<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Automated Management System</institution>
          ,
          <addr-line>Organizational Management, Adaptation, Conceptual Design</addr-line>
          ,
          <institution>System Algebra</institution>
          ,
          <addr-line>Set Degrees, Theoretical-Systemic Construct, Conceptual Scheme, Constituent, Confinement Model, Ontological Universality, Types of Structures.1</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Information Registration Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Shpaka street, bldg. 2, Kyiv, 03113</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>134</fpage>
      <lpage>145</lpage>
      <abstract>
        <p>The adaptation of automated organizational management systems (ASOM) is closely related to the concept of distributed systems. In this context, adaptation involves modifying structural relationships between information blocks, adjusting processing algorithm parameters, and incorporating reflective elements. Currently, the field of ASOM adaptation within complex distributed systems has emerged, where specialized mathematical models and methods are employed. This paper presents an analysis of the scientific and methodological framework for ASOM adaptation, including examples of successful applications of ontology synthesis and conceptual structure synthesis using degree-based structural typologies. Limitations of current approaches in addressing adaptation challenges, particularly with respect to conceptual changes, are identified. Further development directions are suggested, focusing on enhancing the scientific and methodological framework through tensor transformations in electrical multicoil networks.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>System
The emergence of new means and methods of their</p>
      <p>application
Designed automated organizational management system</p>
      <p>System model
Description of
functioning</p>
      <p>and
management
processes</p>
      <p>Logical
database
model</p>
      <p>Source data system (axioms</p>
      <p>of management)
System of information
processing procedures
The problem is that: introducing new settings or changing software
leads to conflict situations. It is easier to develop a new automated
control system than to adapt its current version.
Such adaptation ideally should occur without a complete redesign or the need for new automation
tools, instead relying on transformative procedures that require minimal time and resources.
Therefore, when designing new ASOM, it is advisable to integrate adaptability features, preferably in
an automated manner.</p>
      <p>To address ASOM adaptation, several key research directions should be emphasized. The
organization management process operates in three modes (Figure 2):</p>
    </sec>
    <sec id="sec-2">
      <title>Planning or Programming Mode: Focused on preparing for future operations. Adjustment Mode: Modifies a pre-existing plan during its execution (targeted</title>
    </sec>
    <sec id="sec-3">
      <title>Operational Management Mode: Manages ongoing operations in real-time.</title>
      <p>The problem of adaptation of AOMS to
conceptual changes in management</p>
      <p>processes
Adjustment Mode (target
management):</p>
      <p>1) transformation of the area
of controlled parameters;</p>
      <p>2) changing the boundaries
and dimensions of the zones of
permissible and
boundaryachievable parameters.</p>
      <p>Operational Management
Mode:</p>
      <p>1) adaptation of algorithms
for restoring the current state of
the system in relation to current
management criteria;</p>
      <p>2) adaptation of algorithms
for diagnosing functional
deviations, risks, threats, etc.



management).</p>
      <p>Planning or Programming
Mode:</p>
      <p>1) adaptation of the control
object model (structure and
behavior);</p>
      <p>2) adaptation of algorithms
for predicting the state of the
system under given control and
conditions;</p>
      <p>3) adaptation of algorithms
for selecting optimal control for a
given terminal state of the
system.</p>
      <p>Achieving ASOM adaptation to a new management concept during the planning mode requires
mechanisms that transform:
1. Management Object Model: Restructures the management process to align with a new
conceptual framework, including functional relationships and responses to external influences.
2. Prediction Algorithms: Adjusts ASOM software to predict the system's state under the new
management model and external conditions.
3. Optimal Management Algorithms: Updates decision-support algorithms to plan for the
organization’s functioning under the modified model and performance criteria.
For the adjustment mode of previously created plans, transformation mechanisms include:
1. Controlled Parameter Areas: Expands the parameters, dimensionality, and structure of
inter-parameter relationships.
