<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Mathematical models and methods for decision coordination in critical infrastructure operations ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Hryhorii</forename><surname>Hnatiienko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>64/13 Volodymyrska str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Hnatiienko</surname></persName>
							<email>oleksii.hnatiienko@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>64/13 Volodymyrska str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tetiana</forename><surname>Babenko</surname></persName>
							<email>babenkot@ua.fm</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>64/13 Volodymyrska str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">International Information Technology University</orgName>
								<address>
									<addrLine>34/1 Manas str</addrLine>
									<postCode>A15M0E6</postCode>
									<settlement>Almaty</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Larysa</forename><surname>Myrutenko</surname></persName>
							<email>myrutenko.lara@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>64/13 Volodymyrska str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Mathematical models and methods for decision coordination in critical infrastructure operations ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">EB83691FCA936DB894E3873E9443596D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:50+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>organizational system</term>
					<term>functional stability</term>
					<term>critical elements</term>
					<term>weighting factors</term>
					<term>layering method 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper considers the problems associated with ensuring the functioning of the critical infrastructure network. It is proposed to consider a poorly formalized system of ensuring the functioning of critical infrastructure facilities using expert information processing methods. The urgency of solving the problem under consideration is confirmed by the massive attacks on critical infrastructure by the Russian troops during Russia's large-scale aggression against Ukraine. The paper presents a mathematical model of the problem of maintenance of a network of critical infrastructure facilities developed by the authors. A scheme of sequential analysis of options for solving the problem of ensuring the operation of the critical infrastructure system is proposed. Methods for finding a valid solution to the problem, searching for a reference solution to the problem, and algorithms for improving the reference solution in various variations are described. The problem statement and the mathematical model of decision coordination in a three-level hierarchical system for ensuring the operation of a network of critical infrastructure facilities are also described. An algorithm for coordinating decisions in a three-level hierarchical system is presented.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The possibilities of applying mathematical models and decision-making methods to study the problems of vulnerability, protection, and management of critical infrastructure systems are in the field of view of many researchers <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. This issue has been studied by scientists from different countries for many years <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref> and its relevance is not decreasing <ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>. To date, a large number of approaches and mathematical models have been developed that demonstrate the authors' attempts to ensure the effective functioning and protection of critical infrastructure <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>. At the same time, the problems of protecting critical infrastructure from terrorist attacks remain extremely relevant <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref>. This is explained, in particular, by the fact that the problem of critical infrastructure protection is poorly structured, and the systems that describe the network of critical infrastructure facilities are poorly formalized organizational systems <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>.</p><p>In many practical decision-making situations in poorly formalized organizational systems, the decision-maker is forced to act in poorly structured subject areas <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>. To ensure the quality of decision support in poorly structured subject areas, expert knowledge is traditionally and effectively involved. In addition, building a preference structure in a formalized form is a difficult task for humans: in particular, it is difficult for subject matter experts to build metric relations on a set of objects <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>.</p><p>In particular, a person cannot set reliable weighting coefficients for the relative importance of parameters or criteria <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>, expert competence coefficients <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>, elements of metricated pairwise comparison matrices <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25]</ref>, or build a reasonable reliable membership function using direct methods <ref type="bibr" target="#b25">[26]</ref>. Meanwhile, such problems regularly arise in everyday life and require their solution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Critical infrastructure facilities</head><p>Critical infrastructure facilities are those that are</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Particularly important for the state.  Capable of significantly affecting other critical infrastructure facilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Whose disruption causes a crisis of national importance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Vital at the regional level.  Whose disruption or malfunction causes a crisis of regional, local, or local significance.</p><p>Critical infrastructure facilities include enterprises and institutions operating in the following industries: Utilities: water, heat, and gas supply  Healthcare, etc.</p><p>According to <ref type="bibr" target="#b26">[27]</ref>, critical infrastructure assets are systems that are essential for maintaining vital social functions, health, safety, security, and economic or social well-being of people.</p><p>Timely restoration of critical infrastructure facilities during military operations is particularly important. As a result of unprovoked aggression by Russia, Ukraine faced large-scale and targeted attacks on its critical infrastructure <ref type="bibr" target="#b27">[28]</ref>. Attacks were carried out in more than a hundred cities in Ukraine <ref type="bibr" target="#b28">[29]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The task of maintaining a network of critical infrastructure facilities</head><p>The maintenance task was considered and studied in <ref type="bibr" target="#b29">[30]</ref> as the task of maintaining a network of communication elements. Subsequently, the problem statement, approaches to its solution, and the algorithm for sequential analysis of options were adapted to the extremely relevant problem of timely and efficient operation of the C&amp;I system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Setting the task of ensuring the operation of the OCI network</head><p>Let 𝑅 = 𝑟 , 𝑖 = 1, … , 𝑁 , 𝑏 = 1, … , 𝐵, 𝑁 ≤ 𝐷, 𝑅 is the set of working intervals in a month, 𝑁 is the number of intervals (windows) for the 𝑏 is the team that ensures the operation of the OCI network; 𝐵 is the number of teams, ∩ 𝑟 , 𝑖 = 1, … , 𝑁 =  (in particular, the system of intervals may coincide for all teams); 𝑟 is determined by the beginning 𝜂 and duration 𝛿 , 𝑟 = 𝜂 , 𝛿 , 𝑖 = 1, … , 𝑁 ; 𝐷 number of working days in a month; 𝛼 , 𝑗 = 1, … , 𝑛, is the set of requests for activation of the work of the CMI NMS teams, the duration of which is equal to 𝜏 = 𝜏 𝛼 , 1 ≤ 𝜏 ≤ 𝐴; 𝑛 is number of requests; 𝐴 is the maximum length of the request; 𝑓 = 𝑓 𝛼 , 𝑖 = 1, … , 𝐷, 𝑗 = 1, … , 𝑛, is the efficiency of execution of the 𝑗 is request if it starts to be executed on the 𝑖 th day of the month. Target function of the task:</p><formula xml:id="formula_0">𝐹(𝛼) = 𝑓 𝛼 → 𝑚𝑎𝑥 ∈{ ,…, } ,<label>(1)</label></formula><p>where 𝑘 is the number of working days in the calendar month on which the 𝑗 is request starts to be executed. Let 𝑔 = 𝑔 𝛼 is the resource of the 𝑙 is the type required to satisfy the 𝑗 is request if it starts executing on the 𝑖 th day, 𝑙 = 1, … , 𝑚, 𝑖 = 1, … , 𝐷, 𝑗 = 1, … , 𝑛. Then the resource constraints are</p><formula xml:id="formula_1">∑ 𝑔 𝛼 ≤ 𝐺 , 𝑙 = 1, … , 𝑚,<label>(2)</label></formula><p>𝛽 here 𝑘 is the number of days when the execution of the𝑗 is request starts; 𝑚 is the number of types of resources; 𝛽 , 𝑖 = 1, … , 𝐷 are restrictions on the readiness of the OCI's command center for the EWM brigades, which means that no more than 𝑖 is requests can be serviced on a given day, 𝛽 ≤ 𝐵, 𝑖 = 1, … , 𝐷.