<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Volodymyr Yuzefovych</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Professor Tsvetan Lazarov Bulgarian Defense Institute</institution>
          ,
          <addr-line>Sofia</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>1</volume>
      <issue>3</issue>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The peculiarities of obtaining and processing knowledge of different types of specialists as sources of information for organizational management systems are considered in the paper. The mathematical apparatus of fuzzy logic and decision support for use in organizational management systems in the formation of information resources is proposed. A practical example of computations based on the built model (hierarchy of goals) - the knowledge base in the decision support system is presented.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;organizational management system</kwd>
        <kwd>information resource</kwd>
        <kwd>analyst</kwd>
        <kwd>expert</kwd>
        <kwd>fuzzy logic</kwd>
        <kwd>method of targeted dynamic evaluation of alternatives 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Formation of an information resource of the OMS considering the peculiarities of expert knowledge</title>
      <p>The activities of the OMS specialists involved at different levels in the processes of generating,
processing (aggregating) and analyzing information (data) let’s call as analytical activities. To achieve
the purpose of this paper, it is necessary to identify and analyze the types of analytical activities
characteristic of different hierarchical levels of the OMS.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a generalized scheme for the formation of an information resource of a certain OMS is
presented, which, after shifting the emphasis to determine the place of analytical activities of
personnel in it, looks like as one shown in Fig.1. Analysis of Fig. 1 shows that at least five types of
analytical activities and, accordingly, groups of specialists can be distinguished within the framework
of the OMS.
      </p>
      <p>A "source" analyst is an analyst who carries out his/her analytical activities within one element of
the OMS based on direct observations of indicators characterizing the state of the relevant element
of the system and/or data on monitoring of environmental factors. As a result, such an analyst forms
judgments about the state of the system element or the state of individual processes and phenomena
observed in the external environment of the OMS functioning, based on his or her own ideas and
experience. As a rule, such judgments are formed by determining one of the possible states of an
element (or a component of the external environment) from a set of predefined states. The judgments
of "source" analysts are mainly based on objective observation (monitoring) data, but the source data
contain subjective distortions of information as a result of cognitive activity.</p>
      <p>The second group includes aggregation analysts, who carry out analytical activities by generalizing
(integrating) data (information) from "source" analysts. They form judgments about the state of
different subsystems or groups of elements of the OMS and, accordingly, are mostly based on
subjective data. Since different subsystems can be distinguished within different OMS and
hierarchical links between them are possible, it is obvious that the activities of such analysts form a
hierarchical procedure of aggregating information with obtaining judgments on the state of
subsystems (state of the environment) of varying degrees of generalization. As a result, the subjective
distortions contained in the initial judgments (results of analytical activities) may increase due to the
imposition of their own cognitive distortions on the cognitive distortions of the "source" analysts. As
a result, the information uncertainty about the actual state of the phenomena being analyzed may
increase.</p>
      <p>Reducing the cognitive distortions of information that are characteristic of the two groups of
experts can be ensured by formalizing the process of obtaining and aggregating it to the maximum
extent possible, as well as by jointly processing duplicate information from several analysts. For such
information processing, tools developed within the framework of fuzzy set theory and fuzzy logic,
which were specifically designed to work with expert judgments, can be effectively used. The second
way is to reduce the workload on one analyst, taking into account the psychophysiological limitations
of a person through the rational distribution of functional tasks among analysts.</p>
      <p>
        Knowledge engineers and organizers of the examination must first familiarize themselves with the
relevant subject area before building the knowledge base. For this purpose, they mostly use available
open sources (the Internet, articles, lectures, ets), as well as specialized tools, such as content
monitoring systems (CMSs). In this case, the cognitive bias "the effect of the illusion of truth" may be
triggered [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Thus, it is inappropriate to form expert opinions in the OMS based directly on data from
popular sources. It is more reasonable to use formalized methods of processing incomplete expert
information when conducting an expert assessment. In addition, the expert evaluation organizer
selects a group of experts with a sufficient level of competence in the subject area, and further work
on building the LR takes into account the level of competence of the expert in each of the expert
evaluation issues. In this case, a cognitive bias may be triggered - the Dunning-Kruger effect [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Experts decompose the subject area, divide the goals into sub-goals, determine the criteria and
factors that directly affect the outcome of the examination. This process is characterized by the
following cognitive distortions: the Ringelman effect, the "focusing" effect, the "survivor's error", and
the "bicycle shed" effect [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. To avoid them, it is advisable to use systems for distributed collection
and processing of expert information in the work of an expert group. Expert evaluation aims to
reliably determine the degree of preference between alternatives/criteria. Direct scoring and pairwise
comparisons are possible. The following cognitive biases should be avoided: the distinction error, the
anchoring effect, and the contrast effect [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. You should also take into account George Miller's
research [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] on the limitations of human short-term memory.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Aggregation of analysts' knowledge</title>
      <p>Here are the heuristic requirements for aggregating data from analysts, which, unlike data from
technical sources, are additionally characterized by varying degrees of reliability.