2. Acceptable and Limit-Reachable States: Adapts criteria for achieving established goals.</p>
    </sec>
    <sec id="sec-4">
      <title>For operational management, transformation mechanisms involve:</title>
      <p>1. Current State Algorithms: Reflects observed parameters in the cognitive model of the
management process.</p>
    </sec>
    <sec id="sec-5">
      <title>2. Diagnostic Algorithms: Identifies functional deviations, risks, etc.</title>
      <p>3. Decision Support Algorithms: Provides real-time support for current management
decisions.</p>
      <p>This detailed breakdown of the adaptation problem highlights the importance of developing
mathematical and software solutions for ASOM. Targeted research in these areas will lay the
theoretical groundwork for adaptive ASOM development. Some scientific advancements have already
been made in synthesizing structures with defined properties and in the conceptual design of complex
systems.
2. Mathematical Models and Methods for Constructing Adaptive</p>
      <sec id="sec-5-1">
        <title>ASOM</title>
        <p>
          In constructing adaptive Automated Systems of Organizational Management (ASOM), two primary
approaches, closely linked through ontology application, can be identified (Figure 3):
 System Algebra Framework: Utilizes Boolean functions, predicate calculus, and logical
inference [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
 Set Degree or Structure Type Framework: Also known as conceptual design [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], this
approach relies on degrees or types of structures [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>The system algebra framework combines mathematical logic with algebraic structures, such as
groups and rings, which serve as models for processes, and lattices, which model structural
relationships. The set degree framework similarly employs algebra but focuses on set degree
formation and logical procedures. Together, these approaches support the development of adaptive
mechanisms for systems, with multiple successful implementations already demonstrated.</p>
        <sec id="sec-5-1-1">
          <title>2.1. Confinement Models</title>
          <p>
            As proposed in [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ], confinement models (CM) provide a structured approach to building
ontologies, allowing a systemic-cognitive method that remains impartial to individual researchers'
modeling techniques. Using CMs, original ontologies are constructed based on ontological universals,
which model relational systems across various subject areas.
System algebra apparatus
|
|
|
Mathematical logic |
(Boolean functions, |
predicate evaluation, |
logical inference).
          </p>
          <p>Algebra, algebraic
structures (groups,</p>
          <p>rings, lattices).
|
|
|
|</p>
          <p>Apparatus of stages of sets
(kinds of structures).</p>
          <p>Conceptual design.</p>
          <p>Ontological approach</p>
          <p>The following types of confinement models are identified (Figure 4):
 Conceptual CM (CCM): Connects elements through "causes/depends on" relationships,
with a specific case being the triadic CM (TCM) (Figure 4a).</p>
          <p>8
9
8
7
1</p>
          <p>Is a part
7
6
9
5
6
1
4
a
2
c
2
3
4
5
3
7
9
8</p>
          <p>Is
8
9
6
1
5
b
7
d
Has the
property</p>
          <p>2
6
4
1
3
4
2
5
3</p>
          <p>Through CMs, knowledge structuring can be achieved using interrelated cognitive models of a
specialized kind, setting a standard for ontology detailing by various researchers. This approach
facilitates the development of formal methods for operating and transforming ontology structures.</p>
        </sec>
        <sec id="sec-5-1-2">
          <title>2.2. Automatic Adaptation of Information Processing Algorithms</title>
          <p>
            In [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], ontological task models are proposed for developing software systems capable of adapting
to changes in a given domain. Here, a “task” in the task ontology refers to a structured problem
situation defined by specific conditions and goals (criteria). The domain ontology represents the
management process as a series of elementary tasks. A formal ontological model is constructed using
system algebra [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ], and practical algorithms for transforming task ontologies are implemented in the
CLEPE environment (Conceptual Level Programming Environment), adhering to principles of
conceptual modeling [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>In the modeling system, knowledge is formally represented as follows:</title>
    </sec>
    <sec id="sec-7">
      <title>The domain consists of a set of objects</title>
      <p>,  , … ,  ,
where each object is classified as an instance of a corresponding concept. These object sets serve as
the basis for n many-sorted algebras.</p>
      <p>Each set  , defines an abstract data type:
= (</p>
      <p>, Σ,  ),
where</p>
      <p>denotes the type name (e.g., circle); Σ is the signature of the many-sorted algebra (circle
parameters like center coordinates, radius);</p>
      <p>is the defining relations of the type (circle equations).</p>
    </sec>
    <sec id="sec-8">
      <title>An algebraic domain set is formed by types</title>
    </sec>
    <sec id="sec-9">
      <title>Additional domains are defined as follows:</title>
      <p>= ( , … ,  , … ,  ).</p>
    </sec>
    <sec id="sec-10">
      <title>Attribute Domain,  , defined as key-value pairs:</title>
      <p></p>
    </sec>
    <sec id="sec-11">
      <title>Hierarchical CM (HCM): Includes various forms:</title>
      <p></p>
      <p>Process CM (PKM): Structures processes by identifying life cycle stages with "is
of" relationships.</p>
      <p>property."