</p><p>(3) It should be noted that requests for activation of the next I&amp;CS teams are received directly from CI facilities, I&amp;CS subsystems (SS), or the governing bodies of the I&amp;CS system.</p><p>Array of inconsistencies (incompatibilities) of applications</p><formula xml:id="formula_2">𝐶 = 𝐶 , 𝑠 = 1, … , 𝑆, ℎ = 1,2, …,<label>(4)</label></formula><p>where 𝐶 is the number of requests that cannot be executed simultaneously; 𝑆 is the number of array lines; ℎ is the indices of incompatible requests of the 𝑠 th line of the unstacked array.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Scheme for solving the problem of ensuring the operation of the QMS</head><p>The solution to the problem is sought in two stages: building a reference solution and building an optimal solution. To describe the algorithms, we present the necessary definitions. Definition 1. A variant of the problem (1)-( <ref type="formula" target="#formula_2">4</ref>) is a vector 𝑣 = (𝑣 , … , 𝑣 ), whose elements are triples𝑣 = 𝑣 , 𝑣 , 𝑣 , where 𝑖 is the number of the request; 𝑣 is the duration of the i th request; 𝑣 is the number of the team that executes i th the request; 𝑣 is the day the request starts i th the request. Definition 2. An admissible (complete) variant (solution) of the problem (1)-( <ref type="formula" target="#formula_2">4</ref>) is the variant 𝑣 = (𝑣 , … , 𝑣 ), that satisfies constraints (2)-(4). Definition 3. A partial solution to problem (1)-( <ref type="formula" target="#formula_2">4</ref>) is a vector, 𝑣 = (𝑣 , … , 𝑣 ), 𝑠 &lt; 𝑛, that satisfies constraints (2)-(4). Definition 4. A locally valid subvariant 𝑣 = 𝑣 , 𝑣 , 𝑣 , 𝑙 ∈ {1, … , 𝑛} of problem (1)-( <ref type="formula" target="#formula_2">4</ref>) is the placement of a request in some working interval that satisfies conditions (2)-(4).</p><p>Definition 5. An admissible subvariant of problem (2)-( <ref type="formula" target="#formula_2">4</ref>) is a locally admissible subvariant that leads to an admissible variant. Definition 6. A reference solution to problems (1)-( <ref type="formula" target="#formula_2">4</ref>) is a feasible solution (variant) that can, without being optimal, make the most of resources and at the same time deliver a local optimum to the objective function.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Method for finding a valid solution to</head><p>the problem of ensuring the operation of the QMS</p><p>The method of finding a feasible solution consists of the sequential construction of a reference solution as a union of locally feasible subvariants. Therefore, it is reduced to the sequential application of the following procedure.</p><p>Procedure for finding a locally admissible subvariant PS. The basis of the method is the formation of a set of admissible subvariants 𝑉 = (𝑣 ), 𝑖 = 1, … , 𝑚 + 2, 𝑙 = 1, … , 𝐿, from which a compromise subvariant is selected, 𝐿the number of admissible subvariants. The condition for generating a sub-variant is, firstly, 𝛿 ≥ 𝛼 , 𝑖 = 1, … , 𝑁 , 𝑏 = 1, … , 𝐵, 𝑗 = 1, … , 𝑛, i.e., the application 𝛼 should not exceed the interval in which it is supposed to be placed, and secondly, the compatibility of the current application with the one already accepted in the partial solution. In parallel to the set of sub-options, a set of indices corresponding to them is formed, 𝑇 = 𝑡 , ℎ = 1,2,3, 𝑙 = 1, … , 𝐿, where 𝑡 ≤ 𝑛 is the number of the application that generates the sub-option, 𝑡 ≤ 𝐵 is the number of the team proposed to execute the application, 𝑡 ≤ 𝐷 is the day the execution of the application 𝑡 by the team starts 𝑡 .</p><p>Consider the procedure for forming a valid subvariant 𝑣 = 𝑣 , … , 𝑣 , . For each request 𝛼 , 𝑗 = 𝑡 , all possible combinations of its placement in the working intervals of the teams are selected. At the same time, 𝑣 = min 𝑓 ; 𝜇 &gt; 1 is a multiplier that plays the role of a weighting factor for the relative importance of the request length for finding a compromise sub-option; 𝑣 , = , 𝑖 = 1, … , 𝑚, where 𝐺 = 𝐺 − 𝛥𝐺 , 𝑠 = 1, … , 𝑛, 𝛥𝐺 is the amount of resource 𝑖 of the type spent when including the next compromise sub-option𝑣 in a partial solution to the problem: 𝐺 = 0, 𝑖 = 1, … , 𝑚 . Thus, the search for a partial solution to the original problem is reduced to a discrete multicriteria optimization model with a set of feasible solutions 𝑉 and (𝑚 + 2) criteria to be minimized. If the set of admissible sub-options is not empty,𝑉 ≠∅, and not trivial, i.e. |𝑉| &gt; 1, we will look for a compromise. To find a single solution to a multicriteria optimization problem, it is necessary to set the weighting coefficients of the criteria <ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref><ref type="bibr" target="#b32">[33]</ref>. Let's fix the weighting factor for the length of the application as 𝜌 -for the sake of certainty, let's assume𝜌 = 0.5. Let's denote by 𝜌 the weighting factor of the objective function of the initial problem of the OCI MOC; the criteria that are "responsible" for resources are aggregated and denoted by the total weighting factor 𝜌 = ∑ 𝜌 , ∑ 𝜌 = 1. We are looking for a compromise option as</p><formula xml:id="formula_3">𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛 ,…, 𝑚𝑎𝑥 ,…, 𝜌 ⋅ 𝑣 .<label>(5)</label></formula><p>In the case when the solution of ( <ref type="formula" target="#formula_3">5</ref>) is not unique, a linear convolution is applied</p><formula xml:id="formula_4">𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛 ∈ 𝜌 ⋅ 𝑣 ,</formula><p>where 𝑈 is the set of indices of sub-variants equivalent by criterion <ref type="bibr" target="#b4">(5)</ref>.</p><p>As a result of the search for the "best" sub-variant, we complement the partial solution. This modifies the original problem. The number of requests is reduced, i.e. 𝑛 = 𝑛 − 1, and the number and/or length of work intervals of the teams are changed.</p><p>There are four options for modifying the system of working intervals of brigades by changing the interval in which the compromise order is placed:</p><p>1. The length of the interval 𝑟 , 𝑘 ∈ {1, … , 𝑁 } is equal to the length of the bid 𝜏 and the interval is completely excluded from consideration. At the same time, 𝑁 = 𝑁 − 1, 𝑏 = 𝑡 , where 𝑘-is the index of the compromise bid.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">𝑟</head><p>&gt; 𝜏 and the compromise application is placed at the beginning of the interval 𝜂 &gt; 𝑡 . In this case, In addition, the availability conditions are checked by comparing the number of requests accepted for execution on each day of the month 𝑧 , 𝑖 = 1, … , 𝐷, with the availability limits 𝛽 , 𝑖 = 1, … , 𝐷. If they are equal 𝑧 = 𝛽 , 𝑖 = 1, … , 𝐷, the interval system is adjusted on some days: working days of teams for which 𝑧 − 𝛽 = 0, become days off, which affects the structure of intervals.</p><formula xml:id="formula_5"> =  + 𝑡 , 𝛿 = 𝛿 − 𝑡 .</formula><p>As a result of applying the PS procedure to the original problem, a partial solution is constructed and the problem is modified. After 𝑛 is the application of the described procedure, three cases are possible:</p><p>1. The solution to the problem is found and one of the resources is completely exhausted:</p><p>∃𝑖: 𝛥𝐺 = 𝐺 , and hence, 𝐺 = 0. The method of finding the reference solution is completed.</p><p>2. The solution to the problem is found, but for ∀𝑖 = 1, … , 𝑚, 𝛥𝐺 &lt; 𝐺 ; in this case, it is necessary to reduce the total weighting of resources 𝜌 by increasing the weight of the objective function 𝜌 , taking into account the following condition:</p><p>𝜌 + 𝜌 = 1 − 𝜌 ;</p><p>(6) 3. The task is incompatible. This, in turn, is possible when:</p><p>3.1) one or more resources have been exhausted to obtain a complete solution to the problem. Therefore, the total weight of the resources 𝜌 should be increased, taking into account condition <ref type="bibr" target="#b5">(6)</ref>. This reduces the weight 𝜌 of the objective function, which could also influence the "unfavourable" placement of the suboption.