Scientific electronic reviewed journal
Systems of Control, Communication and Security
ISSN 2410-9916

№2 2019

Analysis of new technologies and ways of development for systems of control, communication and security
  • V. I. Levin
    Victor Ivanovich Shestakov and 80th Anniversary of Discovery of Logical Theory of Discrete Computing and Control Devices
  • Abstract
    • Relevance. In 2018, 80 years have passed since the discovery of the logical theory of discrete computing and control devices. This discovery, made by three outstanding scientists – Akira Nakashima (Japan), Claude Elwood Shannon (USA) and Victor Ivanovich Shestakov (USSR), was of great importance for the whole of science. It opened the way for a new scientific discipline – cybernetics, making its theoretical base. Therefore, the development of the fundamental results of these discoverers remains an urgent task. The purpose of article is to provide a detailed review of the version of the logical theory of discrete devices proposed by V.I. Shestakov, including history of its discovery, methodology, results and applications in various fields of science and technology. Method. To achieve this goal such methods are used: 1) study of the works of the scientist from primary sources and the scientific and historical literature, 2) study of the biography of the scientist according to the memoirs of contemporaries and scientific and biographical literature, 3) comparison of the works of the scientist with the works of other scientists in this field. Result. It was established that Victor Ivanovich Shestakov was one of the first to demonstrate the possibility of mathematical modeling of discrete computing and control devices using Boolean algebra of logic. This made it possible to develop formalized methods for analyzing, synthesizing and designing such devices, allowing to create devices of great complexity. In addition, the scientist first formulated the problem of mathematical modeling of continual devices, the solution to which the researchers approached only 30 years later. Novelty. It is established that Shestakov is the coauthor of the discovery, according to which the Boolean algebra of logic is an adequate mathematical apparatus for representing schemes of discrete devices. This discovery was published in March 1941. It allowed further development of constructive methods for analyzing, synthesizing and designing circuits for discrete computing and control devices. The scientist also proposed a method for studying non-parallel-serial (i.e. bridge) circuits and a method for decomposing complex circuits into subcircuits to overcome the “curse of dimension”.
  • Key words
    • logical theory, discrete devices, Boolean algebra
  • Reference
    • Levin V. I. Victor Ivanovich Shestakov and 80th Anniversary of Discovery of Logical Theory of Discrete Computing and Control Devices. Systems of Control, Communication and Security, 2019, no. 2, pp. 54-86. DOI: 10.24411/2410-9916-2019-10203 (in Russian).
Robot-technological systems
  • Yu. B. Allakuliev
    Analysis problematic issues of control of the autonomous underwater vehicles from a coastal control center and the conceptual directions solution justification
  • Abstract
    • Problem statement. Determining factors and threats that will make the most significant impact on an autonomous underwater vehicle (AUV) control process is an important issue during the time of the information collecting, transmitting and displaying systems (ICTDS) of a coastal control center (CCC) of AUV assessing effectiveness process. It is necessary to consider possible options of coordination of decisions, are made by the automated control system (ACS) of CCC and ACS of AUV, taking into account potential artificial intelligence systems use. The aim of this paper is methodological directions of AUV group management creation justification. Methods. General scientific research methods, control processes modeling, conceptual directions substantiation of rational structure creation of ICTDS of CCC ACS are used to solve the problem. The novelty of the paper is to apply a systematic approach while using information technologies in AUV ACS operation. Such approach allows to solve the information structuring problem in ICTDS and to change the organization of AUV control. Result. The development of new technologies which provides information data stability for CCC at the time of electronic warfare is the final result of this study. The creation of the distributed artificial intelligence system and the solutions coordination system in AUV is a promising direction for the Navy information infrastructure development. Practical significance of the paper. The implementation of proposed directions of ACS improvement as a part of CCC special mathematical support will increase the efficiency of AUV control process in a course of their tasks execution.
  • Key words
    • information collecting, transmitting and displaying system, coastal control center, automated control system, autonomous underwater vehicle, responsible person, cognitive function
  • Reference
    • Allakuliev Yu. B. Analysis problematic issues of control of the autonomous underwater vehicles from a coastal control center and the conceptual directions solution justification. Systems of Control, Communication and Security, 2019, no. 2, pp. 143-161. DOI: 10.24411/2410-9916-2019-10207 (in Russian).