input/output for" relationships.</p>
      <p>o
o
o</p>
    </sec>
    <sec id="sec-12">
      <title>Hypernymic (HCM) (Figure 4b): Classifies concepts using hierarchical genus</title>
      <p>species relations, expressed as "is."
Meronymic (MKM) (Figure 4c): Analyzes subsystems systematically with "is part
Attributive (AKM) (Figure 4d): Classifies properties using the relation "has a
(1)
(2)
where 
is the attribute identifier (for example, "x"); 
- its value (real number). Operations
such as merge, substitute, delete, and interpret (merge, substitute, delete, enterp) are defined for
this domain. In addition to these operations, various functions are defined, for example, the value
selection function of the domain:</p>
    </sec>
    <sec id="sec-13">
      <title>Boolean Domain,  , contains expressions yielding Boolean values {</title>
      <p>, 
} with
variables from other domains. It includes Boolean operations "AND," "OR," "otherwise" and
simplifies conditions via the interpretation operation (=). 
elements are constraints (conditions).</p>
      <p>Entity Domain with Attributes,  , represented by tuples
{
,</p>
      <p>} ,
( , 
) →</p>
      <p>;
 ,  ,  ∗ ,
where for each i there is only one j, that forms an element of the T:</p>
      <p>∀ ∃  :  ,  ,
each condition (constraint) belonging to the subset  ∗, is an expression with operands belonging
to the domain  . Operations on elements of this domain are the union or division (merge, split)
of entities. The union operation is interpreted as the synthesis of a new entity with a compatible
set of properties and constraints (conditions) of operand entities. The division operation is the
reverse. Instances of the domain of entities with attributes are tuples of corresponding facts;
 Relation Domain, RI, on structures:</p>
      <p>, × … ×  , ,  ,  ∗ ,
where  , × … ×  , is a Cartesian product of algebraic data types from the  domain (attribute
space related to the i-th structure);  - types of relation attributes;  ∗ - constraints (conditions)
defining the relation. Operations such as union, separation, substitution (merge, split, substitute)
are performed on relations.</p>
      <p>The ontology itself is a tuple of concept domains with attributes, relations, and constraints:
 = ( ,  ,  ∗). (3)</p>
    </sec>
    <sec id="sec-14">
      <title>The problem’s ontological model is described by the tuple:</title>
      <p>= 〈 ,  ∗ ,  ∗ 〉 , (4)
where  is the problem ontology according to the construction rules (3);  ∗ is the task
ontology;  ∗ is the set of additional constraints (conditions). Each action is an entity within the 
domain, serving as a command to external services or other ontological models. Parameters are
attributes from  or constants.</p>
      <p>The transformation of algorithms depending on changes in conditions and constraints is carried
out using the parameter initialization function (InstPar), which is given as a set of mappings between
the action attribute and the attribute values of entities and relations in the ontology model:
 :  , ,  , →   , ,  , , (5)
 , ∈  ,  , ∈  ∈  ,
where  is the ontological model of the considered task;  is the task’s ontology.</p>
      <p>
        The software system based on the ontological model of tasks is presented in Figure 5 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Knowledge base
Semantic interpretation of facts.</p>
      <p>Ontology</p>
      <p>Fact base
Establishing the
fact of the process.</p>
      <p>Extensions to
the description
of ontology
classes and
relations.</p>
      <p>Description
of models
using
ontology.</p>
      <p>Web sites
Document
repositories</p>
      <p>Log files
Database</p>
      <p>Web
services</p>
      <p>Simulation system</p>
      <p>Services and
modeling systems</p>
      <p>Model execution</p>
      <p>manager</p>
      <p>Information
service provider
Model interaction
broker</p>
      <p>Interpreting facts, solving
tasks, establishing</p>
