<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vadym</forename><surname>Mukhin</surname></persName>
							<email>v.mukhin@kpi.ua</email>
						</author>
						<author>
							<persName><forename type="first">Valerii</forename><surname>Zavgorodnii</surname></persName>
							<email>zavgorodniivalerii@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Anna</forename><surname>Zavgorodnya</surname></persName>
							<email>annzavgorodnya@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Yarovyi</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Lesia</forename><surname>Baranovska</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Oleg</forename><surname>Mukhin</surname></persName>
							<email>o.mukhin01@gmail.com</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>37, Prospect Beresteiskyi</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Information Technologies and Security</orgName>
								<address>
									<addrLine>November 30</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">4DF8594CF92CD6A183027B8FAD462939</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Mobile agent, network-centric control, dynamic environment, neural networks, simulation model 1 O. Mukhin) 0000-0002-1206-9131 (V. Mukhin)</term>
					<term>0000-0002-8347-7183 (V. Zavgorodnii)</term>
					<term>0000-0001-8523-1761 (A. Zavgorodnya)</term>
					<term>0000-0002-3889-5730 (O. Yarovyi)</term>
					<term>0000-0003-0024-8180 (L. Baranovska)</term>
					<term>0009-0005-5301-8276 (O. Mukhin)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper examines the network-centric approach for enhancing the efficiency of mobile agent control. The primary distinction of this approach is the use of a "wandering center." If communication with the active center is lost, a new center is appointed to continue control, ensuring the system's survivability and improving the overall efficiency of mobile agent management. An experimental study was conducted to evaluate the parameters and effectiveness of network-centric control of mobile agents. The study utilized a developed model of mobile agent interaction based on networkcentric control, along with a simulation model of agent behavior in a dynamic environment. Additionally, a neural network was created that accurately predicts the probability of hitting the target (%) under changing dynamics. The use of this neural network also helped identify input parameters with minimal impact on the outcome.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today, most existing mobile agents are controlled manually using remote controls that operate on radio channels. However, this manual control poses several challenges, including the need for specialized operator training, limited operational range, and dependency on weather conditions <ref type="bibr">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>A mobile agent can be a software or hardware entity capable of performing various tasks within a network or on a device, such as carrying information, conducting computations, and interacting with other agents or the environment <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>Controlling mobile agents requires qualified specialists. For example, in the U.S. military, experienced Air Force pilots undergo a full year of training to become proficient mobile agent operators -a task that, in some cases, can be more demanding than piloting an aircraft. Operator errors and mechanical failures account for most mobile agent accidents <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>.</p><p>A new technological trend involves the development of mobile agents equipped with an even number of rotors that rotate diagonally in opposite directions. Mobile agents are just one component within a complex, multi-functional system <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Unlike manned aircraft, operating mobile agents requires additional support system components, including the agent itself, the operator's workstation, software, data lines, and other elements necessary to achieve mission objectives. Current development trends favor compact mobile agents, with a focus on simplicity of control, reliability, and maneuverability <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>.</p><p>In model aviation and professional applications such as the civil sector, agriculture, military, law enforcement, and other fields, mobile agents are in high demand. Selecting the optimal models and control systems is crucial for effectively monitoring ground-based targets <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>Thus, pilotless mobile agents present a more efficient and economical alternative to manned aircraft for many tasks <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b14">[14]</ref><ref type="bibr" target="#b15">[15]</ref>.</p><p>The main challenge in controlling mobile agents lies in the reliance on centralized control systems, where the control center serves as a vulnerable element; if communication with it is lost, further control becomes impossible. In contrast, decentralized control faces issues with coordinating and circulating large volumes of information, leading to slower response times. A promising alternative is a network-centric approach, which allows control to be transferred to an alternative center when needed <ref type="bibr" target="#b16">[16]</ref><ref type="bibr" target="#b18">[17]</ref><ref type="bibr" target="#b19">[18]</ref>.