Научная статья на тему 'Разработка комплексного метода управления рисками в проектах сферы информационнах технологий'

Разработка комплексного метода управления рисками в проектах сферы информационнах технологий Текст научной статьи по специальности «Экономика и бизнес»

CC BY
88
29
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
КОМПЛЕКСНЫЙ МЕТОД / УПРАВЛЕНИЕ РИСКАМИ / СЕТИ БАЙЕСА / ВЕРОЯТНОСТЬ / ЭКСПЕРТНЫЕ МЕТОДЫ / ИТ ПРОЕКТ / COMPREHENSIVE METHOD / RISK MANAGEMENT / BAYESIAN NETWORKS / PROBABILITY / EXPERT METHODS / IT PROJECT

Аннотация научной статьи по экономике и бизнесу, автор научной работы — Prokopenko T., Grigor O.

Предложен комплексный метод управления рисками проектов в области информационных технологий на основе комбинированного применения интеллектуальных и эвристических методов, что позволит повысить эффективность проектов. Разработана модель риска ИТ проекта на основе сетей Байеса, что обеспечит возможность определения наиболее вероятного сценария риска и разработки адекватных мер борьбы

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Development of the comprehensive method to manage risks in projects related to information technologies

A comprehensive method of project risk management is proposed for the field of information technologies based on the combined application of intelligent and expert methods under unstable conditions and constraints for financial and time resources. The method makes it possible to support making a decision based on the formalized technique of identification and estimation of risks, as well as the choice of the initial set of measures to avoid a risk event. This method was investigated based on the universal academic example of a project in the field of information technologies. The result of application of the comprehensive method of risk management is an improvement in the efficiency of an IT project by reducing losses in the project and overspending of financial resources. Risk model of an IT project based on the Bayesian network is developed, which is the base of the comprehensive method. A risk model of an IT project based on the Bayesian networks makes it possible to study different scenarios of risk occurrence by the simultaneous consideration of different factors in the external environment and internal state in the IT project, as well as their casual relations. The proposed model will make it possible to represent and estimate a risk probability for all possible scenarios and, accordingly, to develop effective measures for risk elimination. The proposed structure of the Bayesian network of an IT project risk could become a basis for the information technology of risk management in an IT project and an appropriate decision-making support system.

Текст научной работы на тему «Разработка комплексного метода управления рисками в проектах сферы информационнах технологий»

Запропоновано комплексний метод управлт-ня ризиками проектiв в галузi тформацшних тех-нологш на основi комбтованого використання ттелектуальних та евристичних методiв, що забезпечить тдвищення ефективностi проекту. Розроблено модель ризику 1Т проекту на основi мереж Байеса, що забезпечить визначення най-бшьш ймовiрного сценарю ризику та розробки адекватних заходiв протиди

Ключовi слова: комплексний метод, управлтня ризиками, мережi Байеса, ймовiрнiсть, експертт

методи, 1Т проект

□-□

Предложен комплексный метод управления рисками проектов в области информационных технологий на основе комбинированного применения интеллектуальных и эвристических методов, что позволит повысить эффективность проектов. Разработана модель риска ИТ проекта на основе сетей Байеса, что обеспечит возможность определения наиболее вероятного сценария риска и разработки адекватных мер борьбы

Ключевые слова: комплексный метод, управление рисками, сети Байеса, вероятность, экспертные методы, ИТ проект

UDC 330.131.7:330.4

|DOI: 10.15587/1729-4061.2018.128140]

DEVELOPMENT OF THE COMPREHENSIVE METHOD TO MANAGE RISKS IN PROJECTS RELATED TO INFORMATION TECHNOLOGIES

T. Prokopen ko

Doctor of Technical Sciences, Associate Professor Department of Information Technology Design* E-mail: t.prokopenko@chdtu.edu.ua O. G r i g o r PhD, Associate Professor Department of Economics and Entrepreneurship* E-mail: oleggregorrr@gmail.com *Cherkasy state technological university Shevchenka ave., 460, Cherkasy, Ukraine, 18006

1. Introduction

Project management in the field of information technology (IT) is characterized by complexity and uncertainty. Under current conditions, instability in the external environment, as well as in the internal environment, of an IT project does not make it possible to predict future results with high accuracy. Uncertainty is related to the following parameters: objective functions of an IT project, a set of acceptable IT project implementation strategies, an IT project investment portfolio, certain forecasts (for instance, price level), cost function parameters, etc. If one does not take into consideration the uncertainty of the future when making strategic decisions, it leads to negative consequences. Underestimation of uncertainty leads to the selection of those strategies that result in the emergence of risk situations [1].