Information processes and technologies. Acquisition, storage and processing of information
  • S. A. Panov, I. J. Kuryanov, N. N. Shamshin
    Model for finding the true target among the detailed false target when using thermally controlled means of hiding and thermal imitation of ground military vehicle
  • Abstract
    • Purpose. Nowadays probabilistic target’s search models, which take into account various details false targets influence on the probability of the ground-based military equipment detection and recognition are known and widely used to evaluate the capabilities of reconnaissance optical-electronic aircraft’s means and multi-purpose UAVs. Models which allow to estimate correct detection and false alarms probability at a certain point in time are the most developed today. During the assessing input parameters process, these models do not take into account the thermo-controlled influence of concealment means and thermal imitation of ground-based military equipment, which are used as separate or complex means of interfering influence. It is the main limitation of such models. Therefore, the accuracy of the hide objects detection and recognition simulation results, substantially reduces. The aim of the work is to increase the reliability of the assessment of the reducing thermal visibility promising means impact on the detecting probability and recognition probability of ground-based military equipment. Novelty. The elements of novelty are the obtained analytical expressions and dependences, which allow to evaluate the efficiency effect of the promising thermo-controlled means of reducing the thermal visibility of ground-based military equipment influence on reconnaissance infrared optical-electronic aerial-based means. Result: Based on a formalized demonstration conflict functioning of the opposing sides, in the form of discrete semi-Markov processes with continuous time, analytical expressions and dependences were obtained. They allow to estimate the probability and time of recognition of the true target when using thermo-controlled means of hiding and false targets of various details. Result of the simulation. It was found that when the protected side used a thermo-controlled coating, the probability of recognizing an object was 0.5. The probability was 0.32, when detailed false targets were used. And the probability was 0.18 when a thermo-controlled coating and detailed false targets were used together. Practical relevance. Devices which are used to hide and thermally simulate the object thermal contrast are practically implemented on the basis of the developed model. The copyright of these devices are protected by patents of the Russian Federation. These technical solutions allow to create a thermal contrast on the surface of a false thermal target, similar to the thermal contrast of the simulated object (prototype) when imitating. And when hiding technical solutions allow to create a thermal contrast of the surrounding background, on the surface of the protected object, so the object becomes hidden for reconnaissance infrared optical-electronic devices..
  • Key words
    • random process, means of reduction visibility, false thermal target, recognition probability, optical-electronic mean, thermal-electronic module
  • Reference
    • Panov S. A., Kuryanov I. J., Shamshin N. N. Model for finding the true target among the detailed false target when using thermally controlled means of hiding and thermal imitation of ground military vehicle. Systems of Control, Communication and Security, 2019, no. 2, pp. 278-290. DOI: 10.24411/2410-9916-2019-10213 (in Russian).

  • E. G. Vorobiev, A. D. Khomonenko
    Vector Representation Models of Multi-Bit Binary Data Based on Pseudo-Regular Numbers
  • Abstract
    • Problem statement: The most widely used lossless compression methods (code length encoding - Run Length Encoding, Huffman (normal and dynamic), arithmetic compression, dictionary compression methods), as a rule, use the statistical properties of individual bytes or bits of text or image. The most common lossless compression algorithms based on the use of variable length codes. In this case, compression achieved by assigning short codes to frequently occurring data elements, and long codes to rarely occurring elements. A significant limitation of this approach is a relatively small degree of data compression, for which no losses allowed. The compression operation is an elementary cryptographic operation. The aim: of the work is to develop mathematical operations for cryptographic primitives based on the vector representation model of multi-bit binary data using pseudo-regular numbers. Novelty: the proposed approach is to apply the properties of binary numbers associated with their mathematical and structural dependence on pseudo-regular numbers to get their short record. Result: is that this increases the degree of compression of large-sized binary data and increases the information security of their transmission and storage. In addition, a mathematical model and a description of the algorithm for converting multi-digit binary numbers to a pseudo-regular structure based on a binary binary-decimal transformation are proposed. The distribution of numbers with a pseudo-regular structure in ordered number fields shown. Practical significance: the presented solution implemented as a demonstration prototype of a software application that implements compression, storage and restoration (decoding) of large-sized binary data with analysis of dependence on pseudo-regular structure on a limited numerical field and three main types of natural numbers. The proposed solution can find practical application in order to back up data to increase information security and availability of advanced information and computing systems operating under conditions of influence..