</p><p>An analysis of recent scientific literature reveals that, although modern information technologies have advanced considerably, the network-centric approach to control remains underdeveloped compared to centralized and decentralized methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">A network-centric approach to enhancing the efficiency of mobile agent control systems</head><p>Three main approaches to the control of mobile agents can be identified: centralized, decentralized, and network-centric. In centralized control, a single command center issues control signals to all mobile agents. If this center is disabled or compromised, all mobile agents lose connectivity and cannot be controlled. Decentralized control, while reducing dependence on a single command point, has the drawback of coordination challenges. For example, if mobile agents need to rapidly reconfigure, a large amount of information must be transmitted to them, significantly reducing the overall speed of the control system <ref type="bibr" target="#b20">[19,</ref><ref type="bibr" target="#b21">20]</ref>.</p><p>The network-centric approach is designed to address the limitations of the previous models. This approach integrates all forces and resources into a single information system, enabling control objectives to be met even in dynamic, complex environments that are subject to unpredictable interference. Such interference can be irregular, intermittent, and variable, yet network-centric control is still effective under these conditions <ref type="bibr" target="#b22">[21,</ref><ref type="bibr" target="#b23">22]</ref>.</p><p>Consider a control network that a subset of mobile agents follows. Among the entire group of mobile agents, approximately 10% are selected as nodes that hold partial control information (Fig. <ref type="figure" target="#fig_0">1</ref>). These nodes, equipped with control functions, form a network, and from them, one is designated as the primary control center <ref type="bibr" target="#b24">[23,</ref><ref type="bibr" target="#b25">24]</ref>.</p><p>Only the node mobile agents (NMA) are coordinated directly by the control center; these nodes, in turn, control the remaining mobile agents (MA). This setup minimizes communication interference since individual control of each node could overwhelm communication channels. For example, if the command is to change direction quickly, adjusting the coordinates for each mobile agent individually would require significant time. Furthermore, if there is only one primary control agent and it suddenly stops responding, is damaged, or is compromised, all mobile agents would lose direction, become vulnerable to interception, or cease to operate <ref type="bibr" target="#b26">[25]</ref><ref type="bibr" target="#b27">[26]</ref><ref type="bibr" target="#b28">[27]</ref>.</p><p>A network-centric system consists of a primary control mobile agent (MMA) that continuously sends commands to other mobile agents, setting parameters such as movement direction <ref type="bibr" target="#b29">[28,</ref><ref type="bibr" target="#b30">29]</ref>. Alongside commands, it also relays information from the control center to the node mobile agents. If the primary control agent fails for any reason, copies of all information, including control data for all mobile agents, are preserved within the node mobile agents. In this way, an adversary would need to disable every node agent to compromise the entire network -a challenging task since the enemy cannot readily identify which agents' function as nodes. This network organization enhances the resilience of the control system. A key feature of a network-centric system is its "wandering center." If the primary control mobile agent is identified and disabled by an adversary, the stability of the system remains unaffected, as control can quickly be reassigned. A new control agent is selected from the remaining active node agents, allowing for seamless continuity. This flexibility means that control can be handed over to another node at any moment, ensuring sustained operation. In this network-centric mobile agent control system, two types of information are managed:  control: this includes global coordinates transmitted from the control center to the main control agent.  command: this includes the coordinates transmitted by the control agent to node agents, which then relay local coordinates to other agents. Thus, mobile agents navigate based on local rather than global coordinates, as provided by the node agents. In summary, a key strength of the network-centric approach is the use of a roving control center. If connections to the current center are lost, a new center is assigned to maintain control. This design ensures system survivability, thereby greatly enhancing the overall effectiveness of mobile agent control.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Evaluation of the Effectiveness of Network-Centric Control for Mobile Agents in a Dynamic Environment</head><p>Based on the network-centric control algorithm model for mobile agents in dynamic environments and the simulation model of interacting mobile agents, it is essential to conduct experimental studies to assess parameters and evaluate the effectiveness of network-centric control.</p><p>To validate the scientific and methodological framework developed, we performed mathematical modeling to analyze the effectiveness of network-centric control for mobile agents in a dynamic environment.