      <p>relationships.</p>
      <p>Requests to the provider during</p>
      <p>model execution.</p>
      <p>Semantic interpretation of events.</p>
      <p>Events</p>
      <p>Models
Using operations
by calling external
services.</p>
      <p>External
services</p>
      <p>The management process in the intelligent control system generates events, which are interpreted
using the ontology of the corresponding subject area. Based on the interpretation of the event, models
and algorithms necessary for implementing the computational process for management in current
conditions are activated. Using the ontology of models and algorithms, a new computation schedule
is created. The synthesis of the schedule is carried out using the apparatus of mathematical logic
(logical inference).</p>
      <p>
        Depending on the context of the occurring events, either one or another ontological model is
activated. The initiator of activation is the ontological model being executed (Figure 6) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Activator model
Activated model
Defining
the Goal</p>
      <p>Initializing the
General Model</p>
      <p>Model
selection</p>
      <p>Initialization
Identifying
Relevant
Models</p>
      <p>Context</p>
      <p>Execution in a specific context.</p>
      <p>This framework also supports the creation of new ontologies. This involves the following steps:
1. Analyzing the problem and identifying relevant entities, relations, constraints, and
operations.
2. Constructing the ontological model using available components, supplemented with any
newly identified elements.</p>
    </sec>
    <sec id="sec-15">
      <title>3. Validating the updated ontology and resolving contradictions.</title>
      <p>The ontology-based tool for building software systems offers functionalities including:
 Ontology Operations: Creation and modification of ontology classes, relationships, and
attribute constraints.
 Fact Operations: Creation and modification of individual facts, constraint verification, and
fact validation.
 Ontological Model Management: Creation and editing of models using classes and facts,
defining constraints, operations, and service links.
 Execution of Models: Testing models on a factual base and verifying outcomes.</p>
      <p>The system is implemented in Python with PyQt for its graphical interface, and includes
components such as an ontology editor, fact editor, model editor, and simulation programs. Future
development will focus on expanding model interactions, implementing logical inference, enabling
multi-variant computations, and addressing contextual dependencies.</p>
      <p>2.3. Deployment of Security Domain Ontology Based on Conceptual Schemes
of Abstract Security Relations</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a methodology is outlined for modeling the "security" domain using conceptual analysis
and design, specifically focusing on a mixed inter-subjective and subject-object security relation
derived from an abstract security structure. This approach is based on several key postulates for
security relations [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
 There exists a world of possibilities.
 A possibility can be actualized and then ceases to be a possibility.
 An element of the world of possibilities is the possibility of realizing one or another event.
 Possibilities can be connected by a "genetic" relation (the realization of one or several
possibilities is a necessary condition for the realization of another possibility).
 Possibilities can be linked by a blocking relation (if a blocking possibility is realized, a blocked
possibility cannot be realized).
 Possibilities are attributes of subjects and objects in the "real world" that realize these
possibilities.
 There exists a world of subjects.
 Subjects have interests.
 The interests of different subjects can enter into relations.
 Relations between subjects occur only through their interests.
