Degree
|
Dr. Sci. (Eng.), Head of Information Security Chair, Moscow Institute of Physics and Technology (National Research University); Scientific Director, Closed Joint Stock Company “Special Design Bureau of Computer-aided Design Systems” (JSC OKB SAPR) |
---|---|
Location
|
Moscow, Russia |
Articles
|
Model of intelligent planning of robot behavior in a team of robotsThe article deals with an urgent problem related to organization of control of a team of intelligent mobile robots and their interaction with each other for the most effective achievement of the goal. The research is aimed at development of interrelated models of intelligent planning of robot behavior, which is based on a market approach resting on a new risk equilibrium model. The substantial and formal formulations of the task of planning of autonomous mobile robots activities are proposed. The author’s model and a set of new simulation models for calculation of the overstatement, understatement costs, as well as their risks are developed. Various calculation algorithms are proposed for various variants of robot interaction: control under conditions of a restricted limit of the most scarce resource (for example, battery energy); interaction between robots using information products (messages); robot control from the center; purchase and sale of the information product; making a decision on subordination and support of communication between robots, etc. Examples of description of robot behavior options (speed of movement, equipment with photos, videos, sampling tools, energy limit), classification of events (fire, traffic accident, violation of law and order, emergency situations, suspicious object) are offered. Examples of calculation procedures are given: robot behavior options, if it is possible to maintain speed depending on energy consumption; adjustment factors to take into account increase of the probability to detect an event due to improvement of the photo quality (wide format, high definition, frame frequency). Read more... Modeling the processes of social self-organization of intelligent agentsThe relevance of the task of modeling human behavior posed in the article is associated with the need for active development of the economy, ensuring the involvement of an increasing proportion of the young population with higher and secondary specialized education. As a result of state incentives for business, more and more people are ready to receive higher education or continue to study at the next levels. When studying the processes of managing the social behavior of subjects, the “system of systems” (SoS) approach was used, within which various methods of modeling, simulation and analysis are developed and studied. The simulation is based on the multi-agent principle, the mechanism of which allows analyzing the behavior of the self-organization of an intelligent agent (social subject) and, if necessary, changing its behavior. The ideal approach for implementing the modeling of a multi-agent system (MAS) of the behavior of an agent is the evolutionary simulation methodology (ESM), which allows developing a set of interconnected optimization simulation models that implements the property of self-organization of intelligent agents. The basic principles of self-organization control are formulated, which is based on the theory of equilibrium random processes (RSP), which provides the possibility of influencing any available parameters and in any combination of them using ESM. The ways of adapting ESM in relation to modeling the process of social self-organization of a young person are considered, and a graphical interpretation of social development is proposed, two parameters are used as phase coordinates: social status and income level. Models of indirect methods of management, choice of the direction of development of a person’s career growth in the production management system based on dynamic programming have been developed. Examples of ESM implementation are given. Read more... Optimal inventory rating control based on the evolutionary simulation modelModern economy is characterized by mass production and introduction of production services within the digital ecosystems that assist the customer in obtaining the final results, in particular, organization of procurement of radio-electronic components. The relevance of the task of optimal inventory rating control is related to development of a service that minimizes risks arising from uncertainty of such factors as receipt of requests for commodity and its supply, supplier’s prices and selling prices, etc. The issues of development of economic and mathematical models of inventory rating optimization applicable to the specific features of vertically integrated companies and legally independent organizations operating in conditions of the market economy on kanban principles are considered. It is shown that in conditions of uncertainty, use of ratings allows to increase the efficiency of the inventory control system. The possibility of presentation of the inventory control system in the form of an evolutionary simulation model is substantiated. The procedure is provided to bring the task of inventory rating to the canonical form of an evolutionary simulation model (ESM). The peculiarities of the inventory control systems are revealed using the examples of “Stock” ESM for VIC and “Zapas” ESM for independent companies. The methods are determined for calculation of the derived rates: the average number of supplies, the average interval between supplies, etc. The contribution of the authors of the article consists in development of the ESM applicable to inventory rating, which combines the simulation models (estimates of the actual overstatement and understatement cost options relative to the planned radioelectronic components inventory rate, as well as estimates of the expected costs (risks) obtained in statistical tests) with the optimization models implemented based on the theory of equilibrium random processes. The aggregate strategy, i.e. the strategy aimed at minimizing the amount of the overstatement and understatement risks is used as a criterion for inventory rating. The experimental studies of “Stock” and “Zapas” models implemented using the “Equilibrium” module of the author’s system – “Decision” allow real-time modeling of various options of the studied rates. Read more... Optimization of the component composition of information security systems based on evolutionary simulation modelsThe article discusses the tasks of modernizing the information security system of a distributed computing system. In an increasingly aggressive environment, objects whose security was previously considered sufficient now require additional protection measures. Examples include significant objects of critical information infrastructure, which are currently subject to government regulation. To solve the problem of synthesizing the component composition of information security systems, the article proposes a complex algorithm that includes steps in which various mathematical tools are used. Using this approach allows to select an acceptable option for a set of software and hardware tools that provide the ability to block attacks at a given level of protection. The problem is supposed to be solved based on the basis of the functionality of software and hardware components, their parameters and functional relationships. The novelty of the research results lies in the presentation of a discrete model of an information security system in the form of a simulation model (a special case of stochastic programming), which makes it possible to take into account the functional features of hardware and software when modernizing the information security system. A simulation algorithm is proposed that takes into account the characteristics of the information security system, which can take on both deterministic and probabilistic values. At the same time, the necessary definitions are introduced, the provisions of which are illustrated with numerical examples. A simulation algorithm is proposed that takes into account the characteristics of the information security system, which can take on both deterministic and probabilistic values. Also the necessary definitions are introduced, the provisions of which are illustrated with numerical examples. Calculations make it possible to identify the most scarce resources, establish how successful the specialization and structure of the information security system are, evaluate the results of changes in the information security system, redistribution of its functions and material resources. Read more... |