlRol) .
        </p>
        <p>
          Similarly, role restrictions are divided into inherited restrictions, and restrictions are
additionally defined within the model [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]:
 (
) =  (
) ℎ ⋃  (
) .
        </p>
        <p>(8)</p>
        <p>
          Ontology classes corresponding to resources also form a hierarchy and inherit their properties
from the general Business Resource class. The ontology of managed business resources includes,
for example, such important types of resources as Documents and Services. The resource
specification contains a set of properties M(SlRes), a set of restrictions M(CsRes) and a set of
references to system services that implement and maintain the type of resource defined in the
model: M(SvRes):Res=( (SlRes), M(CsRes),M(SvRes)) [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          Similarly, to roles, properties, constraints, and a set of service references are inherited from
the parent classes of the On ontology [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. The relationship between the role and the resource
LnRolRes is defined on the pair (Rol,Res): LnRolRes=((Rol,Res), M(SlLnRolRes), M(CsLnRolRes)),
M(SlLnRolRes) is communication parameters, M(CsLnRolRes) is a limitation.
        </p>
        <p>
          Creation and use of resource models. The development of resource models is carried out at
several stages - creation, initialization, and use. The prerequisite for using resource models in the
system is the development and implementation of a business process modelling system and the
development of an ontology of business objects. Resource models are created by a business
employee or manager who has a deep understanding of both the enterprise's business processes
and the resources that are needed to perform these processes, by configuration. A reusable
resource model is created in a graphical editor – a modelling environment. The author of the
model defines roles, and resources, and describes their relationships. In the defined model, it
includes restrictions that are dictated by business rules or technical reasons. Ranges of
permissible types of values are defined for the main components of the model. A special
component of the modelling environment – the validator – checks the constraints existing in the
ontology and requires their compliance. The finished model is validated for the absence of
ambiguities and uncertainties. The finished and validated model is stored in the model repository
as an XML file [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. In the process of resource model initialization, the template model is configured
from the model repository associated with a specific business process operation. The
initialization operation is performed by the business worker. In the process of this operation,
based on the ready-made model template, an instance of the model is created, which is associated
with a defined business operation. Constraints and parameters are added to the model instance
that are important to the implementation of that model in the context of a business operation. An
important task is to specify the values specified in the template as a range (set) of possible values.
The initialized model is validated and in the case of a positive result, it is ready for execution
[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The initialized resource model is executed automatically. The signal to activate the resource
model is the activation of the associated business operation model. After activating the model, the
component of the modelling system - the model interpreter - interprets the XML file describing
the initialized model and generates service management commands of the managed resources,
which add the corresponding ACEs to the ACL list of the resource. The signal for deactivating the
resource model is the event of the end and deactivation of the associated business operation. In
this case, the model interpreter generates commands that remove access rights granted by the
model [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          Resource model presentation language. To describe the resource model, a data
presentation format was developed based on the XACML (Extensible access control language)
resource access description language standard [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. An example of part of the XML file of the
resource model for the process of developing a technical proposal is given below [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ].
&lt;Model&gt;
&lt;ModelMetadata&gt;
&lt;ModelId&gt; id &lt;/ModelId&gt;
&lt;ModelType&gt; ResourceAccessModel &lt;/ModelType&gt;
&lt;OntologyURI&gt; www.acme.org/ResourceOntology&lt;/OntologyURI&gt;
&lt;ModelRepositoryURI&gt;www.acme.org/ModelRepository&lt;/ModelRepositoryURI&gt;
&lt;BusinessOperation Datatype="&amp;xml;string" Name="BusinessOp"
OntologyType="business_operation"&gt;ProposalCreationURI&lt;/BusinessOperation&gt;
&lt;/ModelMetadata&gt;
&lt;PolicySet PolicySetId= "PPS:projectmanager:role"&gt;
&lt;Role OntologyType="ProjectManagerRole"&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="RoleName"&gt; ProjectManager&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="Instance" OntologyType="person"&gt; Marushak&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="Constraint"
OntologyType="constraint"&gt;Constraint&lt;/AttributeValue&gt;
&lt;/Role&gt;
&lt;Rule RuleId="Permission:to:write:and:read:proposal"&gt;
&lt;Target&gt;
&lt;Resources&gt;
&lt;Resource&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="ResourceName"
OntologyType="document"&gt;Proposal&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="Instance"&gt;DocumentURI&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="Constraint"
OntologyType="constraint"&gt;Constraint&lt;/AttributeValue&gt;
&lt;/Resource&gt;
&lt;/Resources&gt;
&lt;Actions&gt;
&lt;Action&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="ActionName" OntologyType="action"&gt;Write&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="ActionName" OntologyType="action"&gt;Read&lt;/AttributeValue&gt;
&lt;AttributeValue Datatype="&amp;xml;string" Name="ServiceURI"
OntologyType="AccessControlService"&gt;ServiceURI&lt;/AttributeValue&gt;
        </p>