  • Key words
    • mathematical transformations for cryptographic primitives, vector representation of binary data, pseudo-regular numbers, data storage and recovery, information security
  • Reference
    • Vorobiev E. G., Khomonenko A. D. Vector Representation Models of Multi-Bit Binary Data Based on Pseudo-Regular Numbers. Systems of Control, Communication and Security, 2019, no. 2, pp. 291-303. DOI: 10.24411/2410-9916-2019-10214 (in Russian).
Information security
  • A. A. Ivanov, M. E. Komnatnov
    The analytical models review for metal enclosures shielding effectiveness estimating based on the equivalent circuit method
  • Abstract
    • Problem statement. Technical aspects of information security are directly related with electromagnetic compatibility (EMC) of radio-electronic means. To ensure EMC, electromagnetic shielding is widely used in practice. In particular, to increase the noise immunity of components, units and radio-electronic means, metal shielding enclosures are often used. For estimating the shielding effectiveness (SE) of an intended enclosure, during the radio-electronic means design time, developers often use numerical methods. It requires significant computational resources. Therefore, in the early design stages, analytical methods for estimating SE are more preferable. Models, based on the equivalent circuit method, as the most versatile, are widely distributed among them. The purpose of this paper is to review and systematize the existing analytical models for calculating the SE of rectangular and cylindrical enclosures based on the equivalent circuit method, and also to compare the SE results obtained using these models and finite element method. Results and novelty. The paper presents an overview of analytical models based on the equivalent circuit method, as well as a description of the computational and experimental method for estimating SE without using traditional measuring tools. A comparison for 8 different shielding structures was made. Practical relevance. The results of this study may be useful in the radio-electronic means design, including information security and communication hardware systems. Also, they can be useful in the development of new approaches for calculating various shielding structures SE.
  • Key words
    • electromagnetic compatibility, electromagnetic shielding, shielding enclosure, shielding effectiveness, noise immunity
  • Reference
    • Ivanov A. A., Komnatnov M. E. The analytical models review for metal enclosures shielding effectiveness estimating based on the equivalent circuit method. Systems of Control, Communication and Security, 2019, no. 2, pp. 110-142. DOI: 10.24411/2410-9916-2019-10206 (in Russian).

  • A. V. Telny, E. I. Iakovleva, A. G. Romanova
    Audit of security of the organizational channel of information leakage which is the trade secret of the organization
  • Abstract
    • Problem statement. The development of modern information technologies, information and data transmission means entails an increase of the importance information protection which is a trade secret of the organization. Leakage of information which is a trade secret of the organization occurs mainly through the organizational channel. The protection state of such channel must be constantly monitored and controlled. The purpose of the paper is to develop a method for assessing the security of the organizational channel of information leakage of trade secrets of the organization. This method can be used to automate the control of compliance with the requirements of normative documents in the field of information security, the assessment of the level of executive employee discipline and knowledge and skills test in the field of information security of the object personnel. Methods. Standard methods of system analysis, morphological analysis and expert evaluations were used to analyze the security of organizational channel of information leakage. Novelty. The novelty of the presented solution lies in sources of information leakage standard lists creation and causes of information leakage, organizational and technical protective mechanisms, evaluation criteria for individual and group indicators of security of the organizational channel of information leakage. Results. The technique of audit the security of the organizational channel of secret information leakage is formed. Practical relevance. The developed method can be implemented as a making decisions support system to audit the security of the organizational channel of leakage to protect the information, representing a trade secret of the organization.
  • Key words
    • information security, disclosure of information, information leakage through the organizational chan-nel, security audit of the organizational channel, trade secret of the organization
  • Reference
    • Telny A. V., Iakovleva E. I., Romanova A. G. Audit of security of the organizational channel of information leakage which is the trade secret of the organization. Systems of Control, Communication and Security, 2019, no. 2, pp. 236-277. DOI: 10.24411/2410-9916-2019-10212 (in Russian).