The dynamics of implementation of an IT project requires a clear definition of goals, set of actions and decisions, definitive allocation of resources, adaptation to the external environment and internal coordination, which will ensure maximum effectiveness of the project at minimal risks. In the IT project planning process, it is necessary to provide for a choice of solution at each current moment, taking into consideration changes both in the external environment and in the conditions of the implementation of an IT project. Such an approach will ensure the achievement of the set goal in future. However, in most cases, it is rather difficult to predict exactly how these changes would occur. Particularly acute is the issue of planning an IT project under conditions of rapidly growing uncertainty and risks that have a decisive impact on future results. Therefore, it is important to manage the

risks of an IT project, which will reduce the over-spend of resources and losses in the project and thus will improve efficiency of the IT project. This substantiates the relevance of undertaking present research.

2. Literature review and problem statement

The uncertainty of the future is underestimated in most cases. Therefore, the use of traditional tools of forecasting and decision making, such as the analysis of discounted cash flows [2], the apparatus of statistical simulation of risk situations [3], and economic-mathematical models [4], does not yield the desired result.

The process of risk examination in various areas employs different methods. For example, when studying risks in the area of medicine, neural networks are widely used, covered in papers [5, 6]. In [7], authors propose an integrated risk assessment method for a portfolio of innovative projects based on the Monte Carlo simulation modeling. Underlying this method is the discounted cash flow model, as well as statistical studies into probabilities of the distribution of model parameters. It does not take into consideration the effect of external factors, which can lead to losses in a project. In paper [8], a dynamic risk model is investigated for a firm that invests capital in financial market assets. The proposed model is based on the investigation into a probability of bankruptcy of the firm.

When studying the risks of an IT project, author in [9] proposes a model for determining the priority of risk based on the probability indicator. This model makes it possible to

©

quantify the risks in an IT project and rank them for the development of control measures. Paper [10] reports the investigation into probabilistic structure of an IT risk in the form of a Markov model, which allowed a detailed representation of information about all possible transitions of the state of the system over time.

Paper [11] employs the causal and situational Ishikawa diagrams and logical-probabilistic modeling when studying information identification of causative relationships under the influence of active factors on the system. In article [12], author considers a cognitive risk model for a project in the field of information technology. The proposed cognitive model reflects interrelationships between the risks of an IT project, indicates the negative or positive impact of certain risks on the remaining risks in an IT project.

Papers [13, 14] explored risks for complex technological, organizational, and technological objects and complexes based on the cognitive approach. That made it possible to establish a causal link between risk factors and risky events, as well as measures to eliminate risks.

However, the considered methods and models of risk management in IT projects do not make it possible to study the factors that may be related through unknown and non-trivial relationships and lead to a risk event. In this case, obtaining information about a risk probability and factors generating them is possible by the application of expert methods. The use of modern management methods, including intelligent, is predetermined by the complexity of managing IT projects risks. Therefore, combined application of intelligent and expert methods would make it possible to study various scenarios of risk events and the development of appropriate countermeasures.

3. The aim and objectives of the study

The aim of present study is to develop a comprehensive method for risk management of an IT project based on the combined application of intelligent and expert methods, which would make it possible to improve the efficiency of an IT project.

To accomplish the aim, the following tasks have been set:

- to formalize the process of risk management in projects related to information technologies, which would provide support to decision making under instable conditions at the existing constraints for financial and time resources;

- to construct a risk model of an IT project based on Bayesian networks, which forms the basis of a comprehensive method for risk management.

