# 4 2025
Analysis of new technologies and ways of development
for systems of control, communication and security
for systems of control, communication and security
-
Artificial intelligence and cognitive weapon as the types of strategic armament in a future war
Abstract
- Relevance. Artificial intelligence (AI) are being actively introduced into widespread commercial use. In addition, AI elements are already being used to increase the efficiency and autonomy of military-grade robotic systems in modern wars. This makes research into the applicability of AI in military operations more relevant. The results of using AI can lead to a fundamental change in warfare, and Russia needs to be prepared for it. The aim of the paper is to identify trends in the use of AI, the direction of geopolitical development, military art, and the practice of conducting military (combat) operations, as well as possible problematic aspects of implementing AI based on analysis of Russian and world works on the military application of AI. The results and their novelty. The paper concludes that the use of AI will lead to revolutionary changes in military confrontation, firstly. Secondly, military AI could become a new strategic weapon comparable to nuclear weapons in effectiveness. This would significantly change global geopolitics, dividing countries into advanced and "rogue" ones. Thirdly, if AI develops to the level of strategic weapons, the issue of adequate counteraction will arise. Cognitive weapons are proposed as a counteraction to AI, reducing its effectiveness in performing target tasks. Practical significance. Recommendations for the development of AI technology in Russia, including for military purposes, are based on the results of the analysis of the military use of AI and were prepared in the paper. If these recommendations are implemented, they will significantly enhance Russia's defense capabilities and ensure its position among high-tech countries with advanced military AI technology.
Key words
- artificial intelligence, general artificial intelligence, cognitive weapons, armament, combat operations, military operations, command and control
Reference
- Makarenko S. I. Artificial intelligence and cognitive weapon as the types of strategic armament in a future war. Systems of Control, Communication and Security, 2025, no. 4, pp. 47-67. DOI: 10.24412/2410-9916-2025-4-047-067 (in Russian).
Robot-technological systems
-
Simulation model of the movement of an unmanned aerial vehicle of the quadcopter type
Abstract
- Relevance. Quadcopters are currently the most common unmanned aerial vehicles (UAVs). Advances in technology offer significant potential for the beneficial use of such UAVs in areas such as large-scale monitoring, exploration of hard-to-reach areas, automated delivery, the Internet of Things (IoT), destructive impacts, information leakage, sabotage, and other applications. A simulation model for visualizing UAV motion on a display screen is required to analyze and evaluate UAV applications in various fields. The model should display the UAV's position in space similar to a video camera image, taking into account the weight, size, engine, and propeller parameters, and operator control inputs of real UAVs. However, such a model currently lacks. The objective of this study is to create a simulation model for visualizing the motion of a quadcopter-type UAV in real time on a display screen based on calculated coordinates of the UAV. This model reproduces its weight, size, engine, and propeller parameters, and operator control inputs. Results and their novelty. The scientific novelty of this work is the use of a simulation model for visualizing the flight of a UAV in real time while it moves along a trajectory that is a priori unknown to the observer, when the UAV is subject to random control inputs. Practical significance. The results of this study may be useful for: testing UAV control systems: developing autopilot models and UAV obstacle avoidance algorithms; testing detection, recognition (classification), and improving the accuracy of UAV positioning and orientation; and training UAV operators.
Key words
- unmanned aerial vehicle, flight simulation model, quadcopter, flight visualization.
Reference
- Telny A. V., Monakhov M. Yu. Simulation model of the movement of an unmanned aerial vehicle of the quadcopter type. Systems of Control, Communication and Security, 2025, no. 4, pp. 115-142. DOI: 10.24412/2410-9916-2025-4-115-142 (in Russian).