</p><p>The software tools used in this study include:  Simulations were performed on a personal computer with an Intel® Celeron® processor (3. The minimum required percentage of node mobile agents % (nodePercentage) needed to reach the target was calculated as follows. A target is considered "hit" if both of the following conditions are met:  The percentage of mobile agents that reached the target (targetHitPercentage) must be at least equal to the required percentage of mobile agents needed to hit the target (targetHitPercentage).  Among the mobile agents that reached the target, there must be at least one node mobile agent (targetReachedCount &gt; 0).</p><p>To evaluate these conditions, 100 experimental trials were conducted, using the following parameters:  Number of mobile agents (numberOfAgents): 100.  Minimum percentage of mobile agents required to hit the target (targetHitPercentage): 5%.  Percentage of node mobile agents (nodePercentage): ranging from 1% to 20% of the total number of mobile agents.  Initial (startLatitude, startLongitude) and target (targetLatitude, targetLongitude) geographic coordinates for node mobile agents.  Percentage of mobile agents that lost communication (lossPercentage), randomly generated between 50% and 90%. For each agent that lost communication, the geographic coordinates were set to NULL.</p><p>The experimental results were used to plot graphs illustrating the relationship between the percentage of node mobile agents % (nodePercentage) and the probability of hitting the target (targetHitPercentage) in each experiment (Fig. <ref type="figure" target="#fig_2">2</ref>). Based on the experimental results, the average effectiveness of target hits with varying numbers of node mobile agents was analyzed (see Table <ref type="table" target="#tab_0">1</ref> and Fig. <ref type="figure">3</ref>). From the above, it can be concluded that to achieve effective target damage (80% and above), the minimum required number of node mobile agents (nodePercentage) is between 7% and 9%. Therefore, using more than 9% of node mobile agents out of the total number of mobile agents is not advisable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Evaluation of the Effectiveness of Network-Centric Control for Mobile Agents in a Dynamic Environment Using Neural Networks</head><p>Evaluating effectiveness of network-centric control for mobile agents in a dynamic environment, using neural networks, plays a crucial role in determining the suitability of this approach for various tasks. The main stages of this method can be described as follows: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Validation and Performance Evaluation:</head><p> use the test set to assess the network's accuracy and efficiency under real-world conditions.  analyze the results in the context of specific tasks and environmental constraints.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Improvement and Adaptation:</head><p> use the results to refine the network architecture and its parameters.  adapt the network to changes in environmental dynamics and control tasks. The process of training and creating the neural network was carried out using the Deductor Studio Academic analytical platform, which provides highly efficient tools for data analysis and processing. A critical step in this process was utilizing a specially created and carefully prepared dataset to train the network.</p><p>The dataset included information from solving 1,000 different problems, which played a key role in enhancing the adaptability and accuracy of the neural network. This approach to data preparation contributed significantly to the network's ability to solve diverse tasks and ensured its high efficiency across various contexts.</p><p>For the parameters listed in Table <ref type="table" target="#tab_2">2</ref>, a mechanism for estimating the probability of target damage (%) based on the neural network can be applied. The number of mobile agents with which communication was lost, units. targetHitProbability Probability of hitting the target, %</p><p>The parameters from Table <ref type="table" target="#tab_2">2</ref> were provided as input data for building a neural network (Fig. <ref type="figure" target="#fig_3">4</ref>). Based on the results of the correlation analysis of the raw data, it was determined that not all fields should be used for neural network training. Only the fields listed in Table <ref type="table" target="#tab_3">3</ref> are relevant, as the remaining fields have an insignificant impact on the resulting value (Fig. <ref type="figure" target="#fig_4">5</ref>). The number of mobile agents with which communication was lost, units. targetHitProbability Probability of hitting the target, % targetHitProbability Probability of hitting the target, % The obtained dataset was used to train a multilayer perceptron neural network. The following network structure was established: five layers of neurons, with the first (input) layer containing 7 neurons, three hidden layers containing 7, 3, and 5 neurons respectively, and the fifth (output) layer containing 1 neuron. The activation function used is sigmoid. The architecture of the networkdefined by the number of layers, their sizes, and the activation function -determines its ability to solve specific tasks. This framework demonstrates how data moves through the network, from the input to the output layer, with each layer performing calculations using weights and the activation function. The backpropagation method was employed for training.