        <p>&lt;AttributeValue Datatype="&amp;xml;string" Name="Constraint"
OntologyType="constraint"&gt;Constraint&lt;/AttributeValue&gt;
&lt;/Action&gt;
&lt;/Actions&gt;
&lt;/Target&gt;
&lt;/Rule&gt;
&lt;/PolicySet&gt;
&lt;PolicySet PolicySetId= "PPS:qamanager:role"&gt;.......&lt;/PolicySet&gt;
&lt;/Model&gt;</p>
        <p>
          The model description contains metadata sections and access policy description sections. The
metadata section contains general information about the model: identifier, ontology reference,
model repository, and business operation associated with this model. The access policy sections
for each role define resources and allowable operations. An important part of the description is
the reference to the appropriate ontology type and the definition of additional constraints acting
at the model level. The developed method of access to resources using models allows building an
information system in which access rights are assigned dynamically, in the context of performing
business tasks. At the same time, the administering access rights task is significantly simplified
when the level of system protection is increased [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>4.2. The architecture for the simulation environment and functional
specifications of its services</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2.1. Scenarios for using the modelling system</title>
        <p>The solution of the set tasks involves the analysis of actors, and methods of use, with further
definition and detailing of the functioning processes of IS modelling. The main actors in IS
modelling are:
 SA expert – creates or modifies the conceptual model, validates it, and supervises its use;
 programmer – creates, maintains, modifies and tests model interpreters;
 simulation agent – executes models in the simulation environment.</p>
        <p>The usage scenario "Creating a model" is, in turn, divided into the scenarios "Model tasks",
"Evaluation of execution results and modification of the existing model", "Ontology processing",
and "Model testing". The scenario "Execution and support of models" is divided into scenarios
"Execution of the model", "Support of interaction of models", and "Search for information". Each
of these scenarios is executed by a separate simulation environment service. Summary
information about actors, scenarios, and relevant software tools or services of the modelling
system is displayed in the Table. 3.
4.2.2. Presentation of conceptual models in the modelling system</p>
        <p>The Md conceptual model consists of the ScMd circuit and the RlMd implementation:  =
( ,  ). A schema is part of a model that is created by a human expert in SA. The scheme
specifies the objects involved and the logic of their processing, thereby determining the way to
solve a certain problem. The scheme is described in terms of SA, regardless of the possible
technologies for its implementation. The presence of a formalized scheme allows not only to
ensure its machine interpretation and implementation, but also creates an opportunity for other
experts to analyze and evaluate this scheme and, if necessary, correct it. The presence of a scheme
that can be changed without changing the implementation at the same time gives the system built
using models the necessary flexibility - because when the environment changes, it is enough to
change the scheme to change the behaviour of the system. At the same time, such time-consuming
and lengthy stages of the traditional software development process as coding and testing become
unnecessary. In addition, the presence of a formalized scheme serves as a means of documenting
the knowledge of the specialist - the author of the model regarding the method of solving the
problem. On the other hand, it is advisable to simplify the implementation of the model by
creating reusable components or a single implementation for a wide class of models. The
versatility and simplicity of the model implementation give the system flexibility, ensuring the
immutability of the implementation when the model scheme is changed. The main requirements
for the scheme:
1. The scheme should be simple. The scheme is created and pre-validated by a person - a
specialist, and it reflects a certain mental model of that person. The recommended number of
concepts in the scheme does not exceed 5-8, because according to the research of
psychologists, a person can keep in focus at the same time [25]. This requirement directly
follows from the requirement for the cooperation of the intellectual system with a person. In
addition, simple, universal models that do not have functional redundancy can easily be
combined into more complex ones.
2. The scheme is created using ontology concepts common to all models. When creating a
scheme, the constraints defined in the ontology are checked. Thus, when creating a scheme,
the experience of other experts is taken into account and formalized in the ontology, and
compliance with the same restrictions is ensured by different models. Instead, when creating
a scheme, new, additional restrictions are added.</p>
        <p>Let's take a closer look at the main components of the model scheme. Some of these parts are
created by the author, others are automatically filled in by the model design tool.</p>
        <p>The model diagram has the following information sections:
 metadata is information about the model in general: author, creation time, modification
history, ontology reference, and model type(s). Determining the model type allows you to
assign the model to a certain classification category depending on the types of problems and
methods of solving them and to find the necessary models based on a known class of problems;
 base model – defines the reference to the base schema (data and constraints on it) that
the activator of this model needs to fill. Also specifies the mapping between the activator and
base model slots. Contains the definition of the relevance function of the problem-solving
method.
 information for initialization – defines mandatory and optional model slots, indicates
possible additional sources for obtaining data;
 prerequisites is a list of conditions that must be met to activate the model. The conditions
are checked against the underlying model data and additional data obtained from the context.