      </p>
    </sec>
    <sec id="sec-16">
      <title>In the world of possibilities, complex network structures with cycles can emerge.</title>
      <p>A subject's interests nominally constitute a subset of its possibilities (the subject is interested in
realizing these possibilities).</p>
      <p>Any possibility that blocks possibilities from the subject's area of interest represents a threat to
the subject's interests.</p>
    </sec>
    <sec id="sec-17">
      <title>A possibility that blocks a threat is a security measure concerning that threat.</title>
      <p>An action to realize a possibility is a possibility that is formative for the subject related to that
possibility.</p>
      <p>Since threats and actions regarding the realization of possibilities can also define threats and
measures, it can be said that there are first, second, third, etc., order threats and measures.</p>
      <p>The ontology construction process involves iteratively breaking down the factors in a
structuretree format within this set of possibilities. This breakdown involves:
 Concept Elaboration: Specification and detailing of initial concepts.
 Inter-branch Relations: Formation of relations between ontology branches by integrating
hierarchical levels and factor-based relationships.</p>
      <p>
        Using conceptual schemes of abstract security relation structures [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the ontology's
factorstructure is built, including types like:
 Abstract Security Relations: Basic interconnections and constraints among possibilities.
 Hierarchical Subject-transforming Security Relations: Transformational security
relationships at different subject levels.
 Polysubjective Security Management: Relations involving multiple subjects managing
shared security interests.
 Danger Propagation: Mechanisms for identifying and propagating security threats across
the structure.
      </p>
    </sec>
    <sec id="sec-18">
      <title>A fragment of Security Structure Types is provided in Table 1.</title>
      <p>Relationship of genetic connection of
possibilities or set of pairs: possibility
possibility, which proves to be a
necessary condition for the realization
of the considered possibility.
of
 1.2
 1.0
 1.1
 1.2
⋮
( ⊂  1.0)&amp;( ⊂  ) ⇒ ( ⊂
 1.1) ∨ ( ⊂  1.2) ⇒: ( = ∅)
¬
(
(
(
 ∈ ℬ( 1 ×  1) &amp;
∈  ) ⊃ ( ⊂  1.1) &amp;
∈ Pr  )&amp;( ∈ Pr  )&amp;
(Pr  \ = Pr  \ ) ⇒
 ∈ ℬ( 1 ×  1)&amp;(
∈  )
⇒
( ⊂  1.2)&amp;(
∈ Pr  )&amp;(Pr  \
⋮
∈ Pr  )&amp;
= Pr  \ )</p>
    </sec>
    <sec id="sec-19">
      <title>Relationship of blocking connection of possibilities or set of pairs: possibility possibility that blocks the considered possibility.</title>
    </sec>
    <sec id="sec-20">
      <title>Axiom. Relations of genetic, blocking, as well as mixed genetic and blocking connection of possibilities do not allow cycles and loops.</title>
    </sec>
    <sec id="sec-21">
      <title>Axiom. Possibilities connected by a genetic relationship cannot be connected by a blocking relationship, and vice versa.</title>
      <p>⋮
{ ⊂ ℬ( 1 ×  1)|Pr  = Pr  }</p>
    </sec>
    <sec id="sec-22">
      <title>Set of cycles of possibilities.</title>
      <p>
        Constituents presented in Table 1 are types of abstract security relation structures synthesized
using formal rules of transforming text structure when applying set degree formation operations [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The handbook of theoretical constructs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] based on this procedure contains over 200 system
classes, covering both static systems (fixed relations) and dynamic (degrading) systems, facilitating a
deductive approach to security management system design—from abstract principles to concrete
applications. A key challenge remains in interpreting high-degree set constituents, which, due to their
complexity, require specialized tools for practical use.
3. Development of Adaptation Methods and Models for ASOM
      </p>
      <sec id="sec-22-1">
        <title>3.1. Current Challenges in Adaptation</title>
        <p>The scientific results presented are an example of a fairly successful solution to the problem of
adapting ASOM. However, it cannot be claimed that the problem is fully solved. There are limitations
and drawbacks to the methods that do not allow concluding the completion of creating a conceptual
transformation apparatus for management systems.</p>
        <p>Therefore, when adapting the computational procedures' regulations (see section Помилка!