</p><p>3.2) there is no valid working interval for the next order, and therefore 𝑉 ≠∅ . Such a situation is possible if the coefficient 𝜌 , which is "responsible" for the length of the order, is not large enough. In this case, orders of short length were likely prioritized and "cut" the working intervals that could accommodate orders of longer length. Such a situation can be managed by reducing the 𝜇 indicator. In this case, 𝑣 , 𝑙 = 1, … , 𝐿, remain unchanged, and 𝑣 , 𝑖 = 2, … , 𝑚 + 2, 𝑙 = 1, … , 𝐿, increase by reducing 𝜇 with unchanged weighting factors 𝜌 , 𝑖 = 1, … , 𝑚 + 2, and thus "move away" from the optima.</p><p>As a result of applying the described method, we obtain the reference solution 𝑣 = (𝑣 , … , 𝑣 ) or make sure that the initial problem is incompatible. In this case, the conditions of incompatibility are constructively formulated.</p><p>If the initial problem is admissible, you can improve the solution. To describe this method, let's introduce a definition.</p><p>Definition 7. A P-admissible sub-variant of 𝛼 ∈ 𝛼, 𝑖 = 1, … , 𝑠, is one or more bids placed in the same working interval (𝑠 is number of admissible sub-variants, 𝑃admissible placement option). Moreover, the 𝑃-valid suboption must be valid.</p><p>Definition 8. The length 𝑃-of a valid sub-variant will be the distance from the start of the first order in a fixed working interval to the end of the last order in that interval.</p><p>Definition 9. 𝑃-Valid sub-options are comparable when the sum of the order lengths of one sub-option does not exceed the length of the working interval containing the second sub-option, and vice versa.</p><p>Definition 10. 𝑃 is valid sub-option 𝛼 will be more promising than 𝑃 is valid sub-option 𝑦. If these sub-options are comparable for a fixed interval 𝑧 and 𝑓(𝛼) &gt; 𝑓(𝑦), or 𝑓(𝛼) = 𝑓(𝑦) and (𝑔(𝛼) = 𝑔(𝑦) 𝛼 dominates 𝑦 in terms of resources).</p><p>𝑓(𝛼) denotes 𝑚𝑎𝑥 ∈ 𝑓 (𝛼), where 𝑋-is the set of options for placing requests on the interval 𝑧.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Algorithm for improving the reference solution by changing its P-valid variants</head><p>The initial data for this algorithm are the data described in the problem statement, as well as the reference solution 𝑣 = (𝑣 , … , 𝑣 ), obtained as a result of the previous method and described in terms of 𝑃-admissible subvariants.</p><p>Step 0. Ordering by the quality 𝑃-of the admissible subvariants that make up the reference solution. If 𝑓(𝛼) = 𝑓(𝑦) and the vector 𝑔 (𝛼), … , 𝑔 (𝛼) are incomparable with the vector 𝑔 (𝑦), … , 𝑔 (𝑦) , then the subvariant of shorter length is considered more promising.</p><p>Step 1. The master selects 𝑃-the best quality admissible sub-variant contained in the reference solution. An attempt is made to improve it by placing it in other working intervals or by permissible permutations in its working interval.</p><p>Step 2. If the leading sub-option cannot be made more promising, the next best sub-option is considered. If no 𝑃 is valid sub-option has improved during the algorithm, the algorithm ends.</p><p>With improvement, such cases are possible: a) the application 𝛼 is "exchanged" by the working interval of placement with the application 𝑦.</p><p>b) the application 𝛼 shall be placed in the time slot previously occupied by the application 𝑦, and the application 𝑦 shall be placed in the previously free time slot. c) cyclical replacement 𝛼 → 𝑦 → 𝑧 → 𝛼,</p><p>where 𝑧-is an additional application involved in the replacement chain to generate additional solution options.</p><p>It is easy to see that all the more complex cases are reduced to the cases a)-c) described above.</p><p>If the option remains valid, its 𝑃 is valid sub-options are replaced (permuted) and the process proceeds to step 0. If the option is not valid, an attempt is made to make the permutation valid by making concessions on the suboptions found for the permutation.</p><p>At the same time, if 𝑓 𝛼 ( ) &gt; 𝑓 𝛼 ( )  or 𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) and 𝑔 𝛼 ( ) &gt; 𝑔 𝛼 ( ) , are used, the option 𝛼 ( ) , where 𝑘-is the iteration number is accepted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Algorithm for improving the reference solution by changing its P-admissible subvariants</head><p>Step 1. Search for the maximum possible length of the empty segment in the intervals that make up 𝑃-valid subvariants.</p><p>Step 2. Applications whose length does not exceed the value of the found segment are sorted in descending order.</p><p>Step 3. The applications of the found set are "tried on" to the empty segments in which they can be placed. If 𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) , the request is moved. If not, other applications are considered. If there is no improvement as a result, the option is locally optimal.</p><p>The combinatorial formulation of the problem of QMS and the sequential algorithm for its solution is a convenient tool for research, structuring the subject area and "penetration" of the user into the problem and information content of the QMS problem. At the same time, the described heuristic algorithms are an effective apparatus for finding a locally optimal solution to the problem, since they allow generating an acceptable variant of request service with its subsequent improvement and identifying incompatibilities of the problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">The task of coordinating decisions</head><p>in a three-level hierarchical system for ensuring the operation of a network of critical infrastructure facilities</p><p>In group decision-making and determining the properties of an object, there is almost always a problem reconciling assessments <ref type="bibr" target="#b33">[34,</ref><ref type="bibr" target="#b34">35]</ref>. Experts' opinions often do not coincide and must be aggregated to obtain a single conclusion <ref type="bibr" target="#b35">[36,</ref><ref type="bibr" target="#b36">37]</ref>. In some practical tasks, the definition of an aggregated (integral, resultant, etc.) solution is carried out in the form of intervals or a membership function of a fuzzy set <ref type="bibr" target="#b37">[38]</ref>.</p><p>In <ref type="bibr" target="#b38">[39]</ref>, the authors considered and studied the problem of coordinating decisions in a two-level hierarchical model for choosing the mode of operation of a communication system. Due to the urgency of the problem of critical infrastructure protection at the regional and state levels, this task was adapted to the problems of ensuring the operation of a hierarchical system of critical infrastructure facilities. The technology for coordinating decisions in a hierarchical system was improved and refined to ensure that decisions are coordinated in a three-tier hierarchical system. The interpretation of the problem area of research was also naturally adapted to the issues related to the functioning and characteristics of the critical infrastructure network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Formulation of the problem of decision coordination in a three-level hierarchical system of critical infrastructure</head><p>Let there be given a set of alternatives (objects, options, plans, projects, etc.) 𝑎 ∈ 𝐴, 𝑖 ∈ 𝐼 = {1, … , 𝑛}, each of which is characterized by 𝑚 features (attributes, characteristics, factors, etc.) 𝑎 = 𝑎 , … , 𝑎 , 𝑖 ∈ 𝐼. To build a model of a specific task, it is often necessary to determine the relative weight of characteristics and their influence on decision-making-to increase certainty and increase the structure of the subject area. Since a person in most cases is not able to adequately assign relative weights, indirect methods are a promising direction for solving the problem of determining the weighting coefficients of characteristics <ref type="bibr" target="#b39">[40,</ref><ref type="bibr" target="#b40">41]</ref>.</p><p>As a rule, there is a history of preferences between objects (alternatives, players, projects, units, etc.)-based on the results of measuring experts' preferences or any other natural information. This can be a series of tournaments or a ranking of objects, i.e. a complete preference relation.