4. Methods of research into risk management in IT projects

Uncertainty is one of the central concepts in modern theory and practice of management. Managing complex objects, in particular projects related to information technology, is performed under the influence of uncertain factors. These include such factors of the external and internal environment whose values are unknown or are not known in full. Despite the lack of information, a possible impact of uncertain factors should be taken into account in the process of making managerial decisions. If this does happen, then it is possible to argue about making decisions under conditions of

uncertainty. In a general case, uncertainty in decision making models should be understood as the existence of several possible outcomes of each alternative.

In [15], risk is considered to be a characteristic of the state of the system (consequences of a management decision, etc.), which operates under conditions of uncertainty, and is described by a set of events, the probability of this event and the function of losses. According to [16], risk is a situation where the outcome of a particular process is not known but its possible alternative consequences are known and there is enough information to assess the likelihood of occurrence of these consequences. That is, risk is regarded to be an event that may come with a certain probability. However, risk arises only under conditions of uncertainty. Uncertainty is the necessary and sufficient condition for risk in decision-making. One can also say that uncertainty creates a risk. Therefore, such a definition is more precise according to which risk is understood as the possibility of an unfavorable result under conditions of uncertainty [17]. Given this, it is necessary to investigate the uncertain factors causing the risk and to establish their causal relationships.

Solving a given task is impossible by applying traditional approaches based on formalized and deductive methods using the logical conclusion rules of the type "if - then". Therefore, it is necessary to apply a comprehensive combination of different methods in the management of risks in IT projects, which will allow taking into consideration existing precedents, and will be adapted to a specific situation.

The use of Bayesian networks will make it possible to analyze various factors both in the external environment and in an IT project, as well as to establish a dependence between them. The Bayesian networks ensure a dynamic account of new information as well as a comprehensive combination of expert estimates and statistical information. The basis of this method is formed by inductive justification at which hypotheses are constructed and evaluated based on experience and observations with a subsequent transition to regularities.

According to [18], a Bayesian network is a causal network, that is a network with causal connections. In the casual networks, the Bayesian classical theorem is used.

The Bayesian theorem. Let H1,H2,...,Hn be a pair of incompatible events and their total coincides with the entire selective space of events. Then for any random event X, which can occur only if one of the events H1, H2,..., Hn, occurs and such that P(X )^0, the following equalities hold:

p(Hk\X) = ) p(H) , k = 1,..,n. (1)

± p(X\H )■ p(H)

i=1

Variables that are used in the Bayesian networks can be both discrete and continuous. The character of information arrival when analyzing and making a decision may be both in real time and in the form of statistical arrays and databases. By representing the interaction between the process factors in the form of causal links, one achieves in the network the highest level of visualization and, as a consequence, a clear understanding of the essence of interaction between process factors. In contrast to fuzzy cognitive maps [19], the Bayes-ian networks are a promising probabilistic toolset for modeling complex hierarchical processes (static and dynamic) with uncertainties of arbitrary nature.

Probabilities p(X \ Hk) are set by experts a priori, which emphasizes the need to apply expert methods. Expert methods make it possible to obtain qualitative information in situations where the criteria of evaluation are rather new and complex, and the probability of any result cannot be calculated by statistical methods. Underlying the expert methods is the organization of work with specialists-experts and processing of expert opinions that can be expressed both quantitatively and in a qualitative form. The implementation of the expert estimation method is in rational organization of expert analysis of the problem with quantitative assessment of opinions and processing of their results. Experts act as a generator of objects (for example, external and internal risk factors) and a measure of characteristics (probability). A generalized opinion of experts is considered to be a solution to the problem. Thus, combined application of intelligent and heuristic methods will provide obtaining a synergistic effect by combining the strongest and the best sides of these methods.