1. If different data is received from the same analyst during the same management cycle, the
data is not combined and only the last value of the indicator is considered
2. If several analysts send same data messages with different degrees of reliability (confidence
in their truth), the result of their combination should be characterized by greater reliability than
each individual message
3. If several analysts provide data that does not match in content, the result of combining them
should be characterized by no more reliability than the highest "declared" reliability in the
messages
4. If the content of the data provided by the analysts differs significantly, there should be a
growing possibility that the indicator actually has a different, "intermediate" value that averages
the data in some way, giving more credibility to the value that tends to be more reliable than the
"input" message.</p>
      <p>
        In this case, each message about the value of the indicator is formalized as a fuzzy set:
where  ( ) = [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] – is the degree of belonging of the value 
to the fuzzy set 
 = { ,  , … ,  } is a crisp set that is a carrier of the fuzzy set and contains N possible (valid) values
of the indicator.
      </p>
      <p>For the final formalization of the message about the value of the indicator in the form of a fuzzy
set, in addition to the indicator carrier set, it is desirable to specify the degrees of membership ( )
for each of the possible values in the form of a functional dependence. There are many different ways
to define a membership function for fuzzy sets, the simplest of which is a triangular function, which
is described as follows:
 ( ) =
0,
−  )
(
⎧
⎪
⎨
⎪
⎩
⎪ ( −  )</p>
      <p>( −  )
⎪ ( −  )
0,
, 
,</p>
      <p>where C is the value of the indicator determined by the analyst; a, b are the left and right
boundaries of the triangular membership function, which applies to other values of the indicator
other than C that are between a and b.</p>
      <p>If | −  | = | −  |, the membership function is symmetric with respect to C. The range of values
of the indicator ∆ = | −  | determines the list of its values close to C, which the indicator may
actually take. The membership function can be viewed as an analogy to the distribution of the
measurement error of an indicator by any technical means, where the value C is the measurement
result, ∆ /2 is the absolute measurement error, and the membership function  ( ) is the law of
error distribution.</p>
      <p>To take into account the reliability of the message, it is necessary to set a numerical
correspondence (scale) to the defined linguistic values of reliability (confidence in the value of the
indicator). An example of such correspondence is shown in Table 1.</p>
      <p>= { ( )/ }, 
∈ 
(1)
(2)
(3)
(4)
Linguistic meanings of the confidence attribute and their corresponding numerical values
The linguistic meaning of
the attribute of confidence</p>
      <p>The numerical value of the
confidence attribute (Ds)
"Reliable"
"Probably"
"Maybe"
"Doubtful"
1
0,7
0,5
0,25</p>
      <p>In the next all the values of the membership function are normalized by the corresponding
numerical value of the confidence in the expression:
( ) =</p>
      <p>∗  ( ).</p>
      <p>Since this transformation of the independence function is linear, it will retain its triangular shape.</p>
      <p>Having carried out the specified simple formalization of all incoming messages from analysts, you
can proceed to solving the problem of their unification. Within the framework of the theory of fuzzy
sets, a significant toolkit for working with fuzzy sets has been accumulated. The operation of the
algebraic sum of fuzzy sets best corresponds to the unification rules formulated above. To combine
two messages A and B, the corresponding expression would look like this:

( ) = 
( ) + 
( ) − 
( ) ∗ 
( ).</p>
      <p>The last operation is to obtain the combined value of the indicator and determine its reliability,
for which the expression for obtaining the weighted average of the fuzzy set 
( ) can be used:
∑
= 

=
∑
 ∙</p>
      <p>В
В
( )
( )</p>
      <p>.


