Development of a model of the useful effect of the system at different levels of subsystem interchangeability in the problem of optimizing the allocation of a limited resource

Authors

DOI:

https://doi.org/10.15587/1729-4061.2025.342299

Keywords:

scalar convolution, resource optimization, utility effect, optimal solution trajectories, cybersecurity, information systems

Abstract

The object of this study is the process of optimizing the allocation of limited resources among the subsystems of a large complex system. The problem addressed lies in the insufficient adequacy of existing utility models, which fail to account for the degree of subsystem interchangeability and therefore cannot accurately predict optimal resource distribution. The core result is the development of a universal utility model based on logistic dependencies and a flexible scalar convolution constructed using a modified marginal Kolmogorov-Gabor polynomial with the coefficient kAdd, which governs interchangeability. Complete trajectories of optimal solutions were obtained for various values of total resources and interchangeability levels. It was found that variations in these parameters alter the optimal effect by 25–35% under conditions of significant resource scarcity. The problem was resolved by combining the universality of logistic models with the flexibility of the new convolution, which generalizes additive, multiplicative, and minimizing forms and enables continuous adjustment of the model to reflect subsystem interaction characteristics. The observed patterns indicate that at low interchangeability, resources are distributed more evenly, while at high interchangeability, they are concentrated in the most efficient subsystem, significantly enhancing the overall effect under resource deficit conditions. The results are applicable to the design and management of large complex systems – such as IT security, crisis management, and organizational design – where informed decisions are required regarding the allocation of limited resources while considering structural flexibility. This approach is particularly suitable when statistical data are available for calibrating the logistic parameters of subsystems and assessing their interchangeability

Author Biographies

Viktor Shevchenko, Institute of Software Systems of the National Academy of Sciences of Ukraine

Doctor of Technical Sciences, Professor, Deputy Director for Scientific Work

Yuriy Syvytsky, Institute of Software Systems of the National Academy of Sciences of Ukraine

PhD Student

Yevhen Derevianko, Institute of Software Systems of the National Academy of Sciences of Ukraine

PhD Student

Oleh Bakaiev, Institute of Software Systems of the National Academy of Sciences of Ukraine

PhD Student

Olha Korol, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Cybersecurity

Serhii Pohasii, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Science, Associate Professor

Department of Cybersecurity

Serhiy Laptiev, State University "Kyiv Aviation Institute"

Doctor of Philosophy (PhD)

Tetyana Laptieva, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Philosophy (PhD)

Department of Cybersecurity

Khazail Rzayev, Azerbaijan Technical University

Doctor of Technical Sciences, Associate Professor

Department of Computer Technologies

Oleksii Komar, State University "Kyiv Aviation Institute"