</p><p>The schematic representation of the neural network structure is shown in Figure <ref type="figure" target="#fig_5">6</ref>, where the line colors indicate the values of the weighting factors. The output of the neural network is the probability of a target being hit (%). By applying the parameters of a different task to the input, the network generates a predictive output for the probability of hitting the target (%). During the training of the neural network, the probability values of hitting the target (%) were obtained. On average, the deviation across 1,000 experiments was 3.8%. This suggests that the neural network trained using this methodology yields results that closely match the efficiency of the mobile agent control system (Table <ref type="table" target="#tab_4">4</ref>). The structure of the neural network selected for training resulted in the smallest relative calculation error, while errors for other network configurations exceeded 5%. Therefore, the constructed neural network can be effectively used to solve similar problems, as it accurately reflects the results and allows for the estimation of the probability of hitting the target (%) in dynamically changing environments. Additionally, the use of the neural network helped identify input parameters with minimal impact on the outcome.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>This study reviews the network-centric approach as a method for enhancing the efficiency of mobile agent control systems. The key distinction of this approach, compared to others, is the use of a "wandering center." If communication with the current center is lost, a new center is appointed, ensuring the continuity of the control process. This structure guarantees the system's survivability and, as demonstrated, offers significant potential for improvement, ultimately increasing the overall efficiency of mobile agent control. The research highlights the effectiveness of network-centric control when compared to centralized control (in which no nodal mobile agents are used). It was found that as the number of nodal mobile agents increases, the effectiveness of hitting the target improves. Notably, effective performance (80% or higher) is achieved with just 9% of the total number of mobile agents functioning as nodal agents, suggesting that exceeding this threshold would not provide additional benefits.</p><p>Finally, the results from the mobile agent control system were compared with the output from the neural network training, which estimates the probability of hitting the target with a relative deviation of 3.8%. This confirms that the neural network, trained using the proposed methodology, produces results that closely align with the efficiency of the mobile agent control system.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Mobile agent control system based on network-centric control</figDesc><graphic coords="3,134.04,72.00,327.00,359.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>2 GHz) and 16 GB of RAM running on Microsoft Windows 10.  Microsoft SQL Server 2022 was utilized as the database management system.  Microsoft Visual Studio 2022 Community Edition served as the development environment. Development was conducted in C# using an object-oriented approach.  Experiments in the simulation environment included setting initial parameters, performing intermediate calculations, and visualizing results with Windows Presentation Foundation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Relationship between the percentage of node mobile agents and the probability of hitting the target</figDesc><graphic coords="4,90.96,526.80,412.32,201.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Input Data Set for Neural Network Construction</figDesc><graphic coords="7,86.64,249.60,421.68,247.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Correlation Analysis of Input Data</figDesc><graphic coords="8,129.36,71.76,336.00,159.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: The structure of a neural network</figDesc><graphic coords="8,87.36,438.96,420.48,189.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,97.44,491.52,400.08,221.52" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Target-Hitting Effectiveness with Varying Numbers of Node Mobile Agents</figDesc><table><row><cell>Number</cell><cell>of</cell><cell cols="4">Number of mobile agents with which communication was lost, %</cell></row><row><cell cols="2">nodal mobile agents, %</cell><cell>up to 50%</cell><cell>up to 60%</cell><cell>up to 70%</cell><cell>up to 80%</cell><cell>up to 