.</p>
      <p>This operation is called defuzzification of a fuzzy set. The reliability of the resulting value will be
determined by the degree of membership of the weighted average obtained:</p>
      <p>The proposed approach will reduce the influence of the subjective component on the result of data
(5)
(6)
processing from analysts.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Aggregation of experts' knowledge</title>
      <p>
        When forming the information resource of the OMS, certain features of expert knowledge should also
be taken into account [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. During the expert evaluation, cognitive distortions of data and knowledge
may occur, which significantly affect its result. Human psychophysiological limitations limit the
ability to process more than 9 objects at the same time [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Expert evaluation is time-consuming and
costly, so it should be used only when absolutely necessary. If possible, it is recommended to use
previously built knowledge bases (KBs), their fragments and templates (precedents) for solving
similar problems in retrospect. Experts may miss assessment sessions, not answer some questions
due to limited time, busy schedule, fatigue or unwillingness. Therefore, it is important to be able to
process incomplete expert information [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. At the same time, the need for generalized and
systematized knowledge is gradually revealed through decomposition at smaller levels of the OMS
hierarchy, and detailed information is aggregated from the bottom up to meet the information needs
of users at higher management levels.
      </p>
      <p>
        To aggregate expert knowledge, the method of goal dynamic evaluation of alternatives (MGDEA)
[
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ] is used for processing of a hierarchy of goals [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The hierarchy is the result of decomposition
of the main goal into components (subgoals), which, in turn, are also decomposed into subgoals, etc.
The decomposition process stops when we get specific activities (projects) as components.
      </p>
      <p>
        The MGDEA offers a generalized procedure for determining the degree of achievement of any
hierarchy goal at a given time t. To determine the degree of achievement of a particular goal, it is
necessary to analyze the degree of achievement of the goals that directly affect this goal for each
subset of compatible goals [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Thus, the degree of achievement of the h-th goal at time t is described
by the formula for di (t):
⎧
⎪
⎩
⎨
⎪
0,
 , 
1,
      </p>
      <p>1 − ∑  ( ) ≤  ( ) ≤ 1,
 ( ) =
  ( ) ,   &lt;  ( ) &lt; 1 − ∑  ( ) ,
(7)
where  ( ) = sup ∑  ( ) ( );Ti – is the threshold for achieving the i-th goal;  ( ( )) – is a
function of the degree of achievement of the i-th goal at time t;  ( )
– is partial coefficients of
influence of the j-th goal in the k-th group of compatible goals, which has a negative impact on the
ith goal.</p>
    </sec>
    <sec id="sec-5">
      <title>5. A practical example</title>
      <p>approach to solving such problems.</p>
      <p>
        System (DSS) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        As a practical example, the proposed mathematical tools were used to build the knowledge base of
the Energy Security Strategy of Ukraine [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The results confirmed the applicability of the proposed
In Fig. 2 shows an example of goals’ hierarchy built by means of the Solon-3 Decision Support
      </p>
      <p>Below is a list of the hierarchy's goal statements and their corresponding numbers in the goal
hierarchy structure (Figure 2):</p>
      <p>No. 0 - Energy security of Ukraine
No. 1 - Availability of energy sources and energy resources of all types for consumers
No. 2 - Sustainability of the energy sector</p>
      <p>No. 3 - Economic efficiency of the energy sector, energy supply systems and import substitution
of mineral raw materials</p>
      <p>No. 4 - Energy efficiency of energy resources use and energy efficiency of the national economy
No. 5 - Environmentally acceptable impact of energy on the environment</p>
      <p>No. 6 - Integration of the energy sector into the EU's political, technological, technical, economic
and legal space</p>
      <p>No. 7 - Independence of the state in the formation and implementation of domestic and foreign
policy in the energy sector, ensuring the realization of national interests</p>
      <p>No. 8 - Development of scientific, technical, innovative and educational potential of Ukraine for
the needs of the energy sector
No. 9 - Improvement of the technical condition of end-user energy supply systems
No. 10 - Preventing the deepening of energy poverty and increasing the share of household
expenditures on energy supply</p>