Transmission, reception and processing of signals
  • S. V. Dvornikov, A. A. Balykov, A. A. Kotov
    The simplified model for radio signal path loss computation, which was developed by comparing the Vvedensky quadratic equation with existing empirical models
  • Abstract
    • Problem statement: Operational UHF radio signal path loss computations, which are carried out «in a field», for cellular and trunked networks coverage areas planning in open or rural territories have been ineffective. It happens because the Vvedensky quadratic equation, the Okamura-Hata and the COST231-Hata empirical models are often used as an analytical basis of these computations. The first one has poor applicability. The second and the third models have high analytical complexity. The purpose of the paper is to create simplified mathematical model of signal attenuation within the radio line visible zone development for rapid computation. Methods. The system analysis method and methods of electrodynamics is used to create the simplified model. For mathematical modeling application package MatLab is used. Novelty. The scientific novelty of the paper lies in the development of a simplified heuristic model of signal attenuation computation based on the modified Vvedensky quadratic equation. Area of applicability, which provides normal result of computation, became wider. Result. Formalized to a software level simplified model for radio signal attenuation computation, allows to get a graphical dependence between the radio signal path loss and the communication range. The area of the model applicability, where the most accurate calculations are provided, is determined. Practical relevance: Simplified heuristic model, as a mathematical support mean, can help to solve practical computational problems. It can also help to create a software by using application packages, for example MatLab.
  • Key words
    • quadratic Vvedensky formula, the empirical models of Okumura-Hata, the empirical models of COST231-Hata, losses of the radio line
  • Reference
    • Dvornikov S. V., Balykov A. A., Kotov A. A. The simplified model for radio signal path loss computation, which was developed by comparing the Vvedensky quadratic equation with existing empirical models. Systems of Control, Communication and Security, 2019, no. 2, pp. 87-99. DOI: 10.24411/2410-9916-2019-10204 (in Russian).

  • V. A. Kuznetsov
    The radar aircraft visibility reducing method by using air intake duct optimal shape parametric synthesis
  • Abstract
    • Purpose: the problem of reducing the radar visibility of aircraft is relevant throughout the world, and its solution consists of a set of preventive actions to reduce the radar cross section and, moreover, to reduce the informativity of the demasking signs. The air intake duct makes a significant contribution to the total effective radar cross section area in the forward hemisphere. However, the secondary Doppler modulation effect presence during the air intake electromagnetic waves reflection process necessitates its radar visibility reduction.  The aim of this paper is to reduce the radar aircraft visibility by parametric synthesis of the S-shaped air intake duct. The shape of the air intake duct is optimal by the criterion of the minimum of the effective radar cross section area in a given range of structurally possible changes. Methods: when solving the problem of reducing radar visibility, the parametric synthesis of the channel shape is used. The geometrical optics method is modified to estimate the effective radar cross section area to account for the polarization of the incident electromagnetic wave. The mathematical modeling is widely used. Novelty: the element of novelty is the parametric synthesis method of the effective radar cross section area of the air intake duct shape. The shape in that case is optimal by the criterion of the minimum under all possible conditions for observing. Also the element of novelty is the geometrical optics method modification which allows to take into account the polarization properties of each facet channel surface. Results: The proposed method allows to reduce the effective radar cross section area of the aircraft air intake duct more than 90% in comparison with the direct channel shape, over the entire range of irradiation angles. It also allows to synthesize the shape of the S-shaped air intake duct with required accuracy when an input aperture shape and a structurally possible channel geometry curvature range are parametrically defined. Practical relevance: the presented solution of the radar visibility reducing problem can be used when the estimating process of the effective radar cross section area taking into account the actual air intake duct load. That load has the form of blades of the inlet guide vanes and compressors of an aircraft engine. The method also can help to develop models of air intakes for prospective aircraft.
  • Key words
    • radar visibility, radar cross section, geometrical optics, faceted model, air intake duct
  • Reference
    • Kuznetsov V. A. The radar aircraft visibility reducing method by using air intake duct optimal shape parametric synthesis. Systems of Control, Communication and Security, 2019, no. 2, pp. 180-202. DOI: 10.24411/2410-9916-2019-10209 (in Russian).

