Mathematical Machines and Systems. 2023 #3

ABSTRACTS


COMPUTER SYSTEMS

UDC 681.3

The article considers the role of artificial intelligence and robotics in the modern military sphere. It describes how since the beginning of the 21st century, robots have become an integral part of military operations, providing a wide variety of opportunities for the armies of various countries. The prospects for the development of autonomous robots with artificial brains that can operate without continuous human control are considered. Human brain modeling projects are considered in the context of creating electronic brains and smart systems capable of imitating and even surpassing the work of a biological brain. The world human brain modeling projects are briefly reviewed, and their comparative characteristics are given. The Ukrainian project Thinking Computer (Artificial Brain) is described in the paper. The project is a new approach in computerization based on the latest non-traditional technology for the simultaneous processing of various types of information in a single homogeneous multidimensional active associative neuron-like structure that allows creation of a new type of humanoid thinking machines. The article tells about the technological basis of the project, its goals and objectives, as well as the effect of the introduction of the proposed technology. The article describes in detail the principles of operation and features of the new technology of a multi-connected, multidimensional, receptor-effector actively associative neural-like growing network, which has no analogs in modern neural networks. It also explains what advantages thinking computers have over traditional ones, and what prospects the new technology opens up for various areas of human activity. The article demonstrates the research findings and developments regarding the creation of a prototype of an electronic brain for a humanoid robot, as well as plans for organizing the industrial production of thinking computers. In addition, it substantiates the relevance and necessity of implementing the Thinking Computer project to increase the competitiveness and security of Ukraine in the global community. Refs.: 14 titles.


UDC 623.764

Sapaty P.S. Simulating distributed consciousness with spatial grasp model. Mathematical machines and systems. 2023. N 3. P. 13–30.

This work is focused on the organization and management of large distributed dynamic systems supplied with global awareness and consciousness, being based on different organizational philosophy, model and technology using holistic, self-spreading, recursive code rather than managing distributed systems as parts exchanging messages. The paper reviews many existing works and publications related to consciousness ideas, which have been appearing for centuries, grouping them into different categories and providing short abstracts for each. It summarizes the main ideas of the Spatial Grasp Model and Technology (SGT) reflecting general technology aspects and its Spatial Grasp Language (SGL) with its distributed interpretation in open networks. The article also compares SGT with the work on mobile agents through its predecessor WAVE using code mobility and emphasizing that the developed spatial paradigm is much more universal and powerful and that it was implemented many years before mobile agents. A simple example in SGL that demonstrates managing a swarm of chasers searching for scattered targets, providing it with higher awareness and consciousness, and improving performance is provided in the paper. The idea of the existence of global awareness and even the consciousness of the whole country is introduced by representing it as the integrity of vital components like the economy, society, defense, ecology, and government. The paper also provides some examples of solutions in SGL to very practical problems in these fields. Obtaining and simulating consciousness-related features like global feelings and opinions is discussed, which may fundamentally influence the development of the whole system. A concluding summary is provided on the potential applicability of SGT for different consciousness categories. The paper confirms the efficiency of the spatial model and technology for simulating different awareness and consciousness features in various distributed systems. Figs.: 11. Refs.: 58 titles.


  
      INFORMATION AND TELECOMMUNICATION TECHNOLOGY

 

UDC 004.056

Lysetskyi Yu.M., Kalbazov D.Y. Information security of corporate databases. Mathematical machines and systems. 2023. N 3. P. 31–37.

