Mathematical Machines and Systems. 2023 #1

ABSTRACTS


COMPUTER SYSTEMS

UDC 681.3

Yashchenko V.О. Neural-like growing networks in the development of general intelligence. Neural-like growing networks (P. II). Mathematical machines and systems. 2023. N 1. Р. 3–29.

This article is devoted to the development of general artificial intelligence (AGI) based on a new type of neural networks – “neural-like growing networks”. It consists of two parts. The first one was published in N4, 2022, and describes an artificial neural-like element (artificial neuron) in terms of its functionality, which is as close as possible to a biological neuron. An artificial neural-like element is the main element in building neural-like growing networks. The second part deals with the structures and functions of artificial and natural neural networks. The paper proposes a new approach for creating neural-like growing networks as a means of developing AGI that is as close as possible to the natural intelligence of a person. The intelligence of man and living organisms is formed by their nervous system. According to I.P. Pavlov's definition, the main mechanism of higher nervous activity is the reflex activity of the nervous system. In the nerve cell, the main storage of unconditioned reflexes is the deoxyribonucleic acid (DNA) molecule. The article describes ribosomal protein synthesis that contributes to the implementation of unconditioned reflexes and the formation of conditioned reflexes as the basis for learning biological objects. The first part of the work shows that the structure and functions of ribosomes almost completely coincide with the structure and functions of the Turing machine. Turing invented this machine to prove the fundamental (theoretical) possibility of constructing arbitrarily complex algorithms from extremely simple operations, and the operations themselves are performed automatically. Here arises a stunning analogy, nature created DNA and the ribosome to build complex algorithms for creating biological objects and their communication with each other and with the external environment, and the ribosomal protein synthesis is carried out by many ribosomes at the same time. It was concluded that the nerve cells of the brain are analog multi-machine complexes – ultra-fast molecular supercomputers with an unusually simple analog programming device. Figs.: 26. Refs.: 22 titles.


UDC 623.764

Sapaty P.S. Spatial management of air and missile defence operations. Mathematical machines and systems. 2023. N 1. P. 30–49. 

This paper relates to the accepted presentation presented at the international Air and Missile Defence Technology Conference, held on November 1617, 2022, in London, the UK, (day two), reflecting the contents of the presentation slides. It describes applications of the patented and internationally tested Spatial Grasp Technology (SGT) and its Spatial Grasp Language (SGL) for integrated air and missile defense (IAMD). Based on holistic space navigation and processing by recursive mobile code self-spreading in distributed words, SGT differs radically from the traditional management of large systems since it consists of parts exchanging messages. The dynamic network of SGL interpreters can be arbitrarily large and cover terrestrial and celestial environments as powerful spatial engines. The paper contains an example of tracking and destruction of multiple cruise missiles by self-evolving spatial intelligence in SGL using networks of radar stations. It also briefs the growing multiple satellite constellation in low Earth orbits (LEO) for potential IAMD applications. Starting from the Strategic Defense Initiative (SDI) of the past and then briefing the latest project of the Space Development Agency, the paper shows SGL solutions for discovery, tracking, and destroying ballistic missiles and hypersonic gliders with the use of collectively behaving constellations of LEO satellites. It also shows how to organize higher levels of supervision of groups of mobile chasers fighting multiple targets (potentially both missiles and drones), by providing global awareness and even consciousness in SGL which can drastically improve their performance. The latest version of SGT can be implemented on any platform and put into operation in a short time, similar to its previous versions in different countries. Figs.: 24. Refs.: 52 titles.


  
      INFORMATION AND TELECOMMUNICATION TECHNOLOGY

 

UDC 004.457

Kovalenko O.Ye., Kuzniuk K.V. Computer network monitoring systems. Mathematical machines and systems. 2023. N 1. P. 50–59. 

Monitoring tools are an important component of network infrastructure and provide automation of network administration processes. The effectiveness of using a monitoring system is a specific indicator of the computer network quality and it depends on the specified settings and scenarios of its use. The main characteristics and parameters that should be investigated and taken into account when deploying a computer network monitoring system are network scalability, the anticipation of updating the existing system after the deployment, the required level of network monitoring complexity, and service functionality. Network management and monitoring tools should include the following key features: detailed analytics, compatibility, simplified overview mode, notifications, and account and interface settings. Detailed analytics and reports are the foundation of network monitoring. The chosen tool should evaluate network performance by processing parameters of network speed and latency. Compatibility allows you to interact with various components of the IT infrastructure. A wide range of compatibility provides a greater variety of characteristics of elements and greater adaptability of the service to the real conditions of a particular enterprise. Alerts from the monitoring system must be instantaneous and sent whenever a threshold value is exceeded or a device is disabled. Monitoring systems allow you to edit the type and severity level of an alert, as well as create monitoring categories and templates. Accounts are an important aspect, particularly for remote work. The user interface is important for organizing the process of working with a computer network monitoring system from the point of view of efficiency. A well-organized interface speeds up the interaction of an administrator or an operator with information about the current state of the system. An important characteristic of the interface is the adaptability of display on different types of devices: smartphones, tablets, computers, etc. Figs.: 4. Refs.: 17 titles. 