90%</cell></row><row><cell>0</cell><cell></cell><cell>24</cell><cell>22</cell><cell>17</cell><cell>12</cell><cell>6</cell></row><row><cell>1</cell><cell></cell><cell>29</cell><cell>27</cell><cell>24</cell><cell>19</cell><cell>22</cell></row><row><cell>2</cell><cell></cell><cell>31</cell><cell>31</cell><cell>32</cell><cell>22</cell><cell>19</cell></row><row><cell>3</cell><cell></cell><cell>33</cell><cell>44</cell><cell>53</cell><cell>38</cell><cell>28</cell></row><row><cell>4</cell><cell></cell><cell>78</cell><cell>66</cell><cell>62</cell><cell>53</cell><cell>47</cell></row><row><cell>5</cell><cell></cell><cell>87</cell><cell>82</cell><cell>54</cell><cell>47</cell><cell>34</cell></row><row><cell>6</cell><cell></cell><cell>84</cell><cell>78</cell><cell>82</cell><cell>72</cell><cell>62</cell></row><row><cell>7</cell><cell></cell><cell>92</cell><cell>83</cell><cell>92</cell><cell>88</cell><cell>72</cell></row><row><cell>8</cell><cell></cell><cell>91</cell><cell>83</cell><cell>88</cell><cell>76</cell><cell>70</cell></row><row><cell>9</cell><cell></cell><cell>90</cell><cell>92</cell><cell>91</cell><cell>78</cell><cell>72</cell></row><row><cell>10</cell><cell></cell><cell>99</cell><cell>94</cell><cell>97</cell><cell>82</cell><cell>84</cell></row><row><cell>11</cell><cell></cell><cell>100</cell><cell>98</cell><cell>98</cell><cell>84</cell><cell>83</cell></row><row><cell>12</cell><cell></cell><cell>100</cell><cell>100</cell><cell>96</cell><cell>92</cell><cell>88</cell></row><row><cell>13</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>91</cell><cell>94</cell></row><row><cell>14</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>97</cell><cell>92</cell></row><row><cell>15</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>97</cell></row><row><cell>16</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell></row><row><cell>17</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell></row><row><cell>18</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell></row><row><cell>19</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell></row><row><cell>20</cell><cell></cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell><cell>100</cell></row></table><note>Figure 3: Average Effectiveness of Target Hits with Varying Numbers of Node Mobile Agents Figure 3 indicates the average effectiveness of target hits based on the percentage of node mobile agents:</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1. Training Data Preparation: collect and prepare a large dataset representing different scenarios and dynamic environmental conditions. 2. Creating a Dataset for Network Training: split the collected data into training and test sets to evaluate the network's adaptability to new situations. 3. Designing and Configuring the Neural Network:  develop a neural network architecture suited for controlling mobile agents in dynamic environments.  set the parameters and functions to optimize training. 4. Neural Network Training: use the training set to teach the network to recognize and solve agent control tasks in various environments.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>The main parameters of the task Parameter Description number Mobile agent number numberOfAgents Number of mobile agents, units targetHitPercentage The number of mobile agents that will be enough to hit the target, % targetHitCount The number of mobile agents that will be enough to hit the target, units. nodePercentage Number of nodal mobile agents, % nodeCount Number of nodal mobile agents, units startLatitude Initial geographic coordinates of the mobile agent (latitude), degrees. startLongitude Initial geographic coordinates of the mobile agent (longitude), degrees. targetLatitude Final geographical coordinates of the mobile agent (latitude), degrees. targetLongitude Final geographic coordinates of the mobile agent (longitude), degrees. lossPercentage Number of mobile agents with which communication was lost, % lossCount</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3</head><label>3</label><figDesc>Input data for neural network training Parameter Description number Mobile agent number numberOfAgents Number of mobile agents, units targetHitPercentage The number of mobile agents that will be enough to hit the target, % targetHitCountThe number of mobile agents that will be enough to hit the target, units.</figDesc><table><row><cell>nodePercentage</cell><cell>Number of nodal mobile agents, %</cell></row><row><cell>nodeCount</cell><cell>Number of nodal mobile agents, units</cell></row><row><cell>lossPercentage</cell><cell>Number of mobile agents with which communication was lost, %</cell></row><row><cell>lossCount</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 4</head><label>4</label><figDesc>Comparison of the results of the neural network with the original data</figDesc><table><row><cell cols="2">numberOfAgents</cell><cell>73</cell><cell>99</cell><cell>87</cell><cell>44</cell><cell>66</cell><cell>89</cell><cell>79</cell><cell>50</cell><cell>91</cell></row><row><cell cols="3">targetHitPercentage 5</cell><cell>5</cell><cell>5</cell><cell>5</cell><cell>5</cell><cell>5</cell><cell>5</cell><cell>5</cell><cell>5</cell></row><row><cell cols="2">targetHitCount</cell><cell>4</cell><cell>5</cell><cell>4</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>4</cell><cell>2</cell><cell>5</cell></row><row><cell cols="2">nodePercentage</cell><cell>10</cell><cell>11</cell><cell>4</cell><cell>5</cell><cell>15</cell><cell>6</cell><cell>19</cell><cell>15</cell><cell>15</cell></row><row><cell>nodeCount</cell><cell></cell><cell>7</cell><cell>11</cell><cell>3</cell><cell>2</cell><cell>10</cell><cell>5</cell><cell>15</cell><cell>8</cell><cell>14</cell></row><row><cell cols="2">lossPercentage</cell><cell>63</cell><cell>51</cell><cell>69</cell><cell>69</cell><cell>90</cell><cell>63</cell><cell>86</cell><cell>63</cell><cell>73</cell></row><row><cell>lossCount</cell><cell></cell><cell>46</cell><cell>50</cell><cell>60</cell><cell>30</cell><cell>59</cell><cell>56</cell><cell>68</cell><cell>31</cell><cell>66</cell></row><row><cell cols="3">targetHitProbability 74</cell><cell>88</cell><cell>70</cell><cell>84</cell><cell>55</cell><cell>16</cell><cell>57</cell><cell>17</cell><cell>100</cell></row><row><cell>Neural data</cell><cell>network</cell><cell>77</cell><cell>86</cell><cell>68</cell><cell>83</cell><cell>58</cell><cell>15</cell><cell>60</cell><cell>16</cell><cell>99</cell></row><row><cell>Error, %</cell><cell></cell><cell>4.05</cell><cell>2.27</cell><cell>2.86</cell><cell>1.19</cell><cell>5.45</cell><cell>6.25</cell><cell>5.26</cell><cell>5.88</cell><cell>1.00</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Modeling and nonlinear control for airship autonomous flight</title>