      <p>No. 11 - Improving mechanisms for supporting certain categories of consumers and eliminating
cross-subsidization in energy markets</p>
      <p>No. 12 - Introduction of simplified procedures and guarantee of non-discriminatory connection of
consumers and other users to the energy supply networks</p>
      <p>No. 13 - Stimulating the development of energy exchange trading</p>
      <p>No. 14 - Implementation of an effective mechanism for informing household consumers about
comparative prices and opportunities to change suppliers</p>
      <p>No. 15 - Implementation of a data management system based on big data, digitalization of
processes, creation of convenient services for citizens</p>
      <p>No. 16 - Ensuring cybersecurity and physical security of critical infrastructure in the energy sector
No. 17 - Implementation of a system for conducting risk assessments and exchanging information
on risks and threats to critical infrastructure of the energy sector</p>
      <p>No. 18 - Formation of a system for preventing the realization of threats of any type and responding
to crisis situations, implementation of the energy sustainability plan of Ukraine</p>
      <p>No. 19 - Ensuring a balanced development of energy supply systems, taking into account the
uneven consumption and operation of individual energy producers</p>
      <p>No. 20 - Development of territorial communities' capacities for self-sufficiency in the conditions
of disruption of the national energy supply systems</p>
      <p>No. 21 - Formation of a system of minimum stocks of energy resources and critical energy
equipment</p>
      <p>No. 22 - Introduction of a mechanism for cooperation and interaction between the state and
operators of critical infrastructure in the energy sector in case of crisis, in particular, to involve state
representatives in participation and control over the implementation of crisis response plans
No. 23 - Adaptation of the energy sector to the negative impact of climate change
No. 24 - Introduction of efficient energy markets, ensuring transparency of their functioning and
regulation, increasing the capitalization of energy companies, and developing the exchange trading
system</p>
      <p>No. 25 - Renewal of fixed assets of the energy sector, in particular by creating favorable conditions
for the introduction of mechanisms to support the implementation of large-scale investment projects
for the development of critical infrastructure in the energy sector</p>
      <p>No. 26 - Stimulating competition in energy markets, in particular by strengthening antitrust
legislation and developing mechanisms of state influence on market participants that violate antitrust
laws and/or license conditions</p>
      <p>No. 27 - Stimulating import substitution, in particular through the development of bioenergy, wind
energy, and a reasonable increase in energy production</p>
      <p>No. 28 - Improving corporate governance, stimulating the attraction of highly qualified personnel
No. 29 - Implementation of a set of measures and programs to improve energy efficiency by sectors
of the national economy, in particular in the fuel and energy complex, as well as in the housing and
communal sector, households and the public sector</p>
      <p>No. 30 - Introduction of the principle of "energy efficiency first" for government and business
decision-making</p>
      <p>No. 31 - Simplification of procedures and development of services for the implementation of
energy efficiency projects</p>
      <p>No. 32 - Ensuring the accounting of energy consumption
No. 33 - Implementation of a set of measures to expand the use of local alternative fuels</p>
      <p>No. 34 - Development of a set of measures for the integration of consumers using renewable
energy sources for their own consumption into the operation of the Integrated Energy System of
Ukraine</p>
      <p>No. 35 - Formation of an institutional framework to ensure access to high-quality energy audits
and promote the implementation of energy management programs</p>
      <p>No. 36 - Optimization and determination of the mechanism for financing measures for the
greening of coal-fired generating facilities</p>
      <p>No. 37 - Significant reduction of greenhouse gas emissions from the activities of fuel and energy
enterprises, promotion of the replacement of traditional fuels in transport with electricity and biofuels</p>
      <p>No. 38 - Implementation of a reasonable increase in the share of renewable energy sources, taking
into account the requirements for ensuring the operational security of energy supply systems and the
impact on the price parameters of the energy market</p>
      <p>No. 39 - Implementation of measures to clean up coal-fired generating facilities in order to
preserve the medium-term prospects for competitive development of electricity generation based on
the use of domestic energy resources</p>
      <p>No. 40 - Development and implementation of a long-term program for the replacement of
coalfired generating facilities</p>