Джерело посилання не знайдено.), the ontology of models and algorithms is used, which is
preformed and entered into the knowledge base. The task of expanding and developing the ontology
based on the interpretation of facts and events remains unresolved. This leads to the need, once again,
to create a new version of the mathematical and software when there are conceptual changes in the
management process for which the ASOM is created. The adaptation or "learning" of ASOM under a
new management concept has not yet been implemented.</p>
        <p>
          For the method of using conceptual schemes of structure types (see section Помилка! Джерело
посилання не знайдено.), the bottleneck is the interpretation of the created abstract schemes. For
higher set degrees (which are significant in practice), the generated constituents are expressions with
a very large dimension. Their size exceeds human capabilities to operate with data blocks. In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], to
overcome this difficulty, it is suggested to create a special language for the formalized description and
representation of set degrees. In both cases, the essence of the difficulties hindering the
implementation of ASOM adaptation lies in creating a method and corresponding software for
synthesizing structures with specified properties.
        </p>
      </sec>
      <sec id="sec-22-2">
        <title>3.2. Proposed Solutions to Adaptation Challenges</title>
        <p>
          As a method for synthesizing new structures, tensor transformation of networks developed by
Gabriel Kron [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] can be used. Kron proposed a methodology for the theoretical-set and algebraic
synthesis of topologies in the form of the analysis method and tensor transformation of electrical
networks.
        </p>
        <p>An electrical network is convenient for a formalized description of structural connections of
various kinds. Unlike other types of non-electric networks, an electrical network is always
surrounded by a dynamic electromagnetic field created by itself, extending to infinity in all directions.
By using the model of induction and self-induction in the branches of an electrical network, it is
convenient to describe various intra-system connections between elements of the analyzed structure
(organizational topology).</p>
        <p>
          If we interpret the organizational-functional structure in the form of a multi-coil electrical
network, tensor synthesis of Kron [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] can be used to synthesize a structure with specified properties.
        </p>
      </sec>
    </sec>
    <sec id="sec-23">
      <title>The synthesis tensor is defined as follows:</title>
      <p>For an existing multi-coil electrical network, there is a connection tensor 
or in other words, a
primitive network transformation tensor. A primitive network is a set of node pairs (an electric coil
with an input and output point) and elementary circuits that form a specific network but are not
connected to each other. The transformation tensor 
is such that the corresponding electrical
network functions in a defined manner:</p>
      <p>( ,  ,  ) = 0 ,
where  is the impedance tensor (electrical resistances of node pairs and network circuits, taking
into account the resistance of inductance and self-induction in mutual influence of coils),
 is the current tensor;</p>
      <p>is the voltage tensor;
 ( ,  ,  ) = 0 is the formalized representation of the network's behavior.</p>
    </sec>
    <sec id="sec-24">
      <title>The impedance tensor of the output network</title>
      <p>
        is derived from the impedance tensor of the
primitive network  ′ using the transformation tensor ( ) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]:
      </p>
      <p>The synthesis tensor</p>
      <p>is derived to transform the impedance tensor of the output network 
into the impedance tensor of another network  , without changing the network's behavior:


= ( )  ′  .
= (</p>
      <p>)   ,
 ( ,  ,  ) =  ( ,  ,  ) = 0 ,
where ( ) is the transposed synthesis tensor  .</p>
    </sec>
    <sec id="sec-25">
      <title>The method of deriving the synthesis tensor</title>
      <p>
        depends on the form of the formalized description
of the system behavior  ( ,  ,  ). The result of this derivation is a compound tensor (a tensor whose
elements are also tensors) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], a method for the formalized representation of conditions for computing regulations based
on the transformation of a multi-coil network is provided. The condition is expressed as the equality
of zero currents in intermediate node pairs of the network. Intermediate node pairs are interpreted as
a group of parameters not determined in the process of computations. Using the synthesis tensor, a
variety of electrical networks satisfying the formalized description of the system behavior  ( ,  ,  )
{ ,  ,  } ∈ Ω ,
where Ω
      </p>
      <p>– is the set of electrical networks obtained by transforming from the output network
{ ,  ,  } using the synthesis tensor  , determined based on the formalized condition (6).