		<author>
			<persName><forename type="first">A</forename><surname>Moutinho</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="55" to="65" />
		</imprint>
		<respStmt>
			<orgName>Instituto Superior Tecnico, Technical University of Lisbon</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Inverse optimal tracking control of an aerial blimp robot</title>
		<author>
			<persName><forename type="first">T</forename><surname>Fukau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kanzawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Osuka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Workshop. Robot Motion and Control</title>
				<meeting>the 5th International Workshop. Robot Motion and Control</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="193" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Gaussian Processes and Reinforcement Learning for Identification and Control of an Autonomous Blimp</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Klein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Haehne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the IEEE Int. Conf. Robotics and Automation</title>
				<meeting>of the IEEE Int. Conf. Robotics and Automation</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="742" to="747" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Method of Restoring Parameters of Mobile Agents in a Unified Dynamic Environment Considering Similarity Coefficients</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Braykovs'ka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yarovyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zavgorodnya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Liskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mukhin</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijcnis.2023.04.03</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.5815/ijcnis.2023.04.03" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Network and Information Security (IJCNIS)</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="25" to="35" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Vector field guided auto-landing control of airship with wind disturbance</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kwon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Seo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 19th World Congress</title>
				<meeting>the 19th World Congress<address><addrLine>Cape Town, South Africa</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="1114" to="1119" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Method of Parallel Information Object Search in Unified Information Spaces</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dodonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zavgorodnya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mukhin</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijcnis.2021.04.01</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.5815/ijcnis.2021.04.01" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Network and Information Security (IJCNIS)</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Coverage control for mobile sensing networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Cortes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Martinez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Karatas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bullo</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.math/0212212</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.48550/arXiv.math/0212212" />
	</analytic>
	<monogr>
		<title level="m">IEEE Conference on Robotics and Automation</title>
				<meeting><address><addrLine>Arlington, VA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="1327" to="1332" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Method of searching for information objects in unified information space</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dodonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ya</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zavgorodnya</surname></persName>
		</author>
		<idno type="DOI">10.20535/SRIT.2308-8893.2021.1.03</idno>
		<ptr target="https://doi.org/10.20535/SRIT.2308-8893.2021.1.03" />
	</analytic>
	<monogr>
		<title level="j">System research and information technologies</title>
		<imprint>
			<biblScope unit="page" from="34" to="46" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The task of forming individual zones of responsibility by a team of mobile agents</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Golembo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bochkaryev</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Tsyzh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Visn</title>
		<imprint>
			<biblScope unit="volume">573</biblScope>
			<biblScope unit="page" from="62" to="67" />
