ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu
Summaries of the issue

THEORETICAL BASIS OF PROACTIVE CONTROL OVER COMPLEX OBJECTS

CONCEPT OF PROACTIVE CONTROL OVER COMPLEX OBJECTS: THEORETICAL AND TECHNOLOGICAL BASIS Mikhail Yu. Okhtilev , Mustafin Nikolay G., Miller Vladimir E., Boris V. Sokolov
7
Theoretical and technological background of applied theory of proactive control over complex objects is considered. The theory under development has been actually realized in applications to space-rocket industry, atomic-power engineering, transport and logistics, and military technology.
15
An algorithm for calculation of temporal characteristics of open queuing network is described. The method is proposed to optimize queuing network demand sojourn time by equalizing the nodes loading. Results of the computer experiment are presented and discussed.
19
The problem of information-technical support of distributed events is considered. The main arrangement stages of event with distributed participants are analyzed. An information model is proposed to describe the methods of data processing and exchange between the distributed participants for various situations in the intelligent meeting room.
MODIFIED MODEL OF FLEXIBLE REDISTRIBUTION OF INFORMATION INTERACTION OPERATIONS Alexander N. Pavlov, Pavlov Dmitry A., Moskvin Boris V., Kirill L. Grigoriev
25
A modified mathematical model of planning of decentralized information processing in dynamically changing environment is proposed. The model accounts for restrictions on implicit time for execution of operations of information processing, storage, and transmission in space systems.
30
A simplified functional model of spacecraft functioning is proposed for evaluation of its fuel resources and active life time. Effects of on-board failures of motion control system on fuel consumption at normal conditions as well as in an emergency are taken into account.
35
An approach to the problem of modeling and identification of program code defects aimed at improvement of the software quality is presented. The approach is based on the graph representation of the application source code and its complex analysis.
40
A method of context-free regularization based on special equivalent transformations of the grammar syntactic graph is described. In combination with an algorithm of elimination of recursions, the method is shown to ultimately convert a context-free grammar into a regular one.

TECHNOLOGIES OF PROACTIVE CONTROL OVER COMPLEX OBJECTS

46
Feasible technologies of synthesis of structural dynamics simulation scenarios for automated control system of active moving objects are analyzed. Service-oriented approach is proposed for practical realization of the scenarios; the corresponding mathematical software is considered.
STUDY OF DYNAMIC AND ENERGY COMPATIBILITY OF POSITIONING SYSTEM AND ANGULAR MOTION CONTROL OF SPACE SOLAR POWER PLANT Manuilov Yury S., Zinoviev Sergey V., Prishchepa Yury V., Aleshin Evgeny N.
52
Interaction between positioning system and angular motion control of space solar power plant is studied within the framework of optimization problems of structural-parametrical synthesis of the plant main subsystems.
58
A methodology for development of historical databases designed for accurate estimation of necessary resources for initiated software projects is proposed. A procedure of the database creation with the use of SAMPO+ system is presented.
CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES Fedorchenko Andrey V., Chechulin Andrey A., Kotenko Igor V.
62
Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.
SECURE ENCRYPTION PROTOCOL EMPLOYING SHORT KEYS Muravev Anton V., Berezin Andrey N., Dmitry N. Moldovyan
68
A method and protocol for secure cryptographic transformation of information transmitted via public channels are proposed. Small-sized (up to 56 bit) shared secret keys are employed.
72
An approach to monitoring of current security situation and support of decision on response to security deterioration incidents is proposed. The approach is based on developed system of security characteristics and models and algorithms for evaluation of the characteristics.