Every day, companies all over the world collect and generate a large amount of data. Now information is digital and is stored in automated digital databases, the use of which allows for processing large amounts of data that previously were difficult to process. Protecting corporate databases and the information within them is essential for economic security. It includes their physical protection, productivity assurance and monitoring, data protection from destruction or damage, access control, and recording of new databases appearing in the infrastructure. However, since users of different types and levels of access (internal users, system administrators, contractors, partners, and M2M communications) have access to databases, they can abuse their access rights in several ways. These may be an abuse of excessive, objectively necessary, or non-used rights. As a rule, an inefficiently controlled process of granting access rights creates excessive access rights which in turn may cause new information security risks. Security measures include implementing an access management process, granting minimally necessary access rights, and implementing a mechanism to control and block the given access rights. This article discusses such threats to databases as SQL Injections and NoSQL injection attacks, insufficient detailing of events in databases, backup leaks, vulnerabilities and configurations, DDoS attacks, and methods to counter these threats. The most effective way to protect databases is to implement specialized software and hardware complexes such as Imperva DBS and Imperva WAF developed for database protection. The use of Imperva DBS will help to solve all the key tasks of database protection and provide complete visibility and control over their usage in the enterprise infrastructure. Figs.: 4. Refs.: 9 titles.


UDC (64.012.25+614.8):001.8

When studying the processes of counteracting emergencies, the problem of structuring these processes arises. This problem can be considered from the point of view of two levels of abstraction: general theoretical and problem-oriented. If the general theoretical level involves the identification of general concepts and principles that underlie the planning of appropriate sequences of operations, which together form electronic action plans, then the problem-oriented level involves taking into account the problem specifics of the emergency under study. The general theoretical level of abstraction of the problem of structuring counteraction processes was considered in the first part of the methodological bases for creating electronic action plans to deal with emergencies. This article is the second part of the methodological bases, in which the problem of structuring is considered from the point of view of a problem-oriented level of abstraction. Six steps that need to be followed in the process of building an electronic action plan are outlined and analyzed. Informative examples demonstrate the features of the presentation of emergency response technologies in electronic action plans. In particular, the features of representing parallel processes in electronic action plans, building components of an electronic action plan for choosing alternatives between emergency response technologies and sequential planning of a number of emergency response tasks are shown. A comparison of the proposed methodological bases with the methodological bases for creating traditional action plans is made, and significant differences in the results of applying these methodological bases when creating the corresponding action plans are demonstrated. The advantages of using electronic action plans as part of the DSS SPOR to solve the problems of operational management of emergency response in situational centers are substantiated. Figs.: 6. Refs.: 9 titles.


UDC 004.273

The development of information system architectures for e-commerce is a crucial task for businesses in today's digital environment. This article presents a comparative analysis of different types of information system architectures used in e-commerce. The paper examines the specific characteristics of e-commerce and the requirements of web applications that support electronic business operations. Traditional monolithic architecture, microservices architecture, and serverless architecture have been characterized, and their advantages and disadvantages have been identified. Technological solutions in the field of e-commerce development have been studied to create an efficient and user-friendly platform. The article highlights such key architectural aspects as scalability, flexibility, deployment speed and management, reliability, and development and operational costs. The impact of each architecture type on performance and alignment with e-commerce business needs has been analyzed. This analysis will assist in the creation or modernization of information systems for e-commerce, enabling an informed choice of architectural approach. The article specifically examines the advantages and disadvantages of microservices architecture for developing e-commerce web applications, particularly using the Spring Boot framework. It explores how microservices can provide modularity and facilitate the development, deployment, and maintenance of e-commerce web applications. Such challenges of microservices architecture as managing and coordinating services, as well as addressing data consistency and transaction management in distributed environments have been discussed. Some possible approaches and technical tools to overcome these challenges in the context of e-commerce web applications based on Spring Boot have been considered. Fig.: 1. Refs.: 7 titles.



UDC 004.772

The provision of necessary information for the operations of any medical institution is a complex and labor-intensive process aimed at addressing professional, organizational, and social challenges. Effective information support in the healthcare sector is crucial for the quality of medical services at all stages and levels, ranging from primary healthcare to online consultations. This article explores the key aspects of designing an information infrastructure, including the selection of necessary technologies, system architecture development, and integration with existing medical processes. The paper delves into the process of analyzing the information exchange and processing needs of a medical enterprise. Key requirements and functional capabilities of a medical information system are identified. The importance of efficient information support in medical facilities to enhance the quality of healthcare services is justified, with particular emphasis on the protection of confidential medical information. Security measures such as data encryption, access control, and backup systems are considered. Additionally, practical aspects of implementing a medical information system, including requirement analysis, data protection, and staff training, are examined. The significance of developing and implementing access control systems to restrict access to medical data only to authorized personnel is highlighted. Based on the analysis of the domain and initial customer requirements, functional and non-functional requirements for the proposed information system are formulated, and system behavior is modeled through the construction of UML diagrams and class diagrams with accompanying specifications. Special attention is given to the development of an additional feature for labeling critical patient syndromes. Fig.: 1. Refs.: 5 titles.