</p><p>We will assume that the topology of the set (network) of IEDs requiring regular maintenance and ensuring uninterrupted operation in the event of emergency outages or planned rolling outages is given: the number of IEDs and their geolocation coordinates on the plane. It is necessary to determine:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>A sufficient number of QMS centers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Their location (the QIS RM center can only be located in an element of the QIS network).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Provision of the CMI centers with brigades (network equipment), i.e. the optimal number of brigades in each center (we will assume that all brigades are integrated, interchangeable, and of the same type).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Distribution (division) of the network into service zones, i.e. finding the best option for clustering network elements with the identification of the element number in which the OCI MIS center is located and the number of elements served by each center.</p><p>At the same time, it is necessary to ensure the minimum cost of building the I&amp;CMS system and operating the network in three modes of operation and the maximum probability of maintaining operability for each mode while ensuring restrictions on the average recovery time of each network element. We will interpret the task in terms of a three-level hierarchical model, considering that the modes of operation of the network of elements are subsystems (SS) of the lower level, and the capital costs for the creation and maintenance of the system, operation of the I&amp;C and maintenance of crews are arguments for the quality criterion of the upper-level SS <ref type="bibr" target="#b41">[42,</ref><ref type="bibr" target="#b42">43]</ref>.</p><p>Let us consider the problem of reconciling the decisions of a certain set of PS of a hierarchical organizational system with indices 𝐼 = {0, … , 𝑀}, connected by a three-level hierarchical structure <ref type="bibr" target="#b43">[44]</ref>. We will assume that the analytical or tabular dependencies of the values of 𝑓 (𝑢), 𝑙 ∈ 𝐼, of the quality criteria of the PS on the attributes (characteristics, attributes, etc.) are known. The relationships between the criteria (also given analytically or tabularly) are denoted by 𝑀 (𝐷), 𝑙 ∈ 𝐼, where 𝐷 is the set of permissible variants of the values of the features that affect the values of the quality criteria 𝑓 (𝑢), 𝑙 ∈ 𝐼, 𝑢 ∈ 𝐷.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">A mathematical model of the problem of decision coordination in a threelevel hierarchical system</head><p>The three-tier hierarchical management system under consideration consists of:</p><p>• One top-level PS (denoted by the index 0).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>𝑛 of medium-sized substations isolated from each other with a set of indices 𝐼 = {1, … , 𝑛 }.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>𝑛 subordinate systems of the set 𝐼 of isolated lower-level substations with a set of indices 𝐼 = {𝑛 + 1, … , 𝑛 + 𝑛 }.</p><p>As a rule, the model of the hierarchical system of the above structure is built as follows.</p><p>The top-level PS 𝑆𝑆𝐻 coordinates the operation of the middle-level PS 𝑆𝑆𝑀 , 𝑖 = 1, … , 𝑛 , using control vectors 𝑢 , 𝑙 ∈ 𝐼 , whose values are determined when solving the top-level optimization problem according to the top-level optimality criterion. The control influences of each medium-level AC 𝑢 , 𝑙 ∈ 𝐼 , are determined when solving optimization problems according to the medium-level optimality criterion, taking into account the calculated control influences u l , 𝑙 ∈ 𝐼 , received from the upper-level AC. In turn, each 𝑙-and (𝑙 ∈ 𝐼 ) of the middle level coordinates the work of isolated lower level 𝑆𝑆𝐿 , 𝑖 = 𝑛 + 1, … , 𝑛 , associated with it (the set of indices of which is denoted by 𝐼 , 𝑙 ∈ 𝐼 , ∑ 𝐼 = 𝑛 . Each 𝑙 and lower level substation, taking into account the control influence of 𝑙 is the middle-level substation 𝑢 , finds its solution 𝑢 according to its optimality criterion.</p><p>A diagram of the relationships between subsystems of different levels of the three-tier hierarchical system is shown in Fig. <ref type="figure" target="#fig_3">1</ref>. </p><formula xml:id="formula_6">𝐻 𝑢 ≤ 𝐻 * ,<label>(7)</label></formula><formula xml:id="formula_7">𝑔 𝑢 ≤ 𝑢 ,<label>(8)</label></formula><formula xml:id="formula_8">𝑢 ∈ 𝑈 = 𝑈 ,<label>(9)</label></formula><p>where 𝑢 is the solution vector, the dimension of which is determined by condition <ref type="bibr" target="#b9">(10)</ref>; 𝑈 is the finite sets of possible variants 𝑗 and components of the vector 𝑢 ; 𝑓 are scalar functions; 𝐻 , 𝑔 are vector functions of a discrete argument of the corresponding dimension, specified analytically or in the form of tables, such that for each component of 𝑢 vectors 𝑢 the values of 𝑎𝑟𝑔 𝑚𝑖𝑛 max () 𝐻 , 𝑔 to 𝑢 at fixed values of other variables do not depend on the value of this component (this condition is satisfied, for example, by monotonic or separable functions); 𝐻 * -vector of given constants. Relationship (9) characterizes the own constraints of the PS, i.e. the relationship between the own parameters of the PS (𝐻 * -its resource, so condition (9) sets the law of distribution of the own resources of the PS), and relations (8) determine the relationship with the medium-level PS (i.e. the relationship between the own parameters of the PS and external influences-interpreted as the "external" resource of the PS). This is carried out with the help of control influences 𝑢 , that is determined by solving a similar problem for each 𝑙 of the medium-level PS 𝑆𝑆𝑀 , 𝑖 = 1, … , 𝑛 , 𝑓 𝑢 → 𝑚𝑖𝑛,</p><formula xml:id="formula_10">𝐻 𝑢 ≤ 𝐻 * ,<label>(11)</label></formula><p>𝑔 𝑢 ≤ 𝑢 ,</p><formula xml:id="formula_12">𝑢 ∈ 𝑈 = 𝑈 ,<label>(13)</label></formula><p>where all notations correspond to those in problems ( <ref type="formula" target="#formula_6">7</ref>)-( <ref type="formula" target="#formula_9">10</ref>), 𝑢 is control influence transmitted to 𝑙 that middlelevel PS from the upper-level PS 𝑆𝑆𝐻 . The choice of control influences 𝑢 , 𝑙 ∈ 𝐼 , in the upperlevel control system is carried out when solving the discrete optimization problem of the form</p><formula xml:id="formula_14">𝑓 (𝑢) → 𝑚𝑖𝑛,<label>(15)</label></formula><formula xml:id="formula_15">𝐻(𝑢) ≤ 𝐻 * ,<label>(16)</label></formula><formula xml:id="formula_16">𝑢 ∈ 𝑈 = 𝑈 ,<label>(17)</label></formula><p>where 𝑢 = {𝑢 , 𝑙 ∈ 𝐼 }; 𝑈 are finite sets; 𝑓 is a scalar function; 𝐻 is a vector function; 𝐻 * is a vector of constants (the requirements for 𝑓 are similar to those for problem (7)-( <ref type="formula" target="#formula_9">10</ref>)).</p><p>The variants of the values of characteristics (factors, features, attributes, etc.) that satisfy condition (8) for a particular model are set explicitly (taking into account information about the peculiarities of the functioning of 𝑙 of the PS obtained from experts or by solving auxiliary tasks of finding the quality of functioning of 𝑙 of the PS). Conditions <ref type="bibr" target="#b8">(9)</ref> in a particular model are set by tables of correspondence of variants of values of external characteristics to internal ones.</p><p>A "partial" mathematical model of the general model discussed above is presented.</p><p>We will assume that the set of possible values of characteristics U is divided into the set of 𝑈 з general characteristics, on which the quality of the system functioning as a whole depends, and 𝑈 , 𝑙 ∈ 𝐼 , the set of own characteristics of the PS, i.e., characteristics that affect only the functioning of individual PS; 𝑈 𝑢 , 𝑙, 𝑖 ∈ 𝐼, 𝑢 , 𝑙 ∈ 𝑖 ≠ 𝑗, characteristics that reflect the "vertical" links between PS of different levels.</p><p>Let us denote by 𝑈 = 𝑈 з × ∏ 𝑈 × ∏ 𝑈 , ∈ ∈ , the set of possible values of characteristics in the functioning of a hierarchical system.