Risk analysis and control

js. Approaches to risk elimination

Identification of risk- factors

Analysis of risk consequences

Losses amount

Probability

Data collection and processing

Control

Risk avoidance

Risk prevention

Risk stage acceptance

External methods of risk reduction

Assurance

Risk reduction

-C

-c

Funds r

Time reserve

Additional information receipt

Division

5. Results of research into a comprehensive method of risk management in an IT project

First of all, for effective risk management, it is necessary to determine what kind of uncertainty generates the risk, as well as the reasons for the occurrence of a risk event. In [20], authors considered the classification of uncertainties, identified subjective and objective causes of uncertainty, which enables the study of factors that generate risk in a life cycle and in the functioning of the product of an IT project. Projects in the field of information technology are characterized by multidimensionality, complexity of structures, the presence and change of many goals, activity, non-determinism, rapidly changing external circumstances, available constraints for financial and time resources. Over a life cycle of the project, there can be a large number of events that are difficult to predict. The occurrence of these events is possible due to the impacts from various factors in the external environment and in the project. They can be investigated by different scenarios and to determine their probability. Development of adequate countermeasures will make it possible to reduce the cost of resources and losses in an IT project, which would improve the effectiveness of a project.

The Software Engineering Institute, SEI, proposed a risk management procedure [21], which includes the following steps: identification, analysis, planning countermea-sures, accounting, and control. Based on this, we will build a basic IT risk management process (Fig. 1).

The methods used to analyze and measure the magnitude of risk are quantitative. However, a complete quantitative analysis is impossible in situations with a lack of statistical information about the possibility of a risk event. Therefore, it is important to establish a causal link between risk and the factors that generate it. Information about the environmental factors and the internal state of an IT project can be obtained using the expert estimation method. Therefore, a combination of intelligent and expert methods that will ensure receiving a synergistic effect and improve the quality of the results is effective. In accordance with this procedure, a comprehensive risk management method for an IT project consists of the following steps (Fig. 2).

Fig. 1. Basic procedure of risk management in an IT project

Fig. 2. Scheme of a comprehensive method of risk management in IT projects

The first and second stages of this comprehensive risk management method are implemented by interviewing the experts using the "intelligent assault" method. Specialists -members of project teams of various IT projects were engaged as experts. Experts discuss and analyze possible factors in the external environment and in an IT project that can lead to a risk event, using a universal academic example of an IT project. They also assess the probability of factors that generate risky events. The reliability of the examination is provided by a reasonable number of proposed factors, which makes it possible not to go beyond the psychological capabilities of experts. However, the obtained information depends on the competence of the experts, which is a limitation of this method.

At the third stage, the construction of the risk model of an IT project is performed based on the Bayesian networks, which is the basis of an integrated risk management method. To construct a risk model for a typical IT project based on the Bayesian networks, we determine the sample space of possible risks fl (that is, the set of events). Then, Risk eQ is the risk, fakt eQ is the factor that generates it. By using the Bayesian formula, we will determine whether there is the risk Risk, provided that the

factor-event fakt occurs, that is, we determine the probability of the risk Risk in the case the factor fakt occurs:

P (Risk\fakt) = P (Risk n fakt). v u ' P(Risk)

(2)

Then, the Bayesian rule, according to (1), will take the form:

P(Risk \ fakt) =

P (Risk \ fakt) ■ P( fakt) P(Risk) '

(3)

Thus, the Bayesian rule (3) makes it possible to establish a cause-and-effect link between the risk and the factor that generates it. Probabilities P(Risk | fakt) are set by experts a priori. In the case of obtaining additional information during the implementation of an IT project, this approach will provide clarification of the probability of risk occurrence.

Based on the main assumption about the Bayesian network construction theory (the events are exhaustive and do not intersect), we calculate the probability of occurrence of risk by formula:

p(Risk) = X p(Risk n fakti) =

i=i

n

= X p(Risk 1 fakt,) ■ p( fakt,).

i=1

Substitute (4) in (3) and obtain:

p(fakt | Riskk) ■ p(Risk k)

p(Riskk \ fakt) = -

£ p(Risk / faktt) ■ p( faktt)

(4)

(5)

We will build a risk model for an IT project based on the Bayesian network in the form of a polytree structure. The risk Risk1 is an increase in the value of the IT project generated by the following factors: fakt1 - increase in the number of operations; fakt2 - increase in the estimated cost of operations; fakt3 - an error when choosing and making a decision in the project; fakti - excess of resources; fakt5 - increase in work duration; fakt6 - developer error; fakt7 - a mistake in choosing a software tool; fakt8 -raising the price level; fakt9 - mistake in designing the strategy and planning of the project; fakt10 - force majeure circumstances.