-
A method for controlling unmanned transport systems based on noise-resistant signal-code structures in conditions of concentrated and noisy interference
Abstract
- Problem Statement: the use of unmanned transport systems is now widely used in all areas of human activity in space, on earth, in air, surface and underwater spaces. However, the use of such systems over global distances, in cities and within large industrial centers is associated with the use of wireless technologies based on radio channels of various wave ranges on their control paths, which, in turn, are susceptible to the destructive effects of various kinds of destabilizing factors in the form of interference, noise, etc. The article sets the task of developing a method for controlling unmanned transport systems based on noise-resistant signal-code structures in conditions of concentrated and noise interference. The purpose of the work: to ensure noise immunity of channels and control paths of unmanned transport systems in conditions of concentrated and noisy interference due to such methods used as spectrum expansion with a change in operating frequency according to a pseudo-random law, spectrum expansion by direct sequence method and spectrum expansion by linear frequency modulation method. Also, the methods used in the study include digital filtering methods, identification of control commands by extrapolation and neuro-processing methods. The main results of the study include an increase in the noise immunity of signals from control paths of unmanned transport systems in conditions of their use in large urban and industrial agglomerations (factories, ports, logistics centers, transport hubs, etc.). Additional effects of the method proposed in the work can include issues of ensuring energy secrecy and information security of control signals in the interests of the country's transport industry as a critical infrastructure, as well as automating the identification of accepted control commands by means of coordinated filtering and digital signal processing. The novelty of the work consists in a set of essential features in the formation of control channels for an unmanned transport system in azimuth (course), direction (speed) of movement and angle (pitch) based on multi-frequency discrete signal-code structures consisting of n chips with a constant discretely increasing or discretely decreasing frequency change at specified time intervals, corresponding to binary parcels and transmitted in the mode of changing the operating frequency according to a pseudo-random law, and received by converting to the original frequency form using a reverse pseudorandom code. The practical significance of the method is to increase the noise immunity of the control path of unmanned transport systems, as well as robotic complexes or robotic platforms of various types based in conditions of random and intentional interference concentrated along the spectrum, as well as industrial noise and interference.
Key words
- control path, linear frequency-modulated signal, robotic complex, signal-code design, spectrum expansion by frequency jumps, trajectory guidance channel, unmanned transport systems.
Reference
- Budko D. D., Budko P. A., Zatsepin T. A., Klimenko A. D. A method for controlling unmanned transport systems based on noise-resistant signal-code structures in conditions of concentrated and noisy interference. Systems of Control, Communication and Security, 2025, no. 4, pp. 143-178 (in Russian). DOI: 10.24412/2410-9916-2025-4-143-178.
Information processes and technologies. Acquisition, storage and processing of information
-
Graphical-analytical method for identifying abnormal states in distributed information systems
Abstract
- Problem statement: Modern distributed information systems are highly complex, scalable, and require fault tolerance, making them difficult to diagnose. Existing methods for identifying the abnormal state of such systems are used to establish the occurrence of an incident and logs of the functioning of individual nodes. However, the underlying methodological basis does not fully localize the failure in the structure of a distributed information system and does not allow for an analysis of the dynamics of its development. In this paper, we propose a method for identifying abnormal states using a grapho-analytical approach for modeling and analyzing their development dynamics in distributed information systems. To build models of the state of a distributed information system over time ("snapshots"), a combined log is used, collected from its components (nodes) and describing the sequence of combined program calls in the process of computing and communication. The method includes the stage of cleaning and unifying logs of components of a distributed information system, the stage of extracting metrics of computing resource usage from log records, the stage of modeling the behavior of a distributed information system in the form of sequences of weighted graphs, and the actual stage of identifying abnormal states based on clustering graphs constructed at the previous stage using the k-means method as the editing distance increases. Each cluster corresponds to one of the states of the distributed information system. As a result of clustering, the average models of the "typical" behavior of the system in each of the states are also determined. Correlating each of the behavior graphs with one of the clusters allows us to identify the intervals of abnormal activity and the moments of transitions between normal and emergency states. Further retrospective analysis of the weighted graphs in the selected sections allows us to deepen our understanding of the processes taking place. Methods used: graph theory methods; data analysis methods; process extraction technologies; system analysis methods. The novelty of the work: the novelty of the research is determined by the use of grapho-analytical methods to identify the abnormal state, their refinement for use in the analysis of logs of distributed information systems. Result: the method described in the paper is implemented as a prototype of a software package that provides visualization of the dynamics of behavior of a distributed information system in the form of graphs, analysis of changes in their structure over time (editing distance), as well as identification of moments of abnormal behavior in time. Practical significance: the results showed that the method makes it possible to identify difficult-to-reproduce errors and monitor the development of node congestion, failures and synchronization violations. Unlike existing solutions, the proposed approach provides a comprehensive analysis of combined logs from multiple nodes without modifying the application code, which confirms its applicability to industrial distributed information systems.