If the prerequisites are not fulfilled, the model is not activated, but a message about the
violated conditions is returned;
 model body – the format is determined depending on the type of model. Specifies the
objects involved and the logic of solving the problem;
 information for verification is the verification section is used when modifying the
model, or when creating another model based on the data. This section defines the model
integrity constraints that must be met for all modifications;
 additional sections are defined depending on the type of model. For example, for models
that perform monitoring tasks, there is an additional section that determines the frequency of
model activation.</p>
        <p>The model implementation is a software component that processes the model scheme,
initializes it with facts from the fact base, and performs the actions specified by the model. Unlike
the scheme, the implementation of the model is created by a specialist programmer.</p>
        <p>The main requirements for the implementation are related to the need to ensure the
possibility of changing the scheme within wide limits without changing the implementation. At
the same time, it is allowed to change not only the parameters of the scheme or restrictions but
also to a certain extent to change the structure of the scheme. Implementation requirements:
 the implementation should, if possible, be universal and work for a wide class of model
types. At the same time, a semantic interpretation of model data is used;
 to reduce the complexity of reconfiguration, the implementation should use reusable
components, and be based on simple functional software components that are the same for all
implementations.</p>
        <p>The implementation of the model corresponds to the software component – the model
interpreter. This component receives the model specification in the form of an XML file, as well
as the initialized base model from the model interaction broker, activates and processes the
activated model. The main functions of the model interpreter are as follows: initialization of the
model - obtaining all the necessary facts from the DB; verification of fulfilment of prerequisites;
development of the model's body; support of the model interaction protocol and cooperation with
the model interaction broker. The work offers some recommendations for creating a model
interpreter, which will significantly simplify the process of creating and modifying the
interpreter:
 it is advisable to create a model interpreter in a script programming language (such as
Python, JavaScript, VBasic, or Perl) - this reduces the time for modifying the program and does
not require a high qualification of the programmer;
 because the activator model transmits only the minimum amount of data (in the base
model) to the activated model, and the model itself receives the rest of the data from the
context - it is impossible to ensure the presence of the required data model in the fact base in
advance. Therefore, it is important to take into account the possibility of missing the necessary
data. The interpreter must process the situation of the lack of necessary data in the KB and
have "default" solutions ready, or report the impossibility of solving the problem and the
reason for this;
 to reduce the complexity of creating a model in the structure of the interpreter, it is
advisable to use basic functional and logical components, for example, those that implement
the operations "Search in the fact base", "Check the prerequisites", "Request the service",
"Check the condition", "Create or modification of the fact" etc. Such functional primitives,
which are used by all interpreters, will not only simplify the procedures for creating and
maintaining the interpreter but also implement a unified approach to the implementation of
typical model interpretation operations;
 one interpreter should be created for a whole class of models. It should be independent
of the execution platform and the logic provided in the model. At the same time, the "logic of
interpretation" is displayed in the interpreter - the logic of processing models, which makes it
impossible to use a single interpreter for all classes of models;
 the actions performed by the interpreter are suggested to be formalized as requests to
the services of the information system with defined formats of these requests. Thus, the
available services determine the entire range of possible actions in the system.</p>
        <p>4.2.3. Development of conceptual models by the modelling system
Let's take a closer look at individual operations and aspects of model processing. These
operations are performed by different software components and at different processing stages.
For example, the model interpreter performs the operations of model initialization, precondition
checking, and model execution. The model editor implements model creation, ontology-based
verification, testing, and simulation. The interaction broker supports the process of model
interaction. We will pay special attention to issues of interaction of models and solving complex
problems using models. Important tasks implemented at all levels of model development are
verification, validation, relevance assurance, and selection of a model for implementation from
several alternatives.</p>
        <p>Initialization. The initialization operation is performed by the model interpreter immediately
after its activation and filling of the slots of the base model. The purpose of initialization is to
obtain all the data necessary for the execution of the model from the local fact base and, possibly,
from external sources. The initial data for initialization are the semantically interpreted data of
the base model, including the specification of the purpose with which the model is activated.