</p><p>Then, the partial mathematical model of the OCI CMM system is interpreted in terms of the general mathematical model as follows. The values of the criterion functions <ref type="bibr" target="#b6">(7)</ref>, <ref type="bibr" target="#b10">(11)</ref>, <ref type="bibr" target="#b14">(15)</ref> are set as a function of the given points of the corresponding hyperparallelepipeds <ref type="bibr" target="#b9">(10)</ref>, <ref type="bibr" target="#b13">(14)</ref>, <ref type="bibr" target="#b16">(17)</ref>. The constraints ( <ref type="formula" target="#formula_8">9</ref>) and ( <ref type="formula" target="#formula_12">13</ref>) are set by the tables of correspondence between the binding and own control influences. The eigenconstraints of the PS ( <ref type="formula" target="#formula_7">8</ref>), <ref type="bibr" target="#b9">(10)</ref>, and <ref type="bibr" target="#b11">(12)</ref> are given by the table dependencies on their eigenparameters.</p><p>A consistent solution of a hierarchical system is calculated as a "compromise" solution:</p><formula xml:id="formula_17">𝑢 = 𝑎𝑟𝑔 𝑚𝑖𝑛 ∈ 𝑚𝑎𝑥 ∈ 𝜌 𝜔 (𝑢),<label>(18)</label></formula><p>where 𝜔 (𝑢) = 𝜔 𝑓 (𝑢) , 𝑖 ∈ 𝐼 relative deviations from the optimums of the quality criteria for the functioning of 𝑖 th PS at the values of parameters 𝑢, 0 ≤ 𝜔 (𝑢) ≤ 1; 𝜌 is weighting coefficients of the importance of PS for achieving the goals of the entire hierarchical system. Finding the weighting coefficients is an independent task. We only note that additional restrictions may be imposed on the weighting factors, for example, ∑ 𝜌 ∈ = 𝜌 , 𝑖 ∈ 𝐼 , where 𝜌 -are the coefficients of the lower-level PS, 𝜌 -are the "weights" of the upper-level PS.</p><p>𝑈 , 𝑢 ∈ 𝑈 . In the case when the solution ( <ref type="formula" target="#formula_17">18</ref>) is not unique, an additional criterion of the form 𝑝 𝑤 (𝑢 ) → min  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Algorithm for reconciling decisions in a three-level hierarchical system</head><p>The algorithm for matching solutions of a three-level hierarchical system that models the solution of the OCI WRM problem can be described by the following sequence of steps.</p><p>Step 0. Reading the data required for the algorithm to function: variants of the values of general characteristics, variants of the values of the characteristics of the substations of all three levels. Calculate or explicitly enter the weighting coefficients of the relative importance of the PS for the functioning of the system as a whole. Calculation or specification of the optimal and worst values of the quality criteria for the functioning of all the PSs of the hierarchical system.</p><p>Step 1. Formation of sets of indices of variants of values of characteristics of those PSs that are connected by the same common characteristics. If a certain variant of the common values of characteristics is absent in a PS, then it cannot be included in the search for an agreed solution-it is concluded that it is inadmissible.</p><p>Step 2. Based on the coordinates of the network elements, distances between them are calculated to use their values in calculating the quality of the upper-level substation, which is set in an analytical form.</p><p>Step 3. Set the initial values of the trade-off 𝜔 = 1, 𝜔 = 1, where 𝜔 is the initial value of the parameter 𝑘 , 𝜔 is the initial value of the linear function of the PS criteria with the weighting coefficients set in step 0.</p><p>Step 4. A complete search of the sets of indices of variants of the values of the characteristics of the PS, connected by the same common characteristics, is organized. If the search is completed, an agreed solution is displayed, i.e., a variant of the values of the characteristics of the PS that delivers a minimum of 𝜔 and 𝜔 . This completes the algorithm.</p><p>Step 5. The value of the upper-level PS quality criterion is calculated on the next variant of the parameter values, the values of the lower-level PS criteria are searched for in the correspondence tables and these values are converted to a dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 , and 𝜔 are also calculated, respectively. If 𝜔 &gt; 𝜔 or to a dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 and 𝜔 , are also calculated, respectively. If 𝜔 &gt; 𝜔 or 𝜔 = 𝜔 , and 𝜔 &gt; 𝜔 , proceed to step 4. Otherwise, the values are reassigned to 𝜔 = 𝜔 , 𝜔 = 𝜔 . Go to step 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Prospects for further research</head><p>In further research, it is advisable to consider and improve the solution of the problem described in this paper for other classes of problems. In particular, it is promising to formalize the described problem in other classes of mathematical problems:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Determination of the collective resultant ranking of all applications <ref type="bibr" target="#b44">[45]</ref> based on individual applications received from the QIS MQM centers, i.e. formalization of the QIS system in ordinal scales.  Determination of the relative importance of individual applications <ref type="bibr" target="#b45">[46]</ref> from the QMS centers in the form of normalized weighting factors-fixed or interval.  Formalization of the relative importance of individual applications from the QIS RMA centers in the form of membership functions of a fuzzy set <ref type="bibr" target="#b46">[47]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Clustering of applications received from the CMI centers and prioritization of the response of teams to the needs of the CMI centers <ref type="bibr" target="#b47">[48]</ref>.  Building a functionally stable QMS system, i.e. ensuring redundancy in the QMS system and its reasonable use <ref type="bibr" target="#b48">[49,</ref><ref type="bibr" target="#b49">50]</ref>.  Introduction of the concept of criticality categories of CMI <ref type="bibr" target="#b50">[51]</ref> and consideration of this indicator when making decisions on the reliable and uninterrupted operation of CMI's CMM <ref type="bibr" target="#b51">[52]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>Thus, the paper considers the problems of ensuring the functioning of the critical infrastructure system. The relevance of the study is due, in particular, to the massive attacks on Ukraine's critical infrastructure during Russia's large-scale aggression since February 2024. The paper presents a mathematical model of the problem of maintenance of a system of critical infrastructure facilities developed by the authors. The authors propose a scheme for solving the problem of ensuring the operation of a system of critical infrastructure facilities. The procedures for finding a valid solution to the problem, searching for a reference solution to the problem, and algorithms for improving the reference solution in various variations are described. The problem statement and the mathematical model of decision coordination in a three-level hierarchical system for ensuring the operation of a network of critical infrastructure facilities are also presented. An algorithm for coordinating decisions in a three-level hierarchical system is developed and described.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Energy 0000-0002-0465-5018 (H. Hnatiienko); 0000-0001-8546-5074 (O. Hnatiienko); 0000-0003-1184-9483 (T. Babenko); 0000-0003-1686-261X (L. Myrutenko)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>≤ 𝐴 is the length of the request 𝑡 ; 𝑣 = 𝜔 , 𝜔 = ( ) ( ) , where 𝑠 = 𝑡 , 𝐹 (𝐹 ) = max ,…</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>and the compromise bid is placed at the end of the interval. Then  =  , 𝛿 = 𝛿 − 𝑡 . 4. 𝑟 ≥ 𝜏 and the placement of the application does not correspond to any of the three cases. This generates an additional interval with the index, i.e. 𝑑, 𝑑 = 𝑁 + 1, 𝑏 = 𝑡 , 𝛿 = 𝑡 + 𝜏 , 𝛿 = 𝜂 + 𝛿 − 𝑡 − 𝜏 − 1, and  =  , 𝛿 = 𝑡 − 𝜂 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Schematic diagram of the three-level hierarchical structure for ensuring the sustainable operation of the critical infrastructure network We will assume that the choice of control influences 𝑢 in the 𝑙 of the lower-level AC 𝑆𝑆𝐿 , 𝑖 = 𝑛 + 1, … , 𝑛 , is carried out when solving a discrete optimization problem of the form 𝑓 𝑢 → 𝑚𝑖𝑛,(7)</figDesc><graphic coords="6,74.04,75.00,446.28,179.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>∈</head><label></label><figDesc>The function of the quality of the upper-level PS functioning is calculated by the formula𝑆 = 𝐸 * ∑ 𝑆 +where 𝐸 is the coefficient related to capital expenditures; 𝑁 is the number of QMS centers (a factor whose value should be found); 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 is the capital expenditures for the establishment and operation of the 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 center (for the sake of simplicity, we assume 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for ); ∀𝑗 = 1, … , 𝑁, 𝑅 , 𝑗 = 1, … , 𝑁 is the number of service teams in the 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 center (we assume that all teams are of the same type, i.e. 