C

(^fakt^J--

In this structure of the Bayesian network of risk Risk1, different types of links between the vertices are established. For example, between the vertices fakt10, fakt5 and fakt2the linear type of link is established, and between the vertices fakt8, fakt7 and fakti is convergent type, between vertices fakti, fakt2, fakt1 - divergent. Different types of links between vertices provide an opportunity to analyze various risk scenarios Risk1 - increasing the value of the IT project.

At the fourth stage, by analyzing the built Bayesian network (Fig. 3), we determine the probability of a risk occurrence Risk1 - an increase in the value of the IT project by using the Bayesian theorem. For each of the vertices of the factors fakt6, fakt8, fakt9 and fakt10 the nominal probabilities are determined using the expert survey presented in Table 1 (T - true, F - false).

Table 1

Table of nominal probabilities of risk-factors

Vertex Probability

T F

fakt6 0.36 0.64

fakt7 0.21 0.79

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

fakt8 0.42 0.58

fakt9 0.4 0.6

fakt10 0.02 0.98

fakt3 0.83 0.17

fakt4 0.2 0.8

fakt5 0.5 0.5

fakt2 0.34 0.66

fakt1 0.42 0.58

By using the Bayesian formula (5), based on the values of nominal probabilities of vertices based on data from Table 1, and by using the Bayesian classical theorem, we calculate the probability of risk Risk1 for different scenarios. As an example, consider the calculation of risk probability Risk1 for the scenario of factors fakt9, fakt6, fakt3, fakt1 by applying a simple algorithm of direct distribution of information in the Bayesian network using the Bayesian theorem.

Fig. 3. The Bayesian network of risk Risk\ — an increase in the IT project cost

P( faits)

faits 1 faits 0

0,36 0,64

P( fakt,)

fakt, 1 fakt, 0

0,4 0,6

Vertices values P(fakt3 / fakts, fakt,)

fakt3 0 fakt3 1

fakts 0 fakt, 0 0,83 0,17

fakts 0 fait, 1 0,5 0,5

faits 1 fakt, 0 0,5 0,5

faits 1 fakt, 1 0 1

Fig. 4. Fragment of the Bayesian network in the form of tables of nominal probabilities of vertices, which correspond to data from Table 1

P (fakt3 = 0) = P( fakt3 = 01 fakt6,fakt9 = 0) = = P(fakt3 = 0, fakt6 = 0, fakt9 = 0) + P(fakt3 = 0, fakt6 = 1, fakt9 = 0) = = P( fakt3 = 01 fakt& = 0, fakt9 = 0) ■ (fakt& = 01 fakt9 = 0) x xP( fakt9 = 0) + P( fakt^fakt^ = 1, fakt9 = 0) ■ P (fakt9 = 0) = = 0,83 0,8 1 + 0,5 0,2 1 = 0,764;

P (fakt3 = 1) = P( fakt3 = 11 fakt6,fakt9 = 0) = = P(fakt3 = 1, fakt6 = 0, fakt9 = 0) + P(fakt3 = 1, fakt6 = 1, fakt9 = 0) =

= P( fakt3 = 11 fakt& = 0, fakt9 = 0) ■ (fakt& = 01 fakt9 = 0) x xP( fakt9 = 0) + P(fakt3 = 11 fakt& = 1, fakt9 = 0) x xP( fakt9 = 0) ■ P(fakt6 = 11 fakt9 = 0) x x P(fakt9 = 0) = 0,17 0,8 1+0,5 0,2 1 = 0,236;

P (faktx = 0) = P (faktx = 01 fakt3 = 0) = = 0,764 0,42 = 0,32;

P (faktx = 1) = P (faktx = 11 fakt3 = 0) = = 0,236 0,58 = 0,137.