Filling the slots of the basic model, which occurs in the process of interaction with the activator
model and is carried out by the model interaction broker, will be considered the first stage of
initialization. During the second stage of initialization, the necessary data is extracted from the
context of the basic model in the fact base. In the model scheme, in the section that specifies the
data for the initialization process, acceptable configurations of slot fillings are defined depending
on the goal of the problem posed to the model. In the simplest case, mandatory and optional
model slots are defined. In more complex cases, when there is no data in the fact base, a model is
indicated that can be used to search for the required data.</p>
        <p>Check prerequisites. Prerequisite checking is performed by the model interpreter after
filling the model slots with data. The purpose of this check is to determine the relevance of the
model based on the available data in the fact base. In the process of checking the prerequisites,
the relevance conditions specified by the author of the model are checked. For example, the model
that manages access to the company's house, after identifying the person who claims access,
defines positive prerequisites for granting access in such cases: a) the applicant is a permanent
employee of the company b) is a temporary employee under a contract c) is an invited person,
which there is an entry in the relevant register. If none of these prerequisites are met, the access
request is denied.</p>
        <p>Execution of models. It is implemented by the model interpreter and is discussed in the
section devoted to the principles of constructing interpreters.</p>
        <p>Interaction of models. General principles of model interaction were considered in [26]. In
particular, the concepts of model - activator and activated model, basic model, relevance
functions and model selection, model interaction protocol were introduced. Here we will consider
the mechanism of interaction of models in more detail, from the point of view of its technical
implementation. (Fig. 8) [27-33]. The initiator of the organization of the interaction of models is
the currently active model, which needs to solve its main task by solving secondary, auxiliary
tasks [34-39]. For example, the model that forms a tourist trip, at a certain stage of its
implementation, needs to solve the task of buying bus tickets. At the same time, she will contact
the model who will make such a purchase [40-54]. In order to reduce the complexity of
implementing the model - activator, we will introduce a separate service of the modelling system
- "Model Interaction Broker", which will ensure the implementation of model interaction. The
functions of an interaction broker include: goal analysis and search for relevant models;
definition of relevant models; choosing one from a set of relevant models and activating it;
initialization of the activated model; tracking its execution process and returning the result to the
activator; support, if necessary, of the connection between the activator and the activated model.</p>
        <p>Activator
model</p>
        <p>Initialized basic model,
requirements for solving the</p>
        <p>problem
Result</p>
        <p>Definitionof relevance</p>
        <p>Model selection</p>
        <p>Model
interaction
broker</p>
        <p>Model initialization</p>
        <p>Result</p>
        <p>Activated
model</p>
        <p>As can be seen from the description of the service functions, it is a rather complex software
component, at the same time it is created once and serves the interaction of all components of the
modelling system, thus providing a unified approach and rules for supporting the interaction of
models. The base model is the data structure used to transfer parameters between the activator
model and the activated model. We will consider such a model as a general statement of the
problem, which specifies the type of problem, the objects for which this problem is solved, and
restrictions on the process of solving the problem. The activator transmits to the interaction
broker a data structure in which the mapping of the activator slots into the slots of the base model
and the requirements for the process of solving the task and the expected results are entered.</p>
        <p>The base model is a schematic, not a complete model, meaning it has no implementation.
Instead, the basic model specifies a problem statement for a whole class of similar problems. The
hierarchy (taxonomy) of basic models corresponds to the taxonomy of goals (tasks) that are
solved using models. Models that solve a similar problem, although perhaps with different
methods and for different situations, have a common basic model. Base model slots correspond
to roles that are filled with the values of the activator model slots. For example, the general task
of conducting a financial transaction has such slots in the base model as Buyer, Seller, Goods, and
Money. It serves as the basis for such more specific models of conducting financial transactions
as "Purchase of real estate", "Payment for a service", "Purchase of a food product" and others,
which differ in the way of conducting the transaction. The choice of one or another basic model
in the process of interaction of models is carried out by the activator. At the same time, the
following options for defining the basic model are possible:</p>
        <p>a) the relevant model (or set of models) is explicitly specified by the author of the model. In
this case, the base model is defined through the already defined model, since each model has a
reference to the base model that it uses;</p>
        <p>b) only the activation goal is given, and the relevant base model needs to be defined. In this
case, the basic model and the corresponding set of subordinate models are determined by the
ontology of goals (tasks), which is part of the general ontology of the system.</p>
        <p>Based on the completed basic model, the interaction broker defines a set of models that
implement relevant methods for solving the given task. The relevance function ReLnMd is used to
determine the set of relevant models. Note that the concept of relevance in the case of models has
two aspects. In the first, the relevance of the method of solving the given problem is determined.
The other is relevance based on the current state of the fact base. The relevance of the method of
solving the problem is determined by the basic model, and the relevance based on the state of the
fact base is determined by the prerequisites of the model execution based on the filled slots of
this model. Therefore, it is advisable to split the relevance function into two - Remt and Reft and
assume that</p>
        <p>=    &amp;   . (9)</p>
        <p>Such an approach, which separately considers the relevance of the method and the relevance
of the data, allows to reduce the time of model processing, because the initialization of the model
and the search for all the necessary data in the context of this model require more time. Therefore,
preliminary determination of the relevance of models is carried out only in the context of the base