(6)
(7)
(8)
(9)</p>
      <p>The choice of a specific network { ,  ,  }∗ from the variety Ω is made using an established
criterion  :</p>
      <p>{ , , }∗ ≻ ⋯ ≻  { , , } ≻ ⋯ ≻  { , , } , (10)
where  is the number of alternative electrical networks forming the set Ω .</p>
      <p>Thus, solving the problem of synthesizing structures with specified properties and addressing the
adaptation problem of ASOM to conceptual changes in the control process can be implemented by
introducing the following intermediate scheme (Figure 7).</p>
      <p>Determination of the synthesis
tensor from the conditions</p>
      <p>defining the domain of
existence of the transformed</p>
      <p>network.</p>
      <p>Procedure for
transforming a</p>
      <p>conceptual
diagram using
the Kron network
synthesis tensor</p>
      <p>A new conceptual
diagram that meets
the selection
criterion
Conceptual
diagram 1</p>
      <p>Conceptual ...</p>
      <p>diagram 2
Bank of interpreted
conceptual diagrams
for specific systems</p>
      <p>This scheme involves using a pre-interpreted bank of conceptual schemes for specific systems.
Conceptual schemes are presented as multi-coil electrical networks with a corresponding formalized
description of the desired behavior. In other words, defining the boundaries of the region of
permissible state parameters or the existence area of the system.</p>
      <p>In case of changes in the control loop that cannot be adapted by adjusting parameters within the
existing control structure:
 the conceptual schema that is relevant to the initial state of the ASOM is retrieved from the
database. Each conceptual schema has a formalized representation of its domain of existence and
a pre-formed synthesis tensor to determine alternative schemes within that domain;
 using the synthesis tensor, a transformation of the original conceptual schema results in a set
of alternative conceptual schemes;
 a criterion for establishing preference is formulated for comparing these alternative
conceptual schemes;
 the criterion previously established is used to determine and choose a new conceptual scheme
that best meets the needs of adapting the ASOM to the changes that have occurred in the
management process.</p>
      <p>Therefore, to address the adaptation problem in this context, progress should be made in the
following directions: creating a database of pre-interpreted conceptual schemes for specific systems
in relevant subject areas; developing a procedure for transforming conceptual schemes based on the
use of the tensor transformation procedure for electrical networks.</p>
      <sec id="sec-25-1">
        <title>Acknowledgements</title>
        <p>Methods and models designed to solve adaptation and self-organization problems of Automated
Control Systems (ACS) belong to the field of conceptual ontology design and transformation.</p>
      </sec>
    </sec>
    <sec id="sec-26">
      <title>There are examples of developing adaptation models based on the application of: 144</title>
      <p> confinement models for ontological networks;
 algebraic systems apparatus;
 set theory apparatus of N. Bourbaki.</p>
      <p>The main practical challenge in implementing these approaches is the issue of dimensionality. To
construct adaptive control systems with complexity corresponding to real processes, the problem of
creating a specialized language for interpreting (representing) the results of conceptual design needs
to be addressed.</p>
      <p>As an intermediate step in solving the adaptation problem, it is advisable to address the design
task by transforming previously created conceptual schemes of specific systems.</p>
    </sec>
    <sec id="sec-27">
      <title>The primary tasks for implementing this approach include:</title>
      <p> creating and accumulating a database (bank) of pre-interpreted conceptual schemes for
specific systems;
 developing a procedure for transforming conceptual schemes based on the use of the tensor
transformation procedure for electrical networks.</p>
      <sec id="sec-27-1">
        <title>References</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Koo</surname>
          </string-name>
          , W. Simmons,
          <article-title>Algebra of systems: a metalanguage for model synthesis and evaluation</article-title>
          ,
          <source>IEEE Transactions on systems, man and cybernetics</source>
          (
          <year>2009</year>
          ) - Vol.
          <volume>39</volume>
          ,
          <string-name>
            <given-names>N</given-names>
            <surname>3</surname>
          </string-name>
          . - P.
          <fpage>501</fpage>
          -
          <lpage>513</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Bourbaki</surname>
          </string-name>
          , Eléments de Mathématique. XX.