Perform similar calculations for all possible risk scenarios Risky As a result, for different scenarios, we will obtain different values of the probability of risk occurrence Risk1 -an increase in the IT project cost. Thus, we have:

- for scenario fakt6, fakt3, fakt1 probability value Risk1: P1 = 0,764;

- for scenario fakt9, fakt3, fakt1 probability value Risk1: p2 = 0,236;

- for scenario fakt8, fakti, fakt1 probability value Risk1: P3 = 0,215;

- for scenario fakt7, fakti, fakt1 probability value Risk1: p4 = 0,096;

- for scenario fakt8, fakti, fakt2 probability value Risk1: p5 = 0,162;

- for scenario fakt7, fakti, fakt2 probability value Risk1: P6 = 0,117;

- for scenario fakt10, fakt5, fakt2 probability value Risk1: p7 = 0,278.

Based on the obtained value Risk1 we can conclude that the most dangerous scenario is fakt6, fakt3, fakt1. Under this scenario, a mistake of the developer leads to a wrong choice and decision making in the project, which causes an increase in the number of operations. Thus, the cost of the IT project increases.

At the fifth stage of the comprehensive IT risk management method, we determine the initial set of effective measures to reduce the risk of occurrence in accordance with the investigated risk scenarios and taking into consideration constraints for financial F and time T resources.

To do this, we assign a set of solutions R ={R1,... ,R„} to each element from the set of obtained risk probabilities Riskx P = {px,...,pn}. Each solution is represented as a set R¡ = {Rix,...,Rim}, where Rj is the set of basic and contingency measures aimed at avoiding the risk according to factors j = 1,...,m.

Given the constraints for financial F and time T resources, we divide set R into classes of decisions Kx,...,K , so that:

U K = R, Kh n K = 0, (6)

1

where

U1J2 e{1,..,g}, g < n, l1 * l2.

This problem has two classes of solutions:

KX(F<F0,T<T0) and ^(F>F0,T>T0),

where F0, T0 are the boundary values of investments and duration of the project, respectively. According to the example of scenario fakt6, fakt3, fakt1, the set of solutions R1 consciously satisfies the imposed constraints for resources, that is, it belongs to class K1, and for scenario fakt7, fakti, fakt2 according to the resource possibilities -to class K2.

Among classes K1, K2, K1, is prevailing, which is why in accordance to the calculated probability p1 of the risk scenario Risk1, we select a set R of appropriate measures to reduce the risk level. Therefore, when devising an IT project plan, special attention should be paid to the choice of a strategic alternative to the IT project, planning of resources in the IT project, as well as a thorough selection of the project team.

6. Discussion of results of research into a comprehensive method of risk management in an IT project

A comprehensive method of project risk management in the field of information technologies is designed to support management decisions under unstable conditions and makes it possible to study various risk scenarios and to establish initial response measures, taking into consideration constraints for financial and time resources. At the same time, different factors of the environment and internal state of the IT project are considered. The built risk model based on the Bayesian network makes it possible to study the cause-and-effect link between risk and its generating factors and calculate the risk probability under different scenarios. Therefore, their application enables the prediction of results of an IT project and improves performance indicators over long intervals of time.

An integrated risk management method is based on the combined application of intelligent and expert methods.

Expert methods provide information in situations where it is not possible to apply other methods, such as statistical ones. However, the application of expert methods depends on the competence of experts and methods of expert survey, which is a limitation of a given comprehensive method. Therefore, the improvement of the selection procedure and the procedure of an expert survey will further develop our study. The use of statistical methods, as an alternative to expert methods, will make it possible to obtain experimental data, but will not allow the possibility of taking into account predictive information in situations with uncertain parameters.

A comprehensive risk management method for IT projects ensures reduction in risk when making decisions in IT projects. The result of the application of this method is an increase in the effectiveness of an IT project by reducing the over-spend of resources and bringing down losses in the project. It also provides a forecast of risk events during project implementation under conditions of uncertainty with the aim of developing effective measures for risk avoidance or its minimization.

The proposed Bayesian network structure can be used as the basis for risk management information technology in an IT project and the appropriate decision support system. Information technology of risk management in an IT project will make it possible to collect, maintain, edit, process,

represent and disseminate information about risks in an IT project and is the subject of further articles.