model. The basic model, as a rule, corresponds to a group of problems that have a similar
formulation. In the context of an initialized base model, the list of models subject to this base
model is reviewed. The relevance function Remt is associated with each subordinate model, which,
based on the data of the base model, determines the relevance of the application of the method of
solving the given problem implemented in the model. The relevance function Remt is defined as a
set of statements in the context of the base model.</p>
        <p>=  ( ( (   )). (10)</p>
        <p>For example, if you want to buy a bus ticket, the common basic business transaction model is
activated. The Buyer is defined as a Tourist, the Money slot is initialized with a reference to the
tourist's bank account, the Goods is a transportation service, and the Seller is a carrier. Based on
the filled slots of the basic model, and referring to the context of the facts defined in it, the
relevance function determines that there is one relevant model in the list of trade transaction
models - "Service payment", because the product is a transportation service.</p>
        <p>Among the set of relevant models, one must be chosen, which will be used to solve the given
problem. To select a model, use the selection function Fc, which maximizes/minimizes a certain
defined criterion (such as the execution time of the model, or the estimation of the accuracy of
the result). The purpose of the model selection operation is to determine one model in a
nonempty set of relevant models, which will be activated to solve the given problem. The range of
complexity of approaches in its implementation varies from simply random selection of any
model from the list of relevant ones to the application of complex methods of evaluating candidate
models according to various criteria. In general, to solve the problem of model selection, it is
necessary to create a whole selection infrastructure that uses its own models, taxonomies,
sections in the schema of the activator model and the activated model. Let's define the
components of this infrastructure.</p>
        <p> ontology of selection methods and associated selection models. It includes, for example,
random selection, single- and multi-criteria selection methods, etc.;
 ontology of selection criteria. Defines the semantics of possible model selection criteria,
for example, time (complexity) of model development, expected accuracy of results;
 part of the enabler metadata that specifies the benefits and requirements for the model
execution process. This data defines the constraints and expectations of the activator
regarding execution time or accuracy of results. The use of this data will make it possible to
decide on the requirements for the selection and execution of the activated model and will be
used to form a similar section in the metadata of the activated model. For example, if the
activator is limited by execution time, then it will give preference to fast models in the selection
of activated models;
 the metadata part of a candidate model contains information about the characteristics of
that model, such as complexity, execution time, and accuracy. At the same time, there may be
references to other models that will allow you to estimate the execution time or the accuracy
of the results in advance;
 choice models that form requirements and preferences for the activated model and
implement the choice itself. In addition, these models take into account restrictions on the
selection process itself. For example, in some cases, the choice must be made as soon as
possible, and spending time on an accurate assessment of the parameters affecting the choice
is impractical. Choice models are universal and are used in other situations when it is
necessary to choose from several alternatives.</p>
        <p>The selection of the model for activation is carried out by the selection model at the initiative
of the model interaction broker. The order of interaction between the models and the broker is
determined by the interaction protocol. At its simplest, this protocol contains the commands to
request a broker, request an activated model, respond to a broker, and activate a model. In a more
complex case, if the activated model is defined as a multifunctional service, the protocol
additionally defines commands and responses according to the interface published by the model.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Models are created and validated by a person who is an expert in a given subject area and reflects
this person's knowledge of how to solve a certain problem. To create or modify a model, use a
tool – the Model Editor program. The main functions (use options) of this program are as follows:
 creating a model diagram using ontology classes and facts. Definition of additional
restrictions. The model scheme is created in a graphical representation, and based on the
finished scheme, an XML file of the model description is generated;
 work with ontology. Searching for ontology classes and facts. Modification of classes and
relations. Definition of dependencies between certain ontology classes and existing models.
Determination of the impact of changes in ontology on existing models;
 work with the fact base. Searching for the necessary facts, adding or removing facts from
the database;
 working with the model repository. Search for template models using different criteria;
 defining the XML template of the model and specifying the method of generation of the
XML description of the model scheme for the specified type of models;
 the task of the model verification block is a set of rules and dependencies that the model
must satisfy. For this, you can use, for example, OCL. At the same time, different sets of
validation rules are used when creating a new model based on this model, or during the
initialization of the model;
 defining/configuring an existing model interpreter - a component that executes a model;
 testing of models and networks (aggregates) of models. Launching and executing models
on the test base of facts, checking the compliance of the behaviour of the models with the
expected results.</p>
      <p>The functions of the model editor include both the operations of creating a scheme and
creating a model implementation. The process of creating a model differs between creating a
model "from scratch" and creating it based on an existing template model. Consider the sequence
of stages of model creation.</p>
      <p>Model type assignment. When creating a model scheme, its type is determined using the
ontology of model types. The type is determined by the purpose or class of problems that the
model solves. As a rule, models of the same type are interchangeable and can be used to solve
similar problems. Thus, all models in the model repository are ordered according to the ontology
of the problems they solve. The type of the model also determines the implementation - since the
model interpreter should create one for a whole group of models of the same type. The model
type imposes restrictions on the allowable slots and relations in the model. If a model is created