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for 𝑏 ∈ 𝐵 , ∀𝑗 = 1, … , 𝑁) characteristics whose values are to be calculated; 𝑟 ∈ 𝑅 , ∀𝑗 = 1, … , 𝑁 is the composition of sets of indices of elements served by the 𝑆 center values of characteristics whose values are to be calculated; 𝑆 is operating costs to maintain the operability of the 𝑟-network element served by the 𝑆 = 𝑆 = 𝑆 (𝑆), the center of the MIS OCI.The value 𝑆 = 𝑆 = 𝑆 (𝑆), where 𝑆 is the distance between the center of the OCI RFM with the index 𝑗 and the network element to be served with the index 𝑟. The value of the distance 𝑆 is calculated by the formula 𝑆 = 𝑥 − 𝑥 + 𝑥 − 𝑥</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>where 𝑥 , 𝑥 , are the geolocation coordinates of the 𝑗 of the OCI network element on the plane (this network element may or may not contain an OCI center).The meaning of 𝑆 is calculated as follows: 𝑆 = 𝑆 + 𝑆 , where 𝑆 are the costs of CMM O&amp;M and repairs, 𝑆 are transport costs.where 𝐶 , 𝐶 are the average specific costs of restoring a network element and maintenance, respectively; 𝜏 , 𝑇 are the given constants;𝑇 БР is the average failure-free life, which is determined by the formula 𝜇 is the failure rate, 𝜇 = 1/𝑇 , 𝑇 is the average recovery time 𝑇 = 𝑇 + 𝜏 ; 𝑇 is a constant related to the restoration of operability; 𝜏 = 𝑆/𝑣 is the time spent on moving from the OCI's emergency response center to the network element,𝑣 = 𝑐𝑜𝑛𝑠𝑡 is the average speed of brigades' movement, 𝑆 is the distance between points. 𝑆 = 𝑇 • 𝐶 • (1/𝑇 БР + 1/𝑇 ) 𝑇 Е and 𝑇 are the specified constants. The values of the functionalities of the quality of operation of the lower-level substation are given in the form of a table in the form of a correspondence 𝑢 , 𝑢 ⇔ 𝑓 , 𝑞 ∈ 𝑄, 𝑗 ∈ 𝐼 , 𝑖 = 1,2,3, where 𝑢 , 𝑞 is a string of values of "connecting" ("linking") characteristics, 𝑢 , 𝑗 is a string of eigenvalues of characteristics 𝑖 of the lower-level PS, 𝐼 is a set of indices of variants of values of characteristics of the lower-level PS.</figDesc><table><row><cell>𝑇 БР = 𝑇 ⋅</cell><cell>𝜇 (𝜇 + 𝜆)</cell><cell>+ 𝜆 ⋅</cell><cell>(1 − 𝑒𝑥𝑝(−(𝜇 + 𝜆) ⋅ 𝑇 )) (𝜇 + 𝜆) ,</cell></row><row><cell cols="3">in which 𝜆 is a constant:</cell><cell></cell></row></table><note>/, 𝑆 = 𝑇 ⋅ (𝐶 ⋅ (𝑇 − 𝑇 БР ) + 𝐶 ⋅ 𝜏 )/𝑇 ,</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Protecting Europe&apos;s Critical Infrastructures: Problems and Prospects</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fritzon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Contingencies Crisis Manag</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="30" to="41" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Holistic Framework for Building Critical Infrastructure Resilience</title>
		<author>
			<persName><forename type="first">L</forename><surname>Labaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hernantes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sarriegi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technological Forecasting &amp; Social Change</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page" from="21" to="33" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Survey of Operations Research Models and Applications in Homeland Security</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">D</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Liberatore</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Nydick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Interfaces</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="514" to="529" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Risk Assessment and Resilience of Critical Communication Infrastructure in Railways</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Johnsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Veen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cognition Technology &amp; Work</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="95" to="107" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Resilience of Civil Infrastructure Systems: Literature Review for Improved asset Management</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Gay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Sinha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Critical Infrastructures</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="330" to="350" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">An Intelligent Model to Assess Information Systems Security level</title>
		<author>
			<persName><forename type="first">V</forename><surname>Hrechko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Babenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/WorldS451998.2021.9514019</idno>
	</analytic>
	<monogr>
		<title level="m">Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4)</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="128" to="133" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Spatial Exposure Aspects Contributing to Vulnerability and Resilience Assessments of Urban Critical Infrastructure in a Flood and Blackout Context</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fekete</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Tzavella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baumhauer</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11069-016-2720-3</idno>
	</analytic>
	<monogr>
		<title level="j">Natural Hazards</title>
		<imprint>
			<biblScope unit="volume">86</biblScope>
			<biblScope unit="page" from="151" to="176" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The Type-Variety Principle in Ensuring the Reliability, Safety and Resilience of Critical Infrastructures</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Zaslavskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Horbunov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Modern Optimization Methods for Decision Making under Risk and Uncertainty</title>
				<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="245" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A Framework for Assessing the Resilience of Infrastructure and Economic Systems</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Vugrin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-11405-2_3</idno>
	</analytic>
	<monogr>
		<title level="m">Sustainable &amp; Resilient Critical Infrastructure Systems</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="77" to="116" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Using Operations Research Methods for Homeland Security Problems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Herrmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Series in Operations Research &amp; Management Science</title>
		<imprint>
			<biblScope unit="volume">183</biblScope>
			<biblScope unit="page" from="1" to="24" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>Handbook of Operations Research for Homeland Security</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Strengthening Resilience in the Energy Critical Infrastructure: Methodological Overview</title>
		<author>
			<persName><forename type="first">D</forename><surname>Řehák</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Energies</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">5276</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<idno>COM/</idno>
		<title level="m">Proposal for a Directive of the European Parliament and of the Council on the Resilience of Critical Entities</title>
				<imprint>
			<publisher>European Commission</publisher>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
	<note>/829 final</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m">Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the Resilience of Critical Entities and Repealing Council Directive</title>
				<imprint>
			<date type="published" when="2008">2008/</date>
		</imprint>
	</monogr>
	<note>114/EC</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Parametric Model of a Laser with External Distributed Feedback in the System of Remote Measurement of Nanovibrations</title>
		<author>