                                    
                              SIMULATION AND MANAGEMENT

UDC 004.5

The scenario approach in the field of decision-making for military structures implies carrying out research, the purpose of which is a detailed description of activities that allows for confirming and determining management measures and avoiding future dangers based on consideration of the broadest possible range of options for the possible sequences of events. So it is unsurprising that methodological problems in computer modeling of different scenarios are still relevant. The authors of the article propose an approach to modeling decision-making scenarios based on graphic methods of BPMN notation, Knowledge Graph technology, and OWL models to provide a semantic analysis of the developed scenario. As an example of the offered approach to the development of a decision-making scenario, the task «Planning of combat operations and management of the naval unit» has been chosen. The approach lets the authors demonstrate the advantages of the approach both during the formation of the scenario in general and at the stages of its implementation with a simulation complex that simulates the work of functional subsystems and consists of modules completing the tasks of each subsystem. The introduction of an ontology into the scenario model contributes to the semantic consistency of the scenario processes and improves the structure of the scenario model by identifying and eliminating hidden errors and inconsistencies. Using the Neo4j graph database (as a knowledge-based technology) allows for visualizing and detecting anomalies in BPMN models by analyzing dependencies and relationships between the elements and using the graph algorithms to find deviations, identify cycles, determine the shortest paths, and optimize processes. The proposed methodology makes it possible to significantly reduce the number of errors in the scenario model, which subsequently significantly increases the effectiveness of modeling the organizational and functional structure and actions of officials when performing combat tasks with the simulation complex. The considered scenario is one of many others developed to explore the management processes of a naval unit that make up the knowledge base of the simulation complex scenarios. The simulation results have proven that the simulation complex can be used to work out a promising automated control technology for naval and air forces. Таbl.: 3. Figs.: 11. Refs.: 22 titles.


UDC 004.457

Kovalenko O.Ye. Convergence of the Internet of Things and situation management systems. Mathematical machines and systems. 2023. N 3. P. 89–103.

Quick and accurate provision of information in the processes of situational management acquires special importance in the critical areas of application – the prevention and elimination of the consequences of catastrophic events, the management of military operations, medical activities, the management of energy systems, etc. The goals and objectives of activities in these areas also determine the specifics of building appropriate situation management systems for them. The functioning of such systems is based on obtaining accurate and current information about the environment in which situational management is carried out. The convergence of situation management systems with the means of wireless sensor networks (Wireless Sensor Networks, WSN) and the Internet of Things (IoT) ensures obtaining such information. The article analyzes the means of the Internet of Things from the point of view of their ability to be combined in situation management systems to solve management problems in various spheres of activity. The construction features and advantages of using situational systems based on IoT in various spheres of activity are considered. The convergence of IoT in situational systems of various types requires the solution of IoT-typical tasks related to the organization of a heterogeneous network environment with controlled energy consumption and the need to process large volumes of data. The paper demonstrates that the scope of application determines the specific requirements for the construction of situation management systems, and in each specific case the system of requirements is focused on the support of a critical requirement. One of the main problems of the convergence of IoT and situation management systems is the difficulty of standardizing the operating environment. The multiplicity and variety of options for possible solutions in the development of such systems determine the need for the use of intelligent technologies for the development of systems with the use of artificial intelligence and knowledge models of the target subject area. Tabl.: 3. Figs.: 3. Refs.: 21 titles.