  • V. A. Kuznetsov, D. V. Ambrosov
    Dynamic model of a spatially distributed air target
  • Abstract
    • Purpose. To solve the air situation dynamics modeling problem you have to resolve some special tasks. First of all, you need to know the information about the polarization scattering matrix of the air target and its power engine characteristics in advance before spectral-Doppler air target portraits formatting process begins. Then you have to calculate the effective scattering area of each facet of the air target surface, provided that this surface had been approximated by triangular facets. Such calculation must take into account the incident electromagnetic wave polarization. Also you have to calculate secondary Doppler modulation frequency components of the probing signal, arising when the incident electromagnetic waves are reflecting from engine compressor rotating blades. Both scattering area calculation and frequency components calculation must be carried out with minimal time cost. The aim of the paper is to create the polarization scattering matrix and spectral Doppler portrait of spatially distributed air target which has complex shape with minimal time costs. Methods: method of mathematical modeling, method of geometrical optics, method of analyzing the visibility of an array of points. The novelty of the paper is the calculation of the polarization scattering matrix of electromagnetic waves by each facet of the model, taking into account geometric properties of its elongation under the current observation conditions, changing in accordance with the given coordinates and speeds of the target. Also the novelty of the paper is joint use of an algorithm for sampling points from the array during visible facets checking process and a popular algorithm for sampling visible facets by the angle between the normal vectors of facets and the direction of irradiation. This joint use of algorithms is to solve problems of estimating the effective scattering area of a radar object of complex shape. Results. The dynamic model of a spatially distributed air target has been developed. The model is based on both a modified method of geometric optics and a mathematical model of signal spectrum formation which takes into account the effect of secondary Doppler modulation. The model allows to compute the polarization scattering matrix and the frequency components of the secondary Doppler modulation of an air target taking into account the aircraft’s geometric characteristics and its power engine with minimum time expenditures. All radar cross section estimation results received by the proposed method are verified by known experimental results. Practical relevance. The presented dynamic model of a spatially distributed air target allows to create polarimetric range-Doppler portraits and use them in the development of algorithms for the selection and recognition of air targets in various observation conditions and evaluate their automatic detection and recognition probability characteristics.
  • Key words
    • facet model, radar cross section, geometrical optics, polarization scattering matrix, range-Doppler portrait, spatially distributed air target
  • Reference
    • Kuznetsov V. A., Ambrosov D. V. Dynamic model of a spatially distributed air target. Systems of Control, Communication and Security, 2019, no. 2, pp. 215-235. DOI: 10.24411/2410-9916-2019-10211 (in Russian).
Communication systems and telecommunication network
  • D. A. Nikitin
    Significant issues of introduction of a central register for mobile equipment identification in a country
  • Abstract
    • Problem statement. The central register of mobile equipment identification is already implemented in a number of the countries, including several countries of the ex-USSR. Now projects on elaboration of requirements, features of implementation and on introduction of such systems are going on in Russia, Uzbekistan, Tajikistan and other countries. Such projects are difficult (not only in the mentioned countries) and, as a rule, long. At the same time, there are practically no publications in Russian that comprehensively consider the use of such systems. The aim of the work is to consider the significant issues that all participants of project on introduction in the country of the central equipment identity register (CEIR) may face. Methods. A systems analysis of the information obtained during participation in the development of requirements for CEIRs and for equipment identity registers (EIRs) of separate cellular operators, during the designing of their functioning in various conditions, as well as information obtained in the preparation and implementation of such projects. Novelty. A block diagram of the national central mobile equipment identification register is provided. The most significant issues, which arise during the introduction of CEIR, are highlighted and classified by type: conceptual, organizational (including legal), economic and technical. For conceptual significant issues it is described how their solution affects structure and the principles of the register functioning. For organizational, economic and technical issues, solutions are proposed. Practical relevance. The presented analysis will help the customer of such system to consider all the most difficult moments in advance and develop a consistent specification, and also to plan adequate terms of project implementation. Further, article is interesting to mobile network operators that it contains requirements to their networks, which arises during the introduction central register for mobile equipment identification in a country.
  • Key words
    • Central Equipment Identity Register, Central EIR, CEIR, Equipment Identity Register, EIR, IMEI, IMSI, MSISDN, GSMA, IMEI DB, IMEI duplicates, CheckIMEI, IMEI check, blocking of communication services, registration on the mobile network
  • Reference
    • Nikitin D. A. Significant issues of introduction of a central register for mobile equipment identification in a country. Systems of Control, Communication and Security, 2019, no. 2, pp. 28-53. DOI: 10.24411/2410-9916-2019-10202 (in Russian).