      <p>No. 41 - Bringing Ukrainian legislation in line with EU law (EU acquis) to create common energy
markets</p>
      <p>No. 42 - Termination of electricity imports from the Russian Federation and the Republic of
Belarus and testing of the integrated power system of Ukraine in the mode of separate operation
during 2022</p>
      <p>No. 43 - Physical separation from the power grids of the Russian Federation and the Republic of
Belarus</p>
      <p>No. 44 - Synchronization of the operating modes of the Integrated Power System of Ukraine and
the European Network of Transmission System Operators for Electricity</p>
      <p>No. 45 - Implementation of economically feasible projects for the expansion of cross-border
interconnectors between Ukraine and the EU countries</p>
      <p>No. 46 - Formation of a system for harmonizing the goals of development of the national economy
and the fuel and energy complex with the priorities of ensuring national security and realization of
national interests</p>
      <p>No. 47 - Preventing Ukraine's increasing dependence on external suppliers, ensuring an
appropriate level of diversification of energy resources and technologies, in particular through
economically justified growth of the share of renewable energy sources and local sources
No. 48 - Economically justified growth of natural gas, oil and other energy resources production
No. 49 - Increasing the share of localization of equipment production for the fuel and energy
sector, in particular for nuclear power, hydropower, renewable energy, and heat power</p>
      <p>No. 50 - Implementation of effective mechanisms of public-private partnership to ensure energy
security</p>
      <p>No. 51 - Establishment of a permanent Ukraine-EU and Ukraine-NATO format to discuss regional
energy security issues</p>
      <p>No. 52 - Creation of a regulatory framework and development of an action plan for the return of
assets and resources of the fuel and energy sector that were seized as a result of the temporary
occupation of part of the territory of Ukraine by the Russian Federation</p>
      <p>No. 53 - Setting priorities and coordinating foreign economic cooperation to support the
competitiveness of the Ukrainian energy sector in global markets, diversification of energy sources
and supply routes</p>
      <p>No. 54 - Meeting the needs of current and future generations to ensure the use of the latest energy
technologies, including hydrogen energy</p>
      <p>No. 55 - Introduction of a mechanism for the use of budget funds and other sources of financing
for technological innovation changes in the energy sector</p>
      <p>No. 56 - Development and transfer of technologies that help to solve current global environmental
challenges, mainly caused by climate change and the impact of energy on the environment</p>
      <p>No. 57 - Consumer-oriented educational activities and promotion of the latest technological
knowhow and energy-efficient technologies among the general public</p>
      <p>No. 58 - Creating conditions for the involvement of new types of energy resources and energy
sources in the updated energy balance based on the principle of self-sufficiency, increasing the choice
of energy types that will contribute to the formation of an updated energy balance and self-sufficiency
in energy resources</p>
      <p>No. 59 - Application of the latest technological solutions to improve the technical characteristics
of nuclear power plants subject to unconditional compliance with all requirements for safe operation
of nuclear facilities</p>
      <p>No. 60 - Scaling up the successful experience of scientific and innovative pilot projects, in
particular for the transformation of coal regions and reform of the coal sector</p>
      <p>No. 61 - Determination of priorities of the state technical policy in the energy sector
No. 62 - Modernization of the personnel training system for the energy sector by introducing new
specialties and retraining programs in accordance with the needs of the fuel and energy complex
No. 63 - Cyber threats / cyber incidents against critical infrastructure in the energy sector
No. 64 - Influence of pressure groups on the energy sector</p>
      <p>No. 65 - Resistance to the introduction of European rules for the transparent functioning of energy
markets</p>
      <p>No. 66 - Blocking the supply of necessary resources and equipment for the energy sector of
Ukraine</p>
      <p>No. 67 - Personnel shortage (loss of qualified personnel and the system of training/retraining)
No. 68 - Increased depreciation of fixed assets of energy infrastructure facilities</p>
      <p>No. 69 - Failure to comply with the requirements and measures to interconnect Ukraine's systems
(networks) with the EU electricity and gas supply systems, including the expansion of the capacity of
interstate crossings (interconnectors)</p>
      <p>No. 70 - Absence of a system of strategic planning and coordination of economic and energy
development</p>
      <p>No. 71 - Threats to the physical security of energy infrastructure facilities