			<persName><forename type="first">G</forename><surname>Otto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="284" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Zahynei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Cybersecurity Providing in Information and Telecommunication Systems</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3654</biblScope>
			<biblScope unit="page" from="432" to="439" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Structure of Ill Structured Problems</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Simon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="181" to="201" />
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Assessing Systems Thinking: A Tool to Measure Complex Reasoning through Ill-Structured Problems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Grohs</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.tsc.2018.03.003</idno>
	</analytic>
	<monogr>
		<title level="j">Thinking Skills and Creativity</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="110" to="130" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A Method of Indirect Determination of Intervals of Weight Coefficients of Parameters for Metricized Relations Between Objects</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Voloshin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">N</forename><surname>Gnatienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename><surname>Drobot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Automation Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Consensus Analysis for AHP Multiplicative Preference Relations based on Consistency Control: A Heuristic Approach</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Wu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.knosys.2019.105317</idno>
	</analytic>
	<monogr>
		<title level="j">Knowledge-based Systems</title>
		<imprint>
			<biblScope unit="volume">191</biblScope>
			<biblScope unit="page" from="105" to="137" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The (Logarithmic) least Squares Optimality of the Arithmetic (Geometric) Mean of Weight Vectors Calculated from All Spanning Trees for Incomplete Additive (Multiplicative) Pairwise Comparison Matrices</title>
		<author>
			<persName><forename type="first">S</forename><surname>Boz´oki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tsyganok</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. General Syst</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="362" to="381" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">On the Derivation of Weights from Incomplete Pairwise Comparisons Matrices via Spanning Trees with Crisp and Fuzzy Confidence Levels</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mazurek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kułakowski</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijar.2022.08.014</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approximate Reasoning</title>
		<imprint>
			<biblScope unit="volume">150</biblScope>
			<biblScope unit="page" from="242" to="257" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Competence Assessment as an Expert System for Human Resource Management: A Mathematical Approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bohlouli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">70</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="83" to="102" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A Posteriori Determination of Expert Competence under Uncertainty</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Snytyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the 19 th International Scientific and Practical Conference &quot;Information Technologies and Security</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="82" to="99" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Contribution of Individual Judgments Toward Inconsistency in Pairwise Comparisons</title>
		<author>
			<persName><forename type="first">S</forename><surname>Siraj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mikhailov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Keane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European J. Operational Res</title>
		<imprint>
			<biblScope unit="volume">242</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="557" to="567" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A General Formulation for Some Inconsistency Indices of Pairwise Comparisons</title>
		<author>
			<persName><forename type="first">M</forename><surname>Brunelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fedrizzi</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10479-018-2936-6</idno>
	</analytic>
	<monogr>
		<title level="j">Ann. Oper. Res</title>
		<imprint>
			<biblScope unit="volume">274</biblScope>
			<biblScope unit="page" from="155" to="169" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Methods of Considering the Subjective Character of Input Data in Voting</title>
		<author>
			<persName><forename type="first">O</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Mulesa</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2015.36699</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European J. Enterprise Technol</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="20" to="25" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m">and the Assessment of the Need to Improve Their Protection</title>
				<imprint>
			<date type="published" when="2008-12">2008. December 2008. 2008</date>
		</imprint>
	</monogr>
	<note>Council Directive</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Determining Key Risks for Modern Distributed Information Systems, II International Scientific Symposium</title>
		<author>
			<persName><forename type="first">D</forename><surname>Palko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Solutions&quot; IntSol-2021</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">3018</biblScope>
			<biblScope unit="page" from="81" to="100" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<ptr target="https://news.un.org/en/story/2023/11/1143202#:~:text=Russia%20has%20bombarded%20more%20than,country%2C%20which%20reportedly%20resulted" />
		<title level="m">Ukraine: UN Condemns Latest Wave of Russian Attacks</title>
				<imprint/>
	</monogr>
	<note>UN News Global Perspective Human Stories</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The Problem of Maintenance of a Network of Communication Elements and an Algorithm for its Solution</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Voloshin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">N</forename><surname>Gnatienko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Research of Operations and Automated Control Systems</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="99" to="105" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A Comparison of Two Methods for Determining the Weights of Belonging to Fuzzy Sets</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">T W</forename><surname>Chu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Kalaba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Spingarn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Optimization Theory Appl</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="531" to="538" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">The Analytic Hierarchy and Analytic Network Measurement Processes: The Measurement of Intangibles: Decision Making under Benefits, Opportunities, Costs and Risks, Handbook of Multicriteria Analysis</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Saaty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sodenkamp</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-92828-7_4</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Optimization</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page" from="91" to="166" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Detection of Cybersecurity Events Based on Entropy Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bigdan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7 th International Conference on Digital Technologies in Education</title>
				<meeting>the 7 th International Conference on Digital Technologies in Education<address><addrLine>DTESI</addrLine></address></meeting>
		<imprint>