Key words
- average graph, distributed information systems, event log, graph editing distance, graph clustering, monitoring, tracing.
Reference
- Buravlev A. S., Vasiliev N. V., Demidova D. E., Budko N. P. Graphical-analytical method for identifying abnormal conditions in distributed information systems. Systems of Control, Communication and Security, 2025, no. 4, pp. 179-199. DOI: 10.24412/2410-9916-2025-4-179-199 (in Russian).
-
The non-compensatory integral quality evaluation of call centers' performance
Abstract
- Problem statement: In the context of the ongoing special military operation, effective communication with citizens on a wide range of issues of mobilization and military service under contract is an urgent practical task. For this purpose, the Ministry of Defense of the Russian Federation opened a corresponding hotline with the short number 117 (117 Service) in March 2023. This hotline is organized according to the territorial principle: each subject of the Russian Federation has its own call center, which handles calls received at number 117 in this subject of the Russian Federation. This paper describes a scientifically based approach to the integral quality evaluation of call centers' performance, which provides objective evaluation of the actual performance of 117 Service from the point of view of subscribers by individually accounting the contribution of every partial quality estimation being convoluted to an integral quality indicator, as well as maximizing the initial amount of information about call centers' performance. Methods: nonparametric threshold aggregation, weighted sum of criteria, lexicographic ordering, leximine optimization, entropy analysis. Results: based on the method of nonparametric threshold aggregation, a methodology for the formation of an integral indicator of 117 Service performance is proposed. Based on the provisions of information theory, a method of entropy analysis of the amount of initial information and its absolute and relative losses is proposed and applied in the formation of an integral indicator of call centers' performance by various methods. The hypothesis of the study was that the integral indicator of 117 Service performance, constructed by means of nonparametric threshold aggregation, surpasses the similar integral indicator, constructed by the standard method of weighted sum of criteria, according to various comparison criteria of practical importance, and can also be used to solve similar problems of assessing the quality of services of arbitrary service centers, both military and for civilian purposes. The proposed integral indicator, when tested in practice, shows a 17% higher reliability of achieving the real goal and a 22% lower loss of initial information about call centers' performance than the alternative standardly used for these purposes, is simple and does not require special software tools for practical use. Practical significance: the results of the study can be used both in organizing the work of 117 Service and for solving a wide range of other applied tasks in the civil sphere, which can be reduced to the tasks being solved in the study.
Key words
- Service 117, call center, integral quality indicator, non-compensatory threshold aggregation, lexical optimization, weighted sum of criteria, N-model, entropy analysis, entropy, amount of information, information loss.
Reference
- Kasatkin F. Y. The non-compensatory integral quality evaluation of call centers' performance. Systems of Control, Communication and Security, 2025, no. 4, pp. 200-243. DOI: 10.24412/2410-9916-2025-4-200-243 (in Russian).
Information security
-
Behavioral Biometric Authentication and Its Application in Systems with Hybrid Discrete-Continuous Information Transmission
Abstract
- Problem Statement: the increasing complexity of distributed information systems that employ discrete–continuous data transmission necessitates the development of reliable authentication mechanisms resilient to communication channel failures and asynchronous signal arrivals. Traditional authentication mechanisms based on passwords and physiological biometric traits are vulnerable to various types of attacks. At the same time, existing behavioral authentication methods demonstrate insufficient effectiveness when dealing with fragmented or irregularly arriving measurement signals. The objective of this work is to analyze the applicability of behavioral biometric authentication (BBA) in systems with discrete–continuous data transmission and to develop recommendations for building robust BBA architectures adapted to sparse, unstable, and event-driven authentication data streams. Methods: supervised and unsupervised machine learning approaches for analyzing user behavioral patterns, including keystroke dynamics, mouse movements, gait, touchscreen interactions, and other biometric features. Particular attention is given to robustness against missing data, behavioral drift, and architectural adaptation to hybrid data transmission. Novelty: systematization of BBA methods under conditions of irregular signal arrival, as well as classification of approaches with respect to architectural and operational constraints. Results: the study identifies architectural and algorithmic solutions capable of ensuring user authentication in distributed systems with limited frequency of incoming measurement signals. It is shown that multimodal and adaptive methods outperform single-channel approaches in terms of resilience. A generalized assessment based on meta-analysis demonstrates the potential for improving authentication accuracy even with 20–40% missing input features. Practical Relevance: the obtained results can be applied in the design of BBA systems for SCADA (Supervisory Control and Data Acquisition), telemetry gateways, energy-efficient IoT (Internet of Things) devices, and secure terminals. It is proposed to implement BBA architectures on the basis of edge/fog components integrated with SDN (Software-Defined Networking) solutions, enabling dynamic adaptation to both the informational context and the user’s behavioral profile under conditions of partial observability.