No. 72 - Uncontrolled change in the structure of generating capacities
No. 73 - Lack of energy reserves
No. 74 - Lack of capacity for "crisis" response
No. 75 - Increased deficit of capital investments in energy development
No. 76 - The ongoing armed aggression of the Russian Federation against Ukraine
No. 77 - Low energy efficiency of the national economy</p>
      <p>No. 78 - Continued shadowing of relations in the energy sector, in particular through improper
accounting of resources</p>
      <p>No. 79 - Imperfection of legislation on energy market regulation (preservation of the subsidy
system, the mechanism of public special obligations or restrictions on the rights of certain energy
market participants)</p>
      <p>No. 80 - The impact of climate change on the structure and modes of energy consumption
No. 81 - Obstruction by the Russian Federation of the interconnection of Ukraine's systems
(networks) with the EU electricity and gas supply systems</p>
      <p>No. 82 - Failure to adopt legislation necessary for the implementation of energy rules in
accordance with the provisions of EU law (EU acquis)</p>
      <p>No. 83 - Deepening of energy poverty, increase in household energy costs
No. 84 - Insufficient level of competition and regulation of monopolies in energy markets
No. of goals</p>
      <p>in the
hierarchy</p>
      <p>No. 85 - Delays in the adoption and implementation of decisions on the refusal to use coal for
energy needs</p>
      <p>No. 86 - Inefficiency of technologies and technological processes of energy market participants
No. 87 - High level of industrial emissions and wastewater from the fuel and energy sector
No. 88 - High level of greenhouse gas emissions from the fuel and energy sector
No. 89 - High carbon intensity of final energy consumption
No. 90 - Loss of scientific and technical potential of the energy sector</p>
      <p>No. 91 - Lack of development of corporate management, inefficient operation of fuel and energy
enterprises in market conditions</p>
      <p>No. 92 - Bringing coal production volumes in line with the needs of Ukraine's energy sector on the
basis of market principles of management and competition with the determination of the term of coal
use for energy needs.</p>
      <p>Table 1 shows the threat numerical rating computed using the Solon-3 DSS.
70
76
75
78
64
77
90
84
71
86
63
68
81
74
83
91
82
73
65
72
67
79
66
89
85
69
88
87
80</p>
      <p>Rank
The article shows the peculiarities of knowledge of analysts and experts, which are typical for OMS,
which further form the information basis of databases and KBs in the formation of the OMS
information resource. Five types of specialists (sources of information in the OMS) are assigned.</p>
      <p>Using the fuzzy logic apparatus to process information from "source" analysts and aggregation
analysts in the information-analytical subsystem of the OMS is proposed.</p>
      <p>Using information received from analysts after its preliminary processing along with objective
and expert information when building the KB of the decision support subsystem of the OMS is
suggested.</p>
    </sec>
    <sec id="sec-6">
      <title>References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shabrina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Silvianita</surname>
          </string-name>
          ,
          <article-title>Factors Analysis on Knowledge Sharing at Telkom Economic and Business School (TEBS</article-title>
          ) Telkom University Bandung, in: Procedia - Social and Behavioral Sciences, vol.
          <volume>169</volume>
          ,
          <year>2015</year>
          , pp.
          <fpage>198</fpage>
          -
          <lpage>206</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.sbspro.
          <year>2015</year>
          .
          <volume>01</volume>
          .303.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Yuzefovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.V.</given-names>
            <surname>Andriichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.O.</given-names>
            <surname>Tsybulska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.N.</given-names>
            <surname>Stoianov</surname>
          </string-name>
          ,
          <article-title>Consideration of the features of expert knowledge in organizational management systems in the formation of an information resource</article-title>
          ,
          <source>in: Proceedings of the XXII International Scientific and Practical Conference ITS-2022 (Information Technology and Security) - Kyiv: Engineering</source>
          . - pp.
          <fpage>84</fpage>
          -
          <lpage>89</lpage>
          . (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.A.</given-names>
            <surname>Miller</surname>
          </string-name>
          , “
          <article-title>The magical number seven, plus or minus two: some limits on our capacity for processing information”</article-title>
          .