7. Conclusions

1. The process of risk management in IT projects was formalized by synthesizing expert estimation methods and intelligent data analysis that will support decision-making under unstable conditions in the presence of constraints for financial and time resources.

The proposed comprehensive risk management method was developed for a project in the field of information technology using a universal academic example. This method represents a technique for formally predicting future problems and opportunities that will ensure the implementation of an IT project over planned period. The result of applying this comprehensive risk management method is an increase in the effectiveness of an IT project by reducing project losses and over-expenditure of financial resources.

2. The constructed risk model of an IT project based on the Bayesian networks is the basis for a comprehensive risk management method. This model makes it possible to represent the cause-and-effect link between risk and the factors that generate it, as well as the calculation of risk probabilities for all possible scenarios.

References

1. Prokopenko T. O., Ladanyuk A. P. Information technology management organizational and technological systems: monograph / S. G. Kandych (Ed.). Cherkasy: Vertical, 2015. 224 p.

2. Peresada A. A., Mayorova T. B. Project financing: monograph. Kyiv: KNEU, 2007. 767 p.

3. Klyachkin V. N. Statistical methods in quality management: computer technologies: tutorial. Moscow: Finance and Statistics, 2009. 304 p.

4. Babenko S. V., Babenko G. V. Economic-mathematical model of risk management in integrated development of the territory // Economic science today. 2013. Issue 1. P. 260-270.

5. Automatic Variable Selection and Rule Extraction Using Neural Networks / Lisboa P. J. G., El-Deredy W., Vellido A., Etchells T., Pountney D. C. // Proceedings of the 15th IMACS World Congress on Scientific Computation, Modelling and Applied Mathematics. Berlin, 1997. P. 461-466.

6. Zolin A. G., Silaeva A. Yu. Application of neural networks in medicine // Actual problems of science, economics and education of the XXI century. 2012. P. 264-271.

7. Demkin I. V., Pertsev D. V. Method of estimation of the integrated risk portfolio of innovative projects // Management problems. 2009. Issue 4. P. 39-45.

8. Gonchar N. S. Dynamical Risk Model with Investment in Assets // Journal of Automation and Information Sciences. 2014. Vol. 46, Issue 5. P. 15-34. doi: 10.1615/jautomatinfscien.v46.i5.20

9. Joseph W. Mayo Risk Management for IT Projects // 2009. URL: http://www.isaca.org/Groups/Professional-English/risk-man-agement/GroupDocuments/Effective_Project_Risk_Management.pdf

10. A formal model for pricing information systems insurance contracts / Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopou-los A. N., Katsikas S. // Computer Standards & Interfaces. 2005. Vol. 27, Issue 5. P. 521-532. doi: 10.1016/j.csi.2005.01.010

11. Sikora L. S., Lisa N. K., Tkachuk R. L. Logiko-kognitivnaya model information identification causative relationships under the influence of active factors on the system // Modeling and Information Technology. 2016. P. 152-165.

12. Onishchenko I. I. Cognitive modeling as a method of qualitative analysis of IT projects // Bulletin of NTU "KhPI". Series: Strategic Management, Portfolio, Program and Project Management. 2016. Issue 2. P. 77-81. doi: 10.20998/2413-3000.2016.1174.17

13. Ladaniuk A., Prokopenko T., Reshetiuk V. The model of strategic management of organizational and technical systems, taking into account risk-based cognitive approach // Annals of Warsaw University of Life Sciences - SGGW Agriculture (Agricultural and Forest Enginweering). 2014. Issue 63. P. 97-104.

14. Prokopenko T. A., Lega Yu. G., Molotilin Yu. I. Risk management of the technological complex of the sugar factory // Izvestiya Vuzov. Food technology. 2014. Issue 2-3. P. 110-112.

15. Kiryushkin V. E., Larionov I. V. Fundamentals of Risk Management: monograph. Moscow: Ankil, 2009. 130 p.

16. Damodaran A. Strategic risk management. Principles and methods: monograph. Moscow: Williams, 2010. 496 p.

17. Kuntsevich C. M. Upravlenie v yslpviyah neopredelenosti: garantirovanie rezyltati v zadachah upravleniya i identefikacii: monograph. Kyiv: Naykova dymka, 2006. 264 p.