Key words
- digitalization, secure authentication, behavioral biometrics (BBA)
Reference
- Uymin A. G, Belousov A. V. Behavioral Biometric Authentication and Its Application in Systems with Hybrid Discrete-Continuous Information Transmission. Systems of Control, Communication and Security, 2025, no. 4, pp. 1-26. DOI: 10.24412/2410-9916-2025-4-001-026 (in Russian).
Transmission, reception and processing of signals
-
Methods and means for analysis and control of radiotechnical parameters of space antenna materials
Abstract
- Problem statement. Space-based electronic equipment is currently gaining significant importance. Global communications, navigation, and monitoring of the Earth's surface and near-Earth space solve a wide range of problems, both general civil and specialized. Onboard space antenna systems, including highly directional antennas, which in most cases are deployable reflector antennas, are crucial elements of space satellites, largely determining their technical and tactical performance. In addition to the traditional requirements for ground-based and airborne equipment, these systems are subject to a number of specific requirements determined by both their functional purpose and the operating conditions in outer space. Highly directional antenna designs utilize special mesh materials as reflector materials, which, while maintaining the required mechanical characteristics (weight, operational durability, and minimal windage), provide the antennas with the required electrical performance. Specific electrical and mechanical performance requirements are also imposed on antennas made using composite materials. These materials must have a reflectivity close to unity. Currently, methods for analyzing and testing highly reflective materials are insufficiently developed. Therefore, the development of methods for analyzing and testing the radio-technical parameters of these materials is urgent. The purpose is to present approaches to solving problems of analyzing and testing the reflective properties of space antenna materials, both at the design stage and in production conditions. Methods. For approaches to ensuring the required electrical and EMC performance, the following were used: analytical and numerical methods of applied electrodynamics, and a computational experiment using proven software. For physical testing, inventive problem-solving methods, classical microwave radio-technical measurement methods, and modern hardware were used. Novelty lies in the proposal of new methods for assessing the reflective properties of antenna materials based on metallic fabrics and composite materials. Result. The feasibility of obtaining preliminary estimates of the reflective properties of mesh materials through calculations and using modern general-purpose electrodynamic modeling tools is demonstrated. New methods for measuring the reflective properties of space antenna materials based on metal mesh fabrics and composite materials are proposed. A number of technical solutions implementing these methods are proposed. A number of practical setups have been developed and tested. Practical relevance of the work based on the proposed method and a number of engineering solutions, design options for measuring setups are proposed.
Key words
- Space antenna, mesh materials, space satellite, reflective properties, electrodynamics.