          <source>Psychological Review 63.2</source>
          (
          <year>1956</year>
          )
          <fpage>81</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Volodymyr</given-names>
            <surname>Yuzefovych</surname>
          </string-name>
          , Yevheniia Tsybulska, Oleh Andriichuk,
          <article-title>One Approach to Formation of Common Information Space Information Resource in Organizational Management Systems</article-title>
          ,
          <source>in: CEUR Workshop Proceedings (ceur-ws.org)</source>
          , Vol.
          <volume>3241</volume>
          urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>3241</lpage>
          -
          <fpage>0</fpage>
          . URL: http://ceurws.org/Vol-
          <volume>3241</volume>
          /paper20.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.V.</given-names>
            <surname>Potiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Lenshin</surname>
          </string-name>
          ,
          <article-title>The main provisions of the mathematical apparatus of subjective logic and its application for assessing the level of maturity of information security systems</article-title>
          , Radio Engineering, Thematic issue: Information Security - Kharkiv: Kharkiv National University of Radio Electronics, (
          <year>2005</year>
          ) pp.
          <fpage>144</fpage>
          -
          <lpage>160</lpage>
          . (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.V.</given-names>
            <surname>Andriichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Tsyganok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Kadenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.V.</given-names>
            <surname>Porplenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Fu</given-names>
            <surname>Minglei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.O.</given-names>
            <surname>Vlasenko</surname>
          </string-name>
          ,
          <article-title>Approaches to taking into account the cognitive biases of experts in decision support systems / Information technology and security</article-title>
          ,
          <source>in: Proceedings of the XXI International Scientific and Practical Conference ITS-2021, December</source>
          <volume>09</volume>
          ,
          <year>2021</year>
          , Kyiv, Ukraine. - K.:
          <string-name>
            <surname>Engineering</surname>
            <given-names>LLC</given-names>
          </string-name>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>229</lpage>
          . (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.Z.</given-names>
            <surname>Zgurovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Totsenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Tsyganok</surname>
          </string-name>
          ,
          <article-title>Group Incomplete Paired Comparisons with Account of Expert Competence</article-title>
          ,
          <source>Mathematical and Computer Modelling</source>
          <volume>39</volume>
          .
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2004</year>
          ):
          <fpage>349</fpage>
          -
          <lpage>361</lpage>
          , doi: https://doi.org/10.1016/S0895-
          <volume>7177</volume>
          (
          <issue>04</issue>
          )
          <fpage>90511</fpage>
          -
          <lpage>0</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Totsenko</surname>
          </string-name>
          , “
          <article-title>On One Approach to the Decision Making Support while Planning Research and Development. Part II. The Method of Goal Dynamic Evaluation of Alternatives”</article-title>
          .
          <source>Journal of Automation and Information Sciences 33.4</source>
          (
          <year>2001</year>
          ):
          <fpage>82</fpage>
          -
          <lpage>90</lpage>
          , doi: http://dx.doi.org/10.1615/JAutomatInfScien.v33.
          <year>i4</year>
          .
          <fpage>100</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsyganok</surname>
          </string-name>
          ,
          <article-title>Improvement of the method of goal dynamic evaluation of alternatives and features of its application</article-title>
          ,
          <source>Data Recording, Storage &amp; Processing 15.1</source>
          (
          <year>2013</year>
          ):
          <fpage>90</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Totsenko</surname>
          </string-name>
          ,
          <article-title>Methods and Systems for Decision-making Support. Algorithmic aspect</article-title>
          .
          <source>Naukova dumka, Kyiv</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>Energy Security Strategy of Ukraine</article-title>
          . URL: https://zakon.rada.gov.ua/laws/show/907-2021- %D1%
          <fpage>80</fpage>
          #
          <fpage>n10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>Computer program "Solon-3 decision support system" (Solon-3 DSS)</article-title>
          .
          <article-title>Certificate of state registration of copyright to work № 8669., Ministry of Education and Science of Ukraine State Department of Intellectual Property</article-title>
          , registered on 31/10/
          <year>2003</year>
          . URL: https://dsslab.org.ua/applications/solon-3.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>