UDC 004.02[004.9:614.8.084]

The paper analyzes some security problems of several Ukrainian trade and entertainment centers, as well as the possibility and necessity of including important security issues in the state program for the development of e-governance (digital governance). The state of e-governance development in Ukraine has been considered. It has been proved that its level is high and has significantly improved over the past two years, and now meets todays global requirements. From the security point of view, the main (best) projects of trade and entertainment centers have been considered and risk factors and circumstances for the staff and visitors of shopping malls have been described on the basis of the data of inspections carried out by state security inspectorates. Some evacuation models to be used in the event of a fire and a probabilistic model of fire occurrence and spread are provided in the paper. Some software options for performing calculations are also offered. As a rule, these modern multi-functional service centers are built in Ukraine at the expense of foreign investments based on the norms of the investor countries. However, due to the inconsistency of the legal framework, there arise problems with the safety of staff and visitors, owners, and state security inspectors. The work proposes a concept of security control, which can be easily implemented on a computer, based on data on the reliability of object security systems. Since trade and entertainment centers having a large number of daily visits that will go on increasing are becoming mass culture objects, the concept of inclusion of the developed models and programs in the e-government programs has been developed. For example, before the beginning of the pandemic, the Magellan mall in Kyiv was visited by 30,000 people every day and the Ocean Plaza shopping center – by 60,000 people. This is approximately 2,000–5,000 visitors every hour. Therefore, in case of a fire, if people are not evacuated in time or the fire is not put out, there may be many victims. To prevent unwanted events whose statistics are constantly increasing, it is offered to solve the safety issues of trade and entertainment centers at the modern scientific level of the risk-oriented approach and the modern information level. The paper also considers a possible option of including security issues of shopping malls in the information technologies of e-government. Таbl.: 1. Figs.: 4. Refs.: 18 titles.


                                    
                              SIMULATION AND MANAGEMENT

UDC 681.515.8

The relevance of the creation of control systems for engineering equipment in residential buildings and industrial facilities is connected with the current state of housing and communal services in the city of Kyiv, which includes more than 10,000 multi-storey buildings, and in the Kyiv region – with more than 5,000 buildings, which were built in the previous century and have outdated engineering equipment that needs repair and implementation of modern information technologies. Modern systems of management of engineering equipment in residential buildings and industrial facilities ensure economical consumption of energy resources. Automation of building engineering systems provides for a considerable reduction in resource consumption (electricity, water, and heat), increase in the efficiency of the building engineering complex, optimization of the operation of all its systems according to the needs of consumers, as well as internal and external factors, minimization of human participation in the management of any parts of the system, increase in the level of safety of buildings by the creation of a system of instant automatic response to any emergency, reduction of the costs of maintaining all parts of the system, and the possibility of remote access to the operation of all equipment and its control. The article describes the scientific and technical results of research focused on the development of hardware and software solutions for the construction of specialized controllers based on modern 32-bit single-chip microcomputers, the creation of circuitry, the topology of printed circuit boards and software, research and development of methods of information interaction with the automation of engineering systems in the communal sphere. The scientific and technical solutions provided in the article can be used in the development of automated systems of management of engineering equipment in the communal sphere and at industrial facilities. Figs.: 6. Refs.: 4 titles. 



UDC
005.3:614.8

The article analyzes some global approaches to emergency response management. The traditional structure of the countermeasure management process has been considered in order to identify and analyze in detail those components that are important from the point of view of automating the process of operational management of emergency countermeasures. For this purpose, the disaster management cycle has been studied and its stages have been analyzed. The main emphasis is placed on the stages of readiness and response, as the stages that require automation. When considering the stage of readiness, the preparedness cycle and its component steps have been analyzed. The planning step has been studied in detail as a step in which an action plan is created. The traditional planning process has been considered and its steps have been analyzed. Based on the results of the analysis, it has been established that the action plans created in the planning process are text documents designed exclusively for the needs of a specific region. On the basis of the obtained results, there has been justified the need to create an alternative presentation of the action plan, which will be suitable for computer processing and can be used in situational centers for the operational management of counteractions to emergencies. When considering the response stage, the incident command system and the emergency operations center, which are activated during an emergency, have been analyzed. In particular, the organizational structure of the incident command system has been considered, and the main functions of its divisions have been investigated. According to the results of the analysis, certain shortcomings of the analyzed incident command system have been revealed. The article concludes that the existing approaches to emergency response management should be fundamentally rethought. Figs.: 4. Refs.: 11 titles.