Systems for ensuring of safety and security
  • Y. S. Zhechev, E. B. Chernikova, A. O. Belousov, T. R. Gazizov
    Experimental research of a reflection symmetric modal filter in the time and frequency domains
  • Abstract
    • Statement of problem: when creating radio-electronic equipment (REE), much attention is paid to reliability and electromagnetic compatibility (EMC) because of the vulnerability of REE to electromagnetic interference. Unfortunately, classical technical methods of EMC providing do not always provide EMC of electronic devices, often worsening its weight and size characteristics. Important direction of the EMC research area is protection against conducted interference which considered the most harmful one, as it can penetrate into devices directly through conductors. One of the most dangerous excitation seems to be a powerful ultrashort pulse (USP), penetrating into devices and capable of disabling them. For REE protection from USP one can apply modal filtration technology. It implies the use of modal distortions (signal changes due to the difference in the mode delay of a multi-conductor transmission line). In addition, a new approach to the improvement of modal filtration through the use of the reflection symmetric structures, as well as a device based on them – a reflection symmetric modal filter (MF), has been proposed. A number of reflection symmetric MF researches have been carried out, but all of them have been carried out only through simulation. The aim of the work is to present the results of full-scale and computational experiments for the reflection symmetric MF. To reach the aim of the work it is necessary to develop and produce a layout, then we need to obtain time and frequency characteristics, and also compare the results of full-scale and computational experiments Used methods: for computational experiments we used the quasistatic simulation system based on a method of moments and the electrodynamic simulation system based on a finite element method and a finite difference method in the time domain. We used measurements which had been obtained on a fabricated printed circuit board of the reflection symmetric MF in the time and frequency domains for full-scale experiment. Results and their novelty: the time and frequency characteristics of the manufactured reflection symmetric MF were obtained for the first time. Their comparison with the results of quasistatic and electrodynamic simulation was performed. For the first time the possibility of USP decomposition in the reflection symmetric MF was shown experimentally, and consistency of the results of computational and full-scale experiments was obtained. The results were received through the use of proven and well-reputed mathematical methods, computational algorithms and software products, as well as through the verification of theory by practice as the most widely used and trusted method. The practical significance consists in the opening possibilities of creating various protection devices modifications (both on the basis of reflection symmetry and absolutely new ones), as well as the practical application of the device under study to protect REE against USP in various fields due to low mass, radiation resistance, reliability and improved characteristics.
  • Key words
    • electromagnetic compatibility, protective devices, modal filtration, reflection symmetric modal filter, time response, frequency response, full-scale experiment, computational experiment
  • Reference
    • Zhechev Y. S., Chernikova E. B., Belousov A. O., Gazizov T. R. Experimental research of a reflection symmetric modal filter in the time and frequency domains. Systems of Control, Communication and Security, 2019, no. 2, pp. 162-179. DOI: 10.24411/2410-9916-2019-10208 (in Russian).

  • М. А. Samoylichenko, T. R. Gazizov
    Modified microstrip line which can protect against ultrashort pulse
  • Abstract
    • The relevance of the work: ensuring the stable operation of electronic equipment (EE) under the influence of electromagnetic interference is important due to the fact that radio systems become more complex, the field of application of EE expands, the density of circuit boards increases. Nowadays there are many protection devices, but they have some complex design features. These features reduce the devices operation speed and lead to spurious parameters, and also they reduce the protection possibilities against a powerful ultrashort pulse (USP). The development of modern protection devices requires simplification and cheapening of their implementation, therefore, their improvement is important. Modal filters (MF) are being actively studied among these devices. But for each of them, a passive conductor is required, which takes up space and has mass. That’s why, the improvement of the MF is necessary. The purpose of the paper is to develop a new device for protection against USP on the basis of a modified microstrip line (MSL). Novelty: implementation of a microstrip protection device, due to two cuts in its reference plane. Result: the materials were demonstrated to show the achievement of the alignment of the amplitudes of the decomposition pulses, which turned out to be 3 times less than the level of the input signal, was achieved. Methods used: to substantiate technical solution quasistatic analysis was used. It also was used during the simulation process. Practical relevance: the solution allows a simple and cheap implementation of protection against USP in widely used double-sided printed circuit boards.
  • Key words
    • microstrip line, modal filter, ultrashort pulses
  • Reference
    • Samoylichenko М. А., Gazizov T. R. Modified microstrip line which can protect against ultrashort pulse. Systems of Control, Communication and Security, 2019, no. 2, pp. 203-214. DOI: 10.24411/2410-9916-2019-10210 (in Russian).