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>National Lviv Polytechnic University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Obfuscation Code Techniques Based on Neural Networks Mechanism</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bazaliy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Krysak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mukhin</surname></persName>
		</author>
		<idno type="DOI">10.1109/SAIC51296.2020.9239247</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1109/SAIC51296.2020.9239247" />
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd International Conference on System Analysis &amp; Intelligent Computing (SAIC)</title>
				<meeting><address><addrLine>Kyiv. Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">An approach game problem under the failure of controlling devices</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Chikriy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">V</forename><surname>Baranovskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Chikriy</surname></persName>
		</author>
		<idno type="DOI">10.1615/JAutomatInfScien.v32.i5.10</idno>
		<ptr target="https://doi.org/10.1615/JAutomatInfScien.v32.i5.10" />
	</analytic>
	<monogr>
		<title level="j">J. of Automation and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Quasi-linear differential-difference game of approach</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">V</forename><surname>Baranovska</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-96755-4_26</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-96755-4_26" />
	</analytic>
	<monogr>
		<title level="j">Understanding Complex Systems</title>
		<imprint>
			<biblScope unit="page" from="505" to="524" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Applications of Adaptive multi-step differential transform method to singular perturbation problems arising in science and engineering</title>
		<author>
			<persName><forename type="first">E</forename><surname>El-Zahar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Math. Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">P</forename></persName>
		</author>
		<imprint>
			<biblScope unit="page" from="223" to="232" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The use of differential transformations for solving nonlinear boundary value problems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Gusynin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gusynin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Tachinina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings of NAU</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="45" to="55" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Algorithm for the Information Space Forming and the Evaluation of Input Objects Search Efficiency</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Baranovska</surname></persName>
		</author>
		<idno>. 3241</idno>
		<ptr target="https://ceur-ws.org/Vol-3241/paper18.pdf" />
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings this link is disabled</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="193" to="204" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Research and Design of Task Scheduling Method Based on Grid Computing</title>
		<author>
			<persName><forename type="first">Liu</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Guo</forename><surname>Wei-Wei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Smart City and Systems Engineering</title>
				<imprint>
			<publisher>ICSCSGridE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">P</title>
		<imprint>
			<biblScope unit="page" from="188" to="192" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A novel dynamic task scheduling strategy for computational grid</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sheikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shahid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nagaraju</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Intelligent Communication and Computational Techniques (ICCT)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="102" to="107" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Devising a method to identify an incoming object based on the combination of unified information spaces</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zavgorodnya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Krylov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rybalochka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Belous</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2021.229568</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.15587/1729-4061.2021.229568" />
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="35" to="44" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Grid Scheduling Heuristic Methods: State of the Art</title>
		<author>
			<persName><forename type="first">Aron</forename><forename type="middle">R</forename><surname>Chana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Information Systems and Industrial Control Applications</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="466" to="473" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Decentralized Scheduling Algorithm for DAG Based Tasks on P2P Grid</title>
		<author>
			<persName><forename type="first">P</forename><surname>Chauhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Engineering</title>
		<imprint>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Formal Tool for Identifying Mobile Malicious Behavior</title>