based on a template, then it is a detail of an existing template model and its type is a subtype of
this template model. Accordingly, such a model inherits the definition of slots and constraints
from the template model. At the same time, new slots and restrictions may be added to the
template. For each type of model, a basic model is defined, which reflects the minimum set of
concepts and limitations present in all models of this type. Base models are available to other
models that activate models of this type. Having a basic model allows you to use different models
and methods to solve the same problem. For example, for classification models, the base model
consists of two elements - a classified fact (arbitrary type) and a classification (type
classification), presented as a list of categories. The mechanism of construction of
correspondence of a fact to a certain category is determined in specific models. The models at the
lower level of the hierarchy define how to solve the problem and the additional information to be
obtained from the context.</p>
      <p>Determination of the relevance of the method of solving the problem by the model. In
the context of a predefined base model, specify the model relevance conditions, which are
recorded in the "Base model" section.</p>
      <p>Identifying options for using the model. Determining the model's use cases involves
identifying the operations that the model performs, if the model is multi-functional. For example,
a trade transaction model will involve the operations of modelling and evaluating the results,
actually conducting the transaction, and searching for the product for the transaction. As a rule,
a multifunctional model can perform several operations with one initialized scheme.</p>
      <p>Determination of constituent parts of the model. For each use case, essential roles and
ontology types that can replace these roles are defined. Determine the connections and
restrictions essential for the model. In general, roles, relationships, and constraints form the basis
of a model's schema. At the same stage, it is advisable to establish correspondence between the
defined model slots and the base model slots according to the predefined model type.</p>
      <p>Specification of mechanisms for implementation of operations. Methods of achieving the
goal, inputs and outputs are defined. Specify constraints on inputs and outputs.</p>
      <p>Definition of prerequisites. Prerequisites are defined for each use case - as requirements for
the types of input data and the permissible ranges of their values.</p>
      <p>Assignment of initialization conditions and procedures. Using the results obtained in the
previous stages, for each use case, a set of input data is analysed, determining configurations of
mandatory and optional data. For example, in the trade transaction model for the use case Search
for a product seller, the required slots are Buyer, Money, Product, and the Seller is determined
during the model operation. All slots must be filled in for the Make a Transaction use case. To
reduce the dependency of initialization success on the state of the fact base, default values are
specified for missing values whenever possible. An alternative is to define relevant data retrieval
models with the task of mapping the model slots to the slots of the base retrieval model.</p>
      <p>Specification of conditions for model verification. As a rule, verification rules are
associated with models that determine the way to solve a certain problem when creating a model.
Verification conditions are used to check the integrity of the model if it changes. For example, if a
classification model is defined using a given scale, then the verification rules check whether all
intervals of the scale collectively overlap the definition area of the classification parameter and
whether there is no overlapping of the intervals.</p>
      <p>Development or modification of the model interpreter. The completed model scheme is
passed to the programmer, who creates a new one to execute the model, or defines one of the
existing model interpreters.</p>
      <p>Model testing. The completed model is tested and validated for different states of the fact
base and for different use cases in order to achieve the goal. Identified shortcomings are the basis
for changing and retesting the model. The proposed architecture of the simulation system is the
basis of the ISBA intelligent controlled model simulation tool set.
[16] B. Hutchinson, et al., Towards accountability for machine learning datasets: Practices from
software engineering and infrastructure, in: Proceedings of the 2021 ACM Conference on
Fairness, Accountability, and Transparency, 2021, March, pp. 560-575.
[17] A. Osterwalder, The business model ontology a proposition in a design science approach,</p>
      <p>Doctoral dissertation, Université de Lausanne, 2004.
[18] R. Turner, Gower handbook of project management. Routledge, 2016.
[19] S. J. Mellor, M. J. Balcer, Executable UML: a foundation for model-driven architecture.</p>
      <p>Addison-Wesley Professional, 2002.
[20] B. Goertzel, C. Pennachin, The Novamente artificial intelligence engine, Artificial general
intelligence, pp. 63-129. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007.
[21] D. F. Ferraiolo, J. F. Barkley, D. R. Kuhn, A role-based access control model and reference
implementation within a corporate intranet, ACM Transactions on Information and System
Security (TISSEC) 2(1) (1999) 34-64.
[22] D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, R. Chandramouli, Proposed NIST standard
for role-based access control. ACM Transactions on Information and System Security
(TISSEC) 4(3) (2001) 224-274.
[23] Beyond Roles: A Practical Approach to Enterprise User Provisioning, URL:
http://www.idsynch.com/docs/beyond-roles.html.
[24] U. R. Saxena, T. Alam, Provisioning trust-oriented role-based access control for maintaining
data integrity in cloud. International Journal of System Assurance Engineering and
Management 14(6) (2023) 2559-2578.
[25] M. B. Gunjal, V. R. Sonawane, Multi authority access control mechanism for role based access
control for data security in the cloud environment. International Journal of Intelligent
Systems and Applications in Engineering 11(2s) (2023) 250-264.
[26] I. Zavuschak, Y. Burov, The Context of Operations as the basis for the Construction of
Ontologies of Employment Processes. International Journal of Modern Education and
Computer Science 9(11) (2017) 13.
[27] V. Lytvyn, V. Vysotska, Y. Burov, A. Demchuk, Architectural ontology designed for intellectual
analysis of e-tourism resources, in: Proceedings of the International Conference on Computer
Sciences and Information Technologies, CSIT, 2018, pp. 335-338.
[28] N. Antonyuk, A. Vysotsky, V. Vysotska, V. Lytvyn, Y. Burov, A. Demchuk, I. Lyudkevych, L.</p>
      <p>Chyrun, S. Chyrun, І. Bobyk, Consolidated Information Web Resource for Online Tourism
Based on Data Integration and Geolocation, in: Proceedings of the International Conference
on Computer Sciences and Information Technologies, CSIT, 2019, pp. 15-20.