QUALITY,  RELIABILITY, AND CERTIFICATION OFCOMPUTER TECHNIQUE AND SOFTWARE

UDC 620.169.1

At present, there are a significant number of research results devoted to the study of various types of degradation processes occurring in technical elements and systems. In most works, each of the processes is analyzed separately, and taking into account their influence on the residual life of the product is reduced to choosing and taking into account the dominant process – the most intensively developing process, representing a so-called «weak link» in the theory of reliability. This approach greatly simplifies the degradation pattern of the product, which leads to overestimated prediction results that are unacceptable in critical application systems. The article proposes a method that in an accessible engineering form allows for calculating the residual resource of objects that are subject to the simultaneous influence of several degradation processes with different partial participation. The method is based on the calculation of the average rate and the coefficient of variation of the generalized degradation process. The calculations are carried out using a probabilistic-physical approach which includes a probabilistic model of a diffusion-monotonous distribution of failures (DM-distribution). This distribution is specially formalized on the basis of a Markov random process of diffuse type with a constant rate. The diffusion-monotonic distribution most accurately aligns the statistical data on failures of mechanical objects. Under the influence of several degradation processes, the normalization of initial data and information on the share participation of each of the constituent degradation processes in the generalized degradation process was used for the first time. The method makes it possible to refine the estimate of the product's residual life in comparison with the estimate obtained by taking into account only one dominant degradation process. The obtained refined estimate of the residual life allows for reducing operating costs by optimizing the overhaul intervals and establishing the actual life of the objects under study. Tabl.: 3. Refs.: 13 titles. 


UDC 519.718

The article is devoted to the development of an attributive model of dependable software, defining its metrics, and development of an object-independent universal approach to assessment attributes and dependable software metrics. The attributive model of dependable software (AMDS) is designed by analogy with the attributive model for dependable computer systems (CS) and expanded with special attributes and metrics according to the ДСТУ ISO/IEC 25051:2016 Systems and software engineering. Requirements for the quality of systems and software tools and their evaluation (SQuaRE). Requirements for the quality of ready-to-use software product (RUSP) and instructions for its testing (ISO/IEC 25051:2014, IDT). The main attributes of the model have been defined. These are functional suitability, performance level, compatibility, availability of use, reliability, security, ease of support, mobility, efficiency, productivity, satisfaction, the lack of risks, coverage, redundancy, and self-control. An object-independent multipurpose approach to the evaluation of software attributes and metrics has been developed. The comprehensive assessment of software dependability is carried out using AMDS in the form of a linear functional containing estimates of all attributes of the model. A quantitative assessment of the level of software dependability has been considered using the example of the Laboratory Information System (LIS) which automates the work of medical laboratories. The given example of the software has an overall rating that, according to the rating scale, has a satisfactory level of dependability. The attributive model of dependable software and the assessment of dependability levels can be used by specialists in the field of system dependability in various fields of application. Tabl.: 15. Refs.:   14 titles.


 UDC 519.718

Cespedes Garcia P.D. Methods for the residual life assessment of corroded gas pipelines. Mathematical machines and systems. 2023. N 3. P. 134–150.

The article is devoted to processing the methods for the residual life assessment of pressurized gas pipelines affected by corrosion wear. The analysis of the operational viability of the facility was conducted using the analytical engineering-mechanical model ASME B31G Mod taking into account stochastic factors during defect progression. The results of these calculations were validated using programmatically implemented functions for diagnosing pipeline corrosion defects within the «pipenostics» function set for statistical analysis and data calculation. Applying a deterministic calculation method for corrosion rate in accordance with the API 570 standard, as well as the calculated results of the estimated failure pressure levels in accordance with the ASME B31G standard along with the associated industry document ASME B31.8, it becomes possible to obtain the failure limit value of the object based on the actual corrosion dimensions. By combining these methods, along with subsequent comprehensive calculations to predict the outcomes of the facility failure, it is possible to determine the residual life of a corroded gas pipeline. It is important to note that when applying the deterministic calculation method, most of the random physicochemical degradation processes are disregarded, and the corrosion rate is assumed to be linear, while various external factors are not taken into account. To address this issue, a probabilistic-physical approach will be applied to assess the residual life of the facility, specifically the diffusion-monotonic DM-distribution model. Within this model, the variation coefficient of the mechanochemical wear process is used as an indicator of the random variable values dispersion while according to the study results, the inspection data on corrosion depth and its calculated limit value, are selected as the parameters for assessing the corroded defective area of the gas pipeline. Таbl.: 3. Figs.: 5. Refs.: 13 titles.