			<publisher>Science and Industry</publisher>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="page">3382</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Application of Decision-Making Methods for Evaluation of Complex Information System Functioning Quality</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Hnatiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">Y</forename><surname>Snytyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">O</forename><surname>Suprun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the XVIII International Scientific and Practical Conference &quot;Information Technologies and Security</title>
				<meeting><address><addrLine>ITS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="volume">2318</biblScope>
			<biblScope unit="page" from="56" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Inconsistency Indices for Incomplete Pairwise Comparisons Matrices</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kułakowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Talaga</surname></persName>
		</author>
		<idno type="DOI">10.1080/03081079.2020.1713116</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. General Syst</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="174" to="200" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Greenhouse Gas Emission Determination Based on the Pseudo-Base Matrix Method for Environmental Pollution Quotas Between Countries Allocation Problem</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
		<idno type="DOI">10.1109/SAIC51296.2020.9239125</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 2 nd International Conference on System Analysis &amp; Intelligent Computing (SAIC)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="150" to="157" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Measuring Inconsistency and Deriving Priorities from Fuzzy Pairwise Comparison Matrices using the Knowledge-based Consistency Index</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kubler</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.knosys.2018.09.015</idno>
	</analytic>
	<monogr>
		<title level="j">Knowledge-Based Systems</title>
		<imprint>
			<biblScope unit="volume">162</biblScope>
			<biblScope unit="page" from="147" to="160" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">A Novel Machine Learning Approach to Data Inconsistency with respect to a Fuzzy Relation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Palangetić</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">A Software Complex for Supporting the Coordination of Decisions in a Two-Level Hierarchical Model for Choosing the Mode of Operation of the Communication System</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">F</forename><surname>Voloshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Gnatienko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin of the Kyiv University</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="19" to="24" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Incomplete Pairwise Comparison Matrices and Weighting Methods</title>
		<author>
			<persName><forename type="first">L</forename><surname>Csat´o</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>R´onyai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informatica</title>
		<imprint>
			<biblScope unit="volume">144</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="309" to="320" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Inferring e-Cient Weights from Pairwise Comparison Matrices</title>
		<author>
			<persName><forename type="first">R</forename><surname>Blanquero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Carrizosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Conde</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Methods of Operations Research</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="271" to="284" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Inclusive Cognitive Hierarchy</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Koriyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Ozkes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Economic Behavior Organization</title>
		<imprint>
			<biblScope unit="volume">186</biblScope>
			<biblScope unit="page" from="458" to="480" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">A Hierarchy of Mindreading Strategies in Joint Action Participation</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Landes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">D</forename><surname>Howe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kashima</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Judgment and Decision Making</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="844" to="897" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Specification of matrix algebra problems by reduction</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Byts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">'</forename></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Zulunov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Math. Sci</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="page" from="2719" to="2726" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Information Technology for Time Series Forecasting with Considering Fuzzy Expert Evaluations</title>
		<author>
			<persName><forename type="first">O</forename><surname>Mulesa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12 th International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="105" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Mathematical Support of the Task of Determining the Strategic Directions of Development and Priorities of the Organization</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9 th International Scientific Conference &quot;Information Technology and Implementation</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3347</biblScope>
			<biblScope unit="page" from="169" to="184" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Information Technology for Time Series Forecasting with Considering Fuzzy Expert Evaluations</title>
		<author>
			<persName><forename type="first">O</forename><surname>Mulesa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12 th International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="105" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Application of Cluster Analysis for Condition Assessment of Banks in Ukraine</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8 th International Scientific Conference &quot;Information Technology and Implementation</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3179</biblScope>
			<biblScope unit="page" from="112" to="121" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Modeling of Information Security System and Automated Assessment of the Integrated Quality of the Impact of Controls on the Functional Stability of the Organizational System</title>
		<author>
			<persName><forename type="first">T</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vialkova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the XX International Scientific and Practical Conference &quot;Information Technologies and Security</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="volume">2859</biblScope>
			<biblScope unit="page" from="188" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Modeling of the Integrated Quality Assessment System of the Information Security Management System</title>
		<author>
			<persName><forename type="first">T</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vialkova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7 th International Conference &quot;Information Technology and Interactions</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2845</biblScope>
			<biblScope unit="page" from="75" to="84" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Babenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Society and University Studies</title>
		<imprint>
			<biblScope unit="volume">2915</biblScope>
			<biblScope unit="page" from="92" to="101" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">A Novel Approach to Assess Resilience of Energy Systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Matzenberger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Disaster Resilience in the Built Environment</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="168" to="181" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