[29] A. Vysotsky, V. Lytvyn, V. Vysotska, D. Dosyn, I. Lyudkevych, N. Antonyuk, O. Naum, A.</p>
      <p>Vysotskyi, L. Chyrun, O. Slyusarchuk, Online Tourism System for Proposals Formation to User
Based on Data Integration from Various Sources, in: Proceedings of the International
Conference on Computer Sciences and Information Technologies, CSIT, 2019, pp. 92-97.
[30] A. Berko, V Vysotska., O. Naum, S. Chyrun, V. Panasyuk, N. Borovets, Big data analysis for
startup of supporting Ukraine internet tourism, in: Advanced information and
communication technologies : proceedings of the 5th IEEE International conference, Lviv,
Ukraine, November 21–25, 2023, pp. 164–169.
[31] N. Shpak, I. Novakivskyi, I. Kulyniak, V. Kharchuk, I. Oleksiv, Modeling the Development of
the Tourism Industry Using the Koba-Douglas Function for Intelligent Management Systems,
CEUR Workshop Proceedings, Vol-3426, 2023, 308-321.
[32] Y. Tverdokhlib, V. Andrunyk, L. Chyrun, L. Chyrun, N. Antonyuk, I. Dyyak, O. Naum, D. Uhryn,
V. Basto-Fernandes, Analysis and estimation of popular places in online tourism based on
machine learning technology, CEUR Workshop Proceedings, 2020, 2631, pp. 457–470.
[33] N. Antonyuk, et. al., Online Tourism System Development for Searching and Planning Trips
with User’s Requirements, Advances in Intelligent Systems and Computing IV, Springer
Nature Switzerland AG 2020, 1080, (2020) 831-863.
[34] R. Yurynets, Z. Yurynets, M. Denysenko, I. Myshchyshyn, A. Pekhnyk, The Influence of
Educational Competencies of the Staff on the Efficiency of Hotel Companies in the Tourism
Sector, CEUR Workshop Proceedings, Vol-2870, 2021, pp. 1225-1237.
[35] O. Artemenko, V. Pasichnyk, N. Kunanets, K. Shunevych, Using sentiment text analysis of user
reviews in social media for e-tourism mobile recommender systems, CEUR workshop
proceedings, Vol-2604, (2020) 259-271.
[36] P. Zhezhnych, O. Markiv, Recognition of tourism documentation fragments from web-page
posts. In: 14th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering, TCSET, (2018) 948-951.
[37] P. Zhezhnych, O. Markiv, Linguistic comparison quality evaluation of web-site content with
tourism documentation objects, Advances in Intelligent Systems and Computing 689, (2018)
656-667.
[38] P. Zhezhnych, O. Markiv, A linguistic method of web-site content comparison with tourism
documentation objects. In: International Scientific and Technical Conference on Computer
Sciences and Information Technologies, CSIT, (2017) 340-343.
[39] V. Lytvyn, Y. Burov, V. Vysotska, V. Hryhorovych, Knowledge novelty assessment during the
automatic development of ontologies, in: Third International Conference on Data Stream
Mining &amp; Processing (DSMP), 2020, August, pp. 372-377. IEEE.
[40] Y. Burov, V. Vysotska, V. Lytvyn, L. Chyrun, Software Based on Ontological Tasks Models.</p>
      <p>Lecture Notes in Data Engineering, Computational Intelligence, and Decision Making, 2022,
pp. 608-638. Cham: Springer International Publishing.
[41] J. Yang, et al.,, Social media data analytics for business decision making system to competitive
analysis. Information Processing &amp; Management 59(1) (2022) 102751.
[42] M. Fuchs, W. Höpken, M. Lexhagen, Big data analytics for knowledge generation in tourism
destinations–A case from Sweden. Journal of destination marketing &amp; management, 3(4),
(2014). 198-209.
[43] M. Lee, et al., Artificial intelligence for hospitality big data analytics: developing a prediction
model of restaurant review helpfulness for customer decision-making. International Journal
of Contemporary Hospitality Management 33(6) (2021) 2117-2136.
[44] C., Marcolin, et al., Business analytics in tourism: Uncovering knowledge from crowds.
BAR</p>
      <p>Brazilian Administration Review 16 (2019) e180136.
[45] U. Gretzel, Intelligent systems in tourism: A social science perspective. Annals of tourism
research 38(3) (2011) 757-779.
[46] S. J. Miah, H. Q. Vu, J. Gammack, M. McGrath, A big data analytics method for tourist behaviour
analysis. Information &amp; Management 54(6) (2017) 771-785.
[47] W. Höpken, et al., Business intelligence for cross-process knowledge extraction at tourism
destinations. Information Technology &amp; Tourism 15 (2015) 101-130.
[48] S. Babu, S. Subramoniam, Tourism management in internet of things era. Journal of</p>
      <p>Information Technology &amp; Economic Development 7(1) (2016).
[49] K. Hemachandran, et al. Machine Learning for Business Analytics: Real-Time Data Analysis
for Decision-Making. CRC Press, 2022.