PhD, Associate Professor

Department of Information Security Systems

References

  1. Bova, Y., Ismahilov, A., Syvachenko, I. (2024). Models and methods of assessing software information security in conditions of limited computing resources. Transactions of Kremenchuk Mykhailo Ostrohradskyi National University, 146 (3), 79–85. https://doi.org/10.32782/1995-0519.2024.3.11
  2. Zhebka, V., Tkachenko, O., Zhebka, V. (2020). Factor analysis of the effectiveness of regional production development processes. International scientific journal «Danish Scientific Journal», 35 (4), 17–21. Available at: https://www.danish-journal.com/wp-content/uploads/2024/03/DSJ_35_4.pdf
  3. Khmelevskoy, R., Laptiev, S., Laptievа, T. (2021). Improving the Method of Assessing the Information Security of Computer Systems from Malicious Software. International Journal of Science and Engineering Investigations (IJSEI), 10 (113), 43–48. Available at: https://www.ijsei.com/papers/ijsei-1011321-07.pdf
  4. Bychkov, A. S., Navotna, V., Shevchenko, V. I., Shevchenko, A. V. (2019). Improvement of the Model of Computer Epidemics Based on Expanding the Set of Possible States of the Information Systems Objects. Journal of Automation and Information Sciences, 51 (11), 34–49. https://doi.org/10.1615/jautomatinfscien.v51.i11.40
  5. Bychkov, A. S., Dimitrov, G. P., Shevchenko, V. L., Shevchenko, A. V. (2020). Perfection of Computer Epidemic Model by Estimation of Functional Stability of the Information System. Journal of Automation and Information Sciences, 52 (1), 29–40. https://doi.org/10.1615/jautomatinfscien.v52.i1.40
  6. Shevchenko, V. L., Nesterenko, O. V., Netesin, I. Ye., Shevchenko, A. V. (2019). Prohnostychne modeliuvannia kompiuternykh virusnykh epidemiy. Kyiv: UkrNTs RIT, 152. Available at: http://e.ieu.edu.ua/handle/123456789/647
  7. Syvytsky, Y., Shevchenko, V. (2024). Computer Simulation Model of the Organization at the Stage of Transformation for the Purpose of Adaptation to New Projects. 14th International Scientific and Practical Conference from Programming UkrPROG’2024, 421–433. Available at: https://ceur-ws.org/Vol-3806/S_61_Shevchenko_Syvytskyi.pdf
  8. Sobchuk, V., Laptiev, S., Laptievа, T., Barabash, O., Drobyk, O., Sobchuk, A. (2024). A modified method of spectral analysis of radio signals using the operator approach for the fourier transform. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 14 (2), 56–61. https://doi.org/10.35784/iapgos.5783
  9. Datta, S., Kapoor, R., Mehta, P. (2023). A multi-objective optimization model for outpatient care delivery with service fairness. Business Process Management Journal, 29 (3), 630–652. https://doi.org/10.1108/bpmj-07-2022-0335
  10. Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. https://doi.org/10.1016/j.heliyon.2023.e16828
  11. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S., Pohasii, S. et al. (2021). Synergy of building cybersecurity systems. Kharkiv: TECHNOLOGY CENTER PC. https://doi.org/10.15587/978-617-7319-31-2
  12. Bakaiev, O., Syvachenko, I., Shevchenko, V. (2024). Scalarization of the vector criterion of information system survivability based on information security indicators. Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II 2024), 294–300. Available at: https://ceur-ws.org/Vol-3826/short20.pdf
  13. Shevchenko, V. L. (2011). Optymizatsiyne modeliuvannia v stratehichnomu planuvanni. Kyiv: TsVSD NUOU, 283.
  14. Ivakhnenko, A. G. (1971). Polynomial Theory of Complex Systems. IEEE Transactions on Systems, Man, and Cybernetics, SMC-1 (4), 364–378. https://doi.org/10.1109/tsmc.1971.4308320
  15. Qian, N., Gao, J., Li, Z., Yan, Z., Feng, Y., Yan, Z., Yang, L. (2024). Bridging the Terrestrial Water Storage Anomalies between the GRACE/GRACE-FO Gap Using BEAST + GMDH Algorithm. Remote Sensing, 16 (19), 3693. https://doi.org/10.3390/rs16193693
  16. Achite, M., Katipoğlu, O. M., Kartal, V., Sarıgöl, M., Jehanzaib, M., Gül, E. (2025). Advanced Soft Computing Techniques for Monthly Streamflow Prediction in Seasonal Rivers. Atmosphere, 16 (1), 106. https://doi.org/10.3390/atmos16010106
  17. Guide to the Project Management Body of Knowledge (PMBOK® Guide)–Sixth Edition (2017). Project Management Institute.
  18. A Guide to the Project Management Body of Knowledge PMBOK, 7-th edition (2021). Project Management Institute, Inc., 370. Available at: https://tegnum.edu.pe/wp-content/uploads/2023/09/Project-Management-Institute-A-Guide-to-the-Project-Management-Body-of-Knowledge-PMBOK-R-Guide-PMBOK%C2%AE%EF%B8%8F-Guide-Project-Management-Institute-2021.pdf
  19. Antunes, M., Maximiano, M., Gomes, R., Pinto, D. (2021). Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 1 (2), 219–238. https://doi.org/10.3390/jcp1020012
  20. Handri, E. Y., Putro, P. A. W., Sensuse, D. I. (2023). Evaluating the People, Process, and Technology Priorities for NIST Cybersecurity Framework Implementation in E-Government. 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), 82–87. https://doi.org/10.1109/icocics58778.2023.10277024
  21. Fedoriienko, V. (2021). Model of the special software development and modification based on account factors of complexity, workability, qualification of programmers and resource limitations. Political Science and Security Studies Journal. Przeworsk, 2 (2), 94–104. https://doi.org/10.5281/zenodo.5544382
  22. Rabchun, D. I. (2015). Otsinka efektyvnosti informatsiynoi bezpeky z urakhuvanniam ekonomichnykh pokaznykiv. Suchasnyi zakhyst informatsiyi, 4, 91–96. Available at: https://journals.dut.edu.ua/index.php/dataprotect/article/view/429/397
  23. Shevchenko, V., Shevchenko, A., Fedorenko, R., Shmorhun, Y., Hrebennikov, A. (2019). Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses. 2019 IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), 1–5. https://doi.org/10.1109/cadsm.2019.8779299
  24. Sridhar, S. Exhaustive Searching and Combinatorial Optimization Problems. Available at: https://ebooks.inflibnet.ac.in/csp5/chapter/exhaustive-searching-and-combinatorial-optimization-problems/
  25. Svynchuk, O., Barabash, O., Nikodem, J., Kochan, R., Laptiev, O. (2021). Image Compression Using Fractal Functions. Fractal and Fractional, 5 (2), 31. https://doi.org/10.3390/fractalfract5020031
Development of a model of the useful effect of the system at different levels of subsystem interchangeability in the problem of optimizing the allocation of a limited resource

Downloads

Published

2025-10-30

How to Cite

Shevchenko, V., Syvytsky, Y., Derevianko, Y., Bakaiev, O., Korol, O., Pohasii, S., Laptiev, S., Laptieva, T., Rzayev, K., & Komar, O. (2025). Development of a model of the useful effect of the system at different levels of subsystem interchangeability in the problem of optimizing the allocation of a limited resource. Eastern-European Journal of Enterprise Technologies, 5(4 (137), 64–75. https://doi.org/10.15587/1729-4061.2025.342299

Issue

Section

Mathematics and Cybernetics - applied aspects