UDC 519.718

Cespedes Garcia N.V. Residual resource of bridges and bridge structures. Mathematical machines and systems. 2023. N 3. P. 151–157.

The article is devoted to the definition of current methods of assessing the residual resource of bridges and bridge structures. Extending the service life of bridges and determining the residual resource of bridges and bridge structures remain topical problems because capital restoration or construction of new bridges is a very time-consuming and costly process for any country in the world. An analysis of current foreign and domestic regulatory documents and research on the general state of the problem concerning the types of destruction, the impact of accidents, and external environmental factors were carried out. A large volume of information on the nature of occurrence and accumulation of damage in reinforced concrete bridge structures shows that the destruction of bridges is mainly influenced by production factors and environmental factors. The gradual destruction of the structure occurs as a result of the accumulation of various types of damage that arise from multiple repeated temporary loads, accidents, temperature changes, and the appearance of corrosion processes. To calculate the residual and total life of bridge elements, the crack resistance criterion was chosen, which takes into account the type of bridge construction, purpose, and operating conditions. As a determining parameter, the crack opening width was chosen for the elements of road and city bridges reinforced with tension rod reinforcement, and the limit value of this parameter was established. In the absence of large failure statistics, it is suggested to use a probabilistic-physical approach to durability assessment. The main parameters of the probabilistic model with DM-failure distribution – are the average rate of change of the determining parameter and the coefficient of variation of the generalized degradation process. The results of the calculations show values that correspond to statistical and regulatory indicators. Qualitative collection of information on parameters of the destruction of bridges and bridge structures and a probabilistic-physical approach to assessing the real technical condition of the object provide more accurate calculation results and allow for predicting the moment of reaching their maximum allowable value. Таbl.: 1. Refs.: 5 titles.


                                          INFORMATION 

 Sapaty P.S. Spatial networking in the united physical, virtual, and mental world. Mathematical machines and systems. 2023. N 3. P. 158–163. 

We are witnessing the rapidly growing popularity and activity in the use of networking models and solutions for solving problems in many specific areas. As a universal approach, networking can also be used for solving complex problems and simultaneously covering absolutely different domains. The main goal of this book is to investigate and propose universal networking techniques and solutions that can simultaneously cover different areas for finding united solutions, using for this Spatial Grasp Model and Technology (SGT) patented and discussed in previous books and publications. The book will review, analyze, and classify the current use of networks in many physical, virtual, and mental areas, including psychological and psychiatric ones. It will provide a summary of SGT and its main features, the details of Spatial Grasp Language (SGL), and its networked implementation, which can operate without any central resources and cover arbitrarily large areas. The work will also describe some fundamental network operations under SGT that can be performed in a parallel and fully distributed mode, as well as propose efficient solutions for one of the most important features of graphs and networks called “centrality” and its different variants in SGL. It will provide some examples of unique high-level networking solutions in the combined worlds obtained by the results of this book and suggest spatial solutions with active networking patterns in both pattern matching and recognition modes, representing SGL as a real pattern language. The results of the work will confirm the efficiency of SGT in the development of networking methods for solving complex problems in combined distributed systems. The investigated network processing paradigm, traditionally having a simple implementation, allows us to operate directly in physical, virtual, and mental spaces in a clear and compact mode, radically differing from traditional algorithmic thinking and methods. Refs: «Spatial Grasp» on www.google.com. Research Gate: https://www.researchgate.net/scientific-contributions/Peter-Simon-Sapaty-70005622.


 
 
       Last modified: Oct 3, 2023