Modeling of complex organizational-technical systems
  • A. A. Boyko
    Warfare Analytical Modelling Method
  • Abstract
    • Problem Statement. Nowadays new analytical models which systematically can take into account the capabilities of various military means in modern warfare are necessary to support the commanding officer’s decision. Available models do not take into account «physical» and «information» military equipment simultaneous mutual influence. The purpose of the paper. Military units ratio assessment can be improved because of different military means joint use effect. It means you have to use reconnaissance, control, fire destruction, communication, warfare imitation, electronic suppression, psychological and non-lethal impact, programmatic and electromagnetic radiation influence equipment together. Used Methods. The main parts of the proposed method are: 1. Combat tree graph development for each tactical area. There are combat episodes marks in graphs. These marks between adjacent nodes has constant forces exertion and work intensity of means. 2. Combat situation plotting. Combat situation is plotted for each graph node in every tactical area. Аn electronic map is used. 3. Forces relation dynamic assessment using the classic Osipov-Lanchester model in each combat episode. The assessment taking into account the possibility of elements positions of battle formations at the beginning of the combat episode and their static location placement after deployment in new positions. 4. Combat tree graph convolving and forces ratio dynamics aggregating. Each graph is convolved into a segment between the initial and final graph nodes. Dynamic is aggregated to a predetermined level with taking into account the hierarchical nesting and possibilities of logistic support in adjacent tactical areas. Novelty of the paper. 1. Accounting of energy, telecommunication, cognitive, resource and psychological factors influence, on opposing military units ratio in analytical combat model is developed. 2. Аnalytical expressions detail which is described the processes in operations like «info-technical» means functioning semi-Markov models where the probability density of the distribution of the transition time depends on the mutual influence of the opposing military units is developed. 3. Accounting of the aggregate value of the forces relation in every fighting moment in all alternative combat episodes in each tactical area is developed. Result. Warfare modelling method for military units which use military equipment, realizing «physical» and «information» influence is developed. The method provides a specific commonality and high operation speed, typical for analytical methods. The examples of using method where integral coefficients of combat commensurability of combat order elements of motorized infantry companies with additional psychological impact and electronic suppression means are defined, are given, forces ratio are shown. Practical relevance. The method can be used in a process of research models development. It can help to substantiate military units composition and perspective military means characteristics. It can also help to develop a staff combat models used at various levels in decision support systems.
  • Key words
    • decision support, combat model, forces relation, combat episode, combat order element, armament sample, tactical area, military formation
  • Reference
    • Boyko A. A. Warfare Analytical Modelling Method. Systems of Control, Communication and Security, 2019, no. 2, pp. 1-27. DOI: 10.24411/2410-9916-2019-10201 (in Russian).

  • Yu. L. Koziratsky, R. G. Khilchenko, E. M Shutko
    The model of the process of backscattering of probing laser radiation from a cloud of micro-glass spheres
  • Abstract
    • Problem Statement. In this study the possibility of premature triggering of a non-contact laser fuse during a micro-glass spheres cloud shot impact was considered to protect the rear hemisphere of the aviation complexes from control missiles attacks, equipped with a thermal homing head. The aim of the paper is to develop the model of the process of backscattering of probing laser radiation from an interfering formation, which has a micro-glass spheres cloud form. The model allows to evaluate the influence of the interfering cloud characteristics on the premature operation of a laser-controlled rocket fuse possibility. Result. The proposed method allows to protect an aviation complexes. It enables to trigger rocket fuse and detonate the warhead at a safe distance. The model of the process of backscattering of probing laser radiation from a cloud of micro-glass spheres represents the average value of the optical radiation power, reflected from particles of the interfering cloud which fell into the irradiation depth of fuse laser beam. The model allows to substantiate the requirements of interference formations and their formulation systems.
  • Key words
    • the process of backscattering, micro-glass spheres, non-contact laser fuses
  • Reference
    • Koziratsky Yu. L., Khilchenko R. G., Shutko E. M. The model of the process of backscattering of probing laser radiation from a cloud of micro-glass spheres. Systems of Control, Communication and Security, 2019, no. 2, pp. 100-109. DOI: 10.24411/2410-9916-2019-10205 (in Russian).