          <article-title>Première partie</article-title>
          . Les structures fondamentales de l'
          <source>Analyse. Livre I Théorie des Ensembles</source>
          .
          <source>Hermann et Cie</source>
          , Paris,
          <year>1956</year>
          . Première édition. 118 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Yevgeniy</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Burov</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Conceptual Modeling of Intelligent Software Systems," Lviv: Lviv Polytechnic Publishing House</source>
          ,
          <year>2012</year>
          . - 432 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.N.</given-names>
            <surname>Mukhacheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <article-title>Ontologicheskie modeli i metody dlya upravleniya informatsionnointellektualnymi resursami organizatsii [Ontological models and methods for managing information and intellectual resources of an organization]</article-title>
          .
          <source>Vestnik UGATU - Bulletin of USATU</source>
          ,
          <volume>14</volume>
          ,
          <issue>1</issue>
          (
          <issue>36</issue>
          ),
          <year>2011</year>
          , p.
          <fpage>123</fpage>
          -
          <lpage>135</lpage>
          . URL: https://cyberleninka.ru/article/n/ontologicheskie
          <article-title>-modeli-i-metody-dlyaupravleniyainformatsionno-intellektualnymi-resursami-organizatsii</article-title>
          .pd
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Yevgeniy</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Burov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Volodymyr</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Pasichnyk</surname>
          </string-name>
          ,
          <article-title>"Software Systems Based on Ontological Models of Problems," Bulletin of the National University "Lviv Polytechnic"</article-title>
          .
          <source>Series: Information Systems and Networks: collection of scientific works. - 2015</source>
          . - No.
          <year>829</year>
          . - P.
          <fpage>36</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Nikanorov</surname>
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vybornov</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanov</surname>
            <given-names>A.Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korshikov</surname>
            <given-names>S.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostyuk</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Kuchkarov Z.A.</given-names>
            ,
            <surname>Mikheev</surname>
          </string-name>
          <string-name>
            <given-names>V.V.</given-names>
            ,
            <surname>Shalyapina S</surname>
          </string-name>
          .K. Safety research. Ed.
          <string-name>
            <given-names>S.P.</given-names>
            <surname>Nikanorova</surname>
          </string-name>
          . / Concept, -
          <year>2006</year>
          .
          <article-title>- 624 р</article-title>
          . https://vestnik.asomio.msu.ru › issue › download
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Nikitina</surname>
            <given-names>N.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Postnikov</surname>
            <given-names>V.V.</given-names>
          </string-name>
          <article-title>Development of a language for gender-structural explication of subject areas. / Development and conceptual design of intelligent systems: Sat. abstracts of reports and messages</article-title>
          .
          <source>Part 1</source>
          .
          <year>1990</year>
          . - pp.
          <fpage>70</fpage>
          -
          <lpage>73</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ivanov</surname>
            <given-names>A.Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nikanorov</surname>
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garayeva</surname>
            <given-names>Yu.R.</given-names>
          </string-name>
          <article-title>Handbook of system-theoretic constructs</article-title>
          .
          <source>Series "Conceptual Analysis and Design" Methodology and technology. - Concept</source>
          , -
          <year>2008</year>
          . - 314 p.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kron</surname>
            <given-names>G.</given-names>
          </string-name>
          <article-title>Tensor analysis of networks</article-title>
          . John Wiley and sons, inc. London: Capman and Hall, Limited. New York. - 1966. - 720 p.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Dodonov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Oleksii</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Nikiforov</surname>
          </string-name>
          , Volodymyr G. Putiatin,
          <article-title>"Implementation of Decision-Making in Organizational Management Based on the Ontology of Activity,"</article-title>
          <source>Mathematical Machines and Systems, No. 1</source>
          ,
          <string-name>
            <surname>Kyiv</surname>
            ,
            <given-names>IPMMS NASU</given-names>
          </string-name>
          (
          <year>2022</year>
          ). ISSN 1028-9763 - P.
          <fpage>32</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>