Reference
- Vedenkin D. A., Dautov O. Sh., Sedelnikov Yu. E. Methods and means of analysis and control of radio-technical parameters of materials of space antennas. Systems of Control, Communication and Security, 2025, no. 4, pp. 91-114 (in Russian). DOI: 10.24412/2410-9916-2025-4-091-114
Communication systems and telecommunication network
-
Algorithm for building a correlation model of telecommunication network faults based on Yoneda's lemma and the ECLAT algorithm
Abstract
- Problem Statement: Modern telecommunication networks generate massive volumes of event data, within which failures and warnings constitute critical categories. Effective correlation of such events is a key prerequisite for timely diagnosis and elimination of malfunctions. The relevance of this research stems from the need to develop methods capable of automatically detecting causal relationships among events in environments characterized by high complexity, noisy data overlays, and concurrent processes within distributed infrastructures. The objective of this study is to construct a formal model and algorithm for the automatic reconstruction of dependency graphs of network element failure events based on the analysis of monitoring logs. The work presents a description of the formalism of event dependency graphs, introduces a proposed algorithm for graph construction using suffix trees, and provides a brief overview along with computational experiments assessing the impact of noise on the accuracy of model reconstruction by the implemented prototype. The proposed algorithm comprises the following stages: (i) construction of event facets, (ii) formation of a relation matrix between these facets, and (iii) filtering and assembly of the final model. Event facets are derived using ECLAT suffix trees applied to event log transactions in the monitoring system. Transactions are identified through a heuristic based on the symmetry between failure events and corresponding recovery events. At the next stage, conditional probabilities of facet inclusions are analyzed, taking into account possible concurrency of events, with low-probability relations being filtered out. Finally, the resulting relation model between facets is transformed into an event dependency graph. The methodological foundation of this research includes: computational graph theory; data analysis methods; probability theory and mathematical statistics; systems analysis; systems modeling theory; set theory; and category theory. The scientific novelty of the proposed approach lies in the developed concept of event dependency based on the inclusion of least upper facets of preorder elements. This enables the construction of event dependency graphs under conditions of noise and overlapping event chains. The practical outcome of the study is the ability to automate the analysis of event logs in telecommunication networks, thereby reducing the workload of support personnel and accelerating the identification of root causes of failures. Experimental results demonstrate that the proposed method is effective under low and moderate levels of event overlap ensuring high accuracy of dependency reconstruction. Thus, this research lays the foundation for the development of intelligent monitoring systems capable of uncovering hidden patterns and supporting the reliability of distributed information and telecommunication infrastructures.
Key words
- associative rules, event dependence graphs, correlation and filtering of events, Ioneda's lemm, partially ordered sets, process extraction
Reference
- Vasiliev N. V., Buravlev A. S., Budko N. P. Algorithm for constructing a correlation model for failures of telecommunication networks based on Yoneda's lemma and the ECLAT algorithm. Systems of Control, Communication and Security, 2025, no. 4, pp. 27-46. DOI: 10.24412/2410-9916-2025-4-027-046 (in Russian).
Electronic, radio and electrical systems
-
Methodology for designing EMI-protective power bus bars
Abstract
- Purpose. Power supply to high-power consumers in aerospace equipment and radio engineering systems is most often implemented using power busbars. Existing power busbar designs are predominantly manufactured with a rectangular cross-section. A primary and achievable reduction in per-unit-length inductance and structural mass can be attained by altering the geometric shape, dimensions, and materials of the conductors and insulators. However, scientific literature has not paid sufficient attention to the development of design methodologies for such structures that would allow for selecting an optimal solution for a required busbar from the known cross-sections, while accounting for conductor and dielectric materials, as well as the attachment of wire taps. Purpose of work is to develop a design methodology for EMI-protective power busbars, which enables the consideration of the electrophysical parameters of conductors and dielectrics, the attachment of wire taps, and their fabrication. Method. The main method employed is quasi-static analysis based on the method of moments. Novelty. The scientific novelty lies in the development of a design methodology for EMI-protective power busbars, which is distinguished by the selection of an optimal cross-section based on known transmission line cross-sections and the incorporation of wire taps into the busbar design. Results. We developed the methodology for designing EMI-protective power busbars and an algorithm for optimizing its geometric and electrophysical parameters. The methodology, combined with the algorithm, enables the characteristic impedance, inductance, and mass to be minimized, and the capacitance to be increased, which ensures power integrity. Based on this methodology, we also developed a manufacturing process for the busbar, which allowed creating a single-phase EMI-protective power busbar with flexible wire taps. Practical relevance. Based on the proposed methodology, we developed and patented a method for manufacturing a multi-phase EMI-protective power busbar. This method enables low mass, increased dielectric strength, and enhanced resilience to radiated electromagnetic interference and electrostatic discharge. This technique allowed us to fabricate and patent a busbar with low parasitic parameters. Electrical tests of a busbar laboratory prototype were conducted at an organization specializing in spacecraft development and demonstrated its applicability for onboard spacecraft cable networks.
Key words
- power busbar, per-unit-length parameters, electromagnetic compatibility.
Reference
- Nikolayev I. I., Komnatnov M. E. Methodology for designing EMI-protective power bus bars. Systems of Control, Communication and Security, 2025, no. 4, pp. 68-90 (in Russian). DOI: 10.24412/2410-9916-2025-4-068-090