UDC 004.94

The paper describes a new method of building multilayer models by a monitoring software agent and its usage for forecasting the number of COVID-19 cases in Ukraine. Monitoring agents are used to provide decision-making processes of different levels of urgency with information and knowledge through continuous observation of objects and intelligent analysis of the observation. The need to solve intellectual problems of classification, clustering, identification, forecasting, etc., in the process of performing monitoring tasks led to the usage of intelligent agents for this purpose. In addition, there is a special class of autonomous software systems – monitoring agents that have a special structure and individual functionality, utilize atypical methods of interaction with the external environment and specialized methods of processing the observation results, and require the creation of new methods of model synthesis. After the outbreak of COVID-19, scientists began to use modern technologies that could help fight and overcome this terrible disease. They started to teach the models to identify the disease and its various symptoms and to plan the ways of treatment. The insufficient informativeness of the observation results, on the basis of which models are trained, is typical for forecasting the pandemic development. Effective means of overcoming this problem are the use of multilayer models of observation objects. Our study describes a new method of building multilayer models by a monitoring software agent using the example of the task of forecasting the development of the incidence of COVID-19 in the population of Ukraine. This can make it possible to control the load on hospitals and plan the time and duration of social restrictions for the countrys population, in order to slow down the development of the pandemic in the conditions of the military aggression of the Russian Federation. Таbl.: 3. Fig.: 1. Refs.: 18 titles.


UDC 004.772


Characteristic features and signs of the information society are defined in the paper. The information environment, which is considered for the formation of the enterprise security model, is an information society component. The classes of intelligent information technologies (IIT) that are necessary for the interaction of subjects in the information society are highlighted. Complementing each other, the specified IIT classes create conditions for stable access to information and knowledge that are updated. According to their types, goals, and principles, the article defines and characterizes such information environment components as organization, technologies, a digital repository of informational and methodical resources, services, mathematical modeling methods, enterprise security modeling system, and information and telecommunication infrastructure. The internal and external resources of the organization, whose presence affects the formation of the enterprise security model, are determined. Within the framework of the information society, the proposed conceptual model makes it possible to determine the necessary set of services and information resources needed for the formation of the enterprise security model. The paper highlights the following main components of the enterprise security model: security tasks, computer communications, safety equipment, flexibility, and organizational environment. The proposed practical implementation allows accessing information resources, exchanging messages using existing communications, participating in general discussions, searching for information, according to the request, and organizing collective (joint) activities. Based on the organization structure, the offered practical implementation of the model ensures the delimitation of access levels, implements individual protection profiles, and ensures the security of users’ data. Figs.: 3. Refs.: 5 titles.


UDC 004.047

The paper defines the mathematical features arising during the algorithmization of the minimization of errors that appear as a result of the approximation of functions in applied environmental safety problems, the creation of automated personnel selection systems, and the improvement of systems with a recommendation mechanism. It has been proved that when performing the algorithmization of any process, it is necessary to take into account the ignoring of some part of the information in the process of formalization. When transforming information, any event in the process of functioning of a complex system over a certain period of time can be considered as the occurrence of a specific situation at some specified point, to which the requirements for ensuring the properties of information are put forward. The work is based on the basic postulates of the Cauchy theorem and Dr. Tesler's works on some assertions on the decomposition of functions by incoherence. Using the approach to solving problems with complex variants of approximation of functions and existing methods of minimizing errors in approximations, there is proposed an algorithm that in the case of finding a solution with a large number of iterations allows for carrying out a number of transformations that will let obtain the result through expansion in the Taylor series by degrees. It has been found that in the absence of a clear solution to the given problem, it is best to use an approximation with some incoherence. That means choosing a parameter that acts as an element of adaptation to the specified conditions of the task. Of course, this method of problem solving requires functional transformations, but in the end, it allows you to use basic trigonometric functions that simplify algorithmization. An example of a practical implementation of the algorithm with the minimization of approximation errors has been considered. Based on it, it has been proved that it is more rational to use tables of a number of widely used functions and decompose functions into series by errors. Fig.: 1. Refs.: 23 titles.


   INFORMATION

Sapaty P.S. Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems. Mathematical machines and systems. 2023. N 1. Р. 130–134.

This work is focused on the advanced organization and management of large distributed dynamic systems which may have both terrestrial and celestial nature. It is based on quite different organizational philosophies, models, and technologies providing highly integral solutions by dynamic coverage and matching of distributed environments by active self-spreading recursive code, rather than treating and managing systems and solutions in them as parts exchanging messages. It will be explained how this paradigm can effectively provide distributed and global awareness and even simulate a sort of global consciousness in many important areas, which may include economy, ecology, climate, psychology, international relations, space conquest, security, and defense. The self-growing, self-replicating, and self-recovering super-virus scenario code in Spatial Grasp Language (SGL) can effectively supervise distributed systems under any circumstances and with a rapidly changing number of elements. Concerning the ideas of consciousness, it will be shown how to express brainwaves, train of thought, stream of consciousness, spatial consciousness, consciousness outside the body, artificial consciousness, etc. The book will also contain examples of expressing gestalt theory laws grasping the whole first with defining details afterwards in fully distributed systems, linking gestalt features with consciousness. The discussed ideas are accompanied by distributed pattern-like solutions in SGL being much simpler than with other models and languages. A special chapter is devoted to patterns as a universal theory often standing in opposition to the analysis of thought in terms of logic. The previous technology versions had trial implementations in different countries, and the latest one can be quickly implemented on any platform, too. Refs: “Spatial Grasp” on Google (www.google.com). 


 

            

       Last modified: Jun 20, 2023