		<author>
			<persName><forename type="first">G</forename><surname>Canfora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="1230" to="1252" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Linear Flight Control Techniques</title>
		<author>
			<persName><forename type="first">J</forename><surname>How</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Frazolli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Chowdhary</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Unmanned Aerial Vehicles</title>
				<meeting><address><addrLine>Dordrecht; Heidelberg; New York; London</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="529" to="576" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Fuzzy logic, neural networks, and soft computing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lotfi</surname></persName>
		</author>
		<author>
			<persName><surname>Zadeh</surname></persName>
		</author>
		<idno type="DOI">10.1145/175247.175255</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1145/175247.175255" />
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="77" to="84" />
			<date type="published" when="1994-03">1994. March 1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Information-processing dynamics in neural networks of macaque cerebral cortex reflect cognitive state and behavior</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">F</forename><surname>Varley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sporns</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schaffelhofer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Scherberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Dann</surname></persName>
		</author>
		<idno type="DOI">10.1073/pnas.2207677120</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1073/pnas.2207677120" />
	</analytic>
	<monogr>
		<title level="j">Proc Natl Acad Sci US A</title>
		<imprint>
			<biblScope unit="volume">120</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">e2207677120</biblScope>
			<date type="published" when="2023-01-10">2023 Jan 10</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Fuzzy neural networks and neuro-fuzzy networks: A review of the main techniques and applications used in the literature</title>
		<author>
			<persName><forename type="first">Paulo</forename><surname>Vitor De Campos</surname></persName>
		</author>
		<author>
			<persName><surname>Souza</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.asoc.2020.106275</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1016/j.asoc.2020.106275" />
	</analytic>
	<monogr>
		<title level="j">Applied Soft Computing</title>
		<idno type="ISSN">1568-4946</idno>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A critique of pure learning and what artificial neural networks can learn from animal brains</title>
		<author>
			<persName><surname>Am Zador</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41467-019-11786-6</idno>
		<ptr target="https://doi.org/10.1038/s41467-019-11786-6" />
	</analytic>
	<monogr>
		<title level="j">Nat Commun</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">3770</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Classification of Information Objects with Fuzzy Parameters in E-Learning Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zavgorodnii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Liskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Syrota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Koval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Honchar</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS58523.2023.10348768</idno>
		<idno>DOI:</idno>
		<ptr target="https://10.1109/IDAACS58523.2023.10348768" />
	</analytic>
	<monogr>
		<title level="m">IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<meeting><address><addrLine>Dortmund. Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1189" to="1193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Multifunctional Models, Including an Artificial Neural Network, to Predict the Compressive Strength of Self-Compacting Concrete</title>
		<author>
			<persName><forename type="first">K</forename><surname>Ghafor</surname></persName>
		</author>
		<idno type="DOI">10.3390/app12168161</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.3390/app12168161" />
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">16</biblScope>
			<biblScope unit="page">8161</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">;</forename><surname>Vadym Mukhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yurii</forename><surname>Yaroslav Kornaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ievgen</forename><surname>Bazaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrii</forename><surname>Krylov</surname></persName>
		</author>
		<author>
			<persName><surname>Barabash</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">The Testing Mechanism for Software and Services Based on Mike Cohn&apos;s Testing Pyramid Modification</title>
		<author>
			<persName><forename type="first">Alla</forename><surname>Yakovleva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><surname>Oleg Mukhin</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS53288.2021.9660999</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<meeting><address><addrLine>Cracow, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="589" to="595" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