18. Bidyuk P. I., Terentyev O. M., Konovalyuk M. M. Bayesovsky networks in the technologies of intellectual data analysis // Scientific papers Black Sea State University named after Petro Mohyla. Ser.: Computer technology. 2010. Vol. 134, Issue 121. P. 6-16.

19. Kosko B. Fuzzy cognitive maps // International Journal of Man-Machine Studies. 1986. Vol. 24, Issue 1. P. 65-75. doi: 10.1016/ s0020-7373(86)80040-2

20. Prokopenko T. O. Classification of uncertainties in the management of organizational and technological objects // Technology audit and production reserves. 2014. Vol. 6, Issue 4 (20). P. 23-25. doi: 10.15587/2312-8372.2014.30336

21. Assessing DoD System Acquisition Supply Chain Risk Management / Christopher J. A., Haller J., Wallen C. M., Woody C. // Operations and Maintenance. 2017. P. 4-8.

Розроблено методи перевiрки правил знання-орiен-тованих систем контролю, запропонована методика, яка регламентуе використання методiв для усу-нення помилок. Представлен компоненти та етапи функщонування знання-орiентованих систем контролю, створений редактор правил i системи контролю для двох предметних областей. Аналiз результа-тiв в системах управлтня навчанням показав полт-шення якостi навчання i зменшення часу виконання самостшних завдань.

Ключовi слова: методи перевiрки правил контролю, 1/АБО-граф, булевi вирази, знання-орiентованi системи, управлтня навчанням

□-□

Разработаны методы проверки правил, применяемые при работе знание-ориентированных систем контроля, предложена методика, регламентирующая использование методов с целью устранения найденных ошибок. Представлены компоненты и этапы функционирования знание-ориентированных систем контроля, создан редактор правил и системы контроля для двух предметных областей. Анализ результатов в системах управления обучением показал улучшение качества обучения и уменьшение времени выполнения самостоятельных заданий.

Ключевые слова: методы проверки правил контроля, И/ИЛИ-граф, булевы выражения, знание-ориентированные системы, управление обучением

UDC 004.02 : 004.825 : 004.942

|DOI: 10.15587/1729-4061.2018.127956|

DEVELOPMENT OF KNOWLEDGE-BASED CONTROL SYSTEMS WITH BUILT-IN FUNCTIONS OF RULES VERIFICATION AND CORRECTION

V. Ruvi nskaya

PhD, Professor* E-mail: iolnlen@te.net.ua A. Troynina

PhD, Associate Professor* E-mail: anastasiyatroinina@gmail.com *Department of system software Odessa National Polytechnic University Shevchenka ave., 1, Odessa, Ukraine, 65044

1. Introduction

Modern monitoring and control systems are equipped, as a rule, with object parameter analyzing blocks which facilitate drawing conclusions on the emerging situations and carrying out control on this basis. It is advisable to develop knowledge-based systems for comprehensive object analysis which allows the decision maker (DM) to change the analysis rules [1]. Such systems based on facts and rules make it possible to describe states of the controlled objects and the conditions under which they arise [2].

For interactive work with control rules, special structuring of rules and such mathematical model as the AND/ OR graph are used [3]. Due to the better visualization of rule presentation, this approach enables the expert to form knowledge for control systems at early stages of construction of the knowledge field.

When forming control rules, unforeseen errors may occur, so it is important to be able to find them in an automated mode. Therefore, development and improvement of methods for verification of control rules and elaboration of a procedure for their use both in searching for and elimination of errors is a focal problem.

2. Literature review and problem statement

Theory is inconsistent if there is such an assertion that bothensues from the theory and is negated by it: T ^ ^ and T ^^ where T is theory and 9 is assertion.

In [4], inconsistencies in the knowledge-based system are divided into external (the inconsistencies between the production system and the world model) and internal inconsistencies in the production system. The latter mean that (1)

©

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.