[50] S. Akter, et al., Analytics-based decision-making for service systems: A qualitative study and
agenda for future research. Inter. Journal of Information Management 48 (2019) 85-95.
[51] Y. Yuan, Decision support system for evaluating English media analytics and the role of
visualization in online business development using CRITIC and TOPSIS approaches. Soft
Computing (2023) 1-15.
[52] H. Zhang, et al., Big data-assisted social media analytics for business model for business
decision making system competitive analysis. Information Processing &amp; Management 59(1)
(2022) 102762.
[53] R. A. Hamid, et al., How smart is e-tourism? A systematic review of smart tourism
recommendation system applying data management. Computer Science Review 39 (2021)
100337.
[54] O. Boulaalam, et al., Proposal of a big data system based on the recommendation and profiling
techniques for an intelligent management of Moroccan tourism. Procedia Computer Science
134 (2018) 346-351.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kravets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Andrusyak</surname>
          </string-name>
          ,
          <source>Game Task of Ontological Project Coverage, CEUR Workshop Proceedings</source>
          <volume>2851</volume>
          (
          <year>2021</year>
          )
          <fpage>344</fpage>
          -
          <lpage>355</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <article-title>The Introduction of Attentional Mechanism in the Situational Awareness Process</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3171</volume>
          (
          <year>2022</year>
          )
          <fpage>1076</fpage>
          -
          <lpage>1086</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Core and hierarchical role based access</article-title>
          .
          <source>control (RBAC) profile of XACML v2.0</source>
          , URL: http://docs.oasis-open.
          <source>org/xacml/2</source>
          .0/access_control
          <source>-xacml-2</source>
          .0-
          <string-name>
            <surname>rbac-</surname>
          </string-name>
          profile1
          <string-name>
            <surname>-</surname>
          </string-name>
          spec-os.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hovorushchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hnatchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Herts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Onyshko</surname>
          </string-name>
          ,
          <article-title>Intelligent Information Technology for Supporting the Medical Decision-Making Considering the Legal Basis</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2853</volume>
          (
          <year>2021</year>
          )
          <fpage>72</fpage>
          -
          <lpage>82</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Horodetska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bublyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nashkerska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <article-title>Intellectual Tourist Service with the Situation Context Processing</article-title>
          ,
          <source>in: International Conference on New Trends in Languages, Literature and Social Communications</source>
          ,
          <year>2021</year>
          , May, pp.
          <fpage>233</fpage>
          -
          <lpage>243</lpage>
          . Atlantis Press.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Allemang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hendler</surname>
          </string-name>
          ,
          <article-title>Semantic web for the working ontologist: effective modeling in RDFS and OWL</article-title>
          . Elsevier,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F. H.</given-names>
            <surname>Abanda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Tah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Keivani</surname>
          </string-name>
          ,
          <article-title>Trends in built environment semantic Web applications: Where are we today?</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>40</volume>
          (
          <issue>14</issue>
          ) (
          <year>2013</year>
          )
          <fpage>5563</fpage>
          -
          <lpage>5577</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hepp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Siorpaes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bachlechner</surname>
          </string-name>
          ,
          <article-title>Towards the semantic web in e-tourism: lack of semantics or lack of content?</article-title>
          ,
          <source>3rd European Semantic Web Conference (ESWC</source>
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hepp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Siorpaes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bachlechner</surname>
          </string-name>
          ,
          <article-title>Towards the semantic web in e-tourism: can annotation do the trick?</article-title>
          . (
          <year>2006</year>
          ).
          <article-title>URL: www</article-title>
          .heppnetz.de.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cardoso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lange</surname>
          </string-name>
          ,
          <article-title>A framework for assessing strategies and technologies for dynamic packaging applications in e-tourism</article-title>
          ,
          <source>Information Technology &amp; Tourism</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          ) (
          <year>2007</year>
          )
          <fpage>27</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Raz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. T.</given-names>
            <surname>Juhola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Serrat-Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Galis</surname>
          </string-name>
          ,
          <article-title>Fast and efficient context-aware services</article-title>
          . John Wiley &amp; Sons,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>J. Krumm</surname>
          </string-name>
          , (Ed.).
          <article-title>Ubiquitous computing fundamentals</article-title>
          . CRC Press,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>Introducing google places</article-title>
          , URL: http://googleblog.blogspot.com/
          <year>2010</year>
          /04/introducinggoogle-places.html.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hovorushchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Herts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hnatchuk</surname>
          </string-name>
          ,
          <article-title>Concept of Intelligent Decision Support System in the Legal Regulation of the Surrogate Motherhood</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2488</volume>
          (
          <year>2019</year>
          )
          <fpage>57</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Zhang,</surname>
          </string-name>
          <article-title>Cognition-driven decision support for business intelligence</article-title>
          .
          <source>Models, Techniques, Systems and Applications. Studies in Computational Intelligence</source>
          , Springer, Berlin, (
          <year>2009</year>
          )
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>