350 rub
Journal Neurocomputers №5 for 2012 г.
Article in number:
Activators and regulators of environment of radicals
Authors:
A.V. Chechkin, M.V. Pirogov
Abstract:
Consideration of problem area of critical systems (CS) is continued. Functioning refusals are categorically unacceptable for CS. It can be provided only by means of intellectualization of CS. Idea of intellectualization of CS leans against the concept of the modeling environment of problem area of CS in the form of environment of radicals. The description of the environment of radicals is based on a special formalism of schemes of radicals. In this formalism standard radicals - unicums and containers are used. Unicums correspond to components of problem area of CS. Containers correspond to properties and connections of such components. Symbolical, vector and tabular representation of schemes of radicals are considered. All these representations are focused on computer realization, on fast transition from representation of one type to another, on maintenance of the interface of the environment of radicals. Convenience and universality of tabular representation of schemes of radicals, including in supernumerary situations, are shown. The main property of environment of radicals is redundancy. Therefore the special activating system is necessary. This system should allocate an active modeling part of the radicals named system quantum in environment of radicals. Activating system respond to maintenance of information-system safety (ISS) with a glance of dynamic aspect of problem area. Special radicals - activators and regulators - a basis of activating system are considered. By means of activators and regulators search of answers to inquires and leaving from conflicts is carried out. The method to arrive at a decision of a problem of synthesis of target unicum is described. This problem is characteristic for all stages of the life cycle of CS. The target unicum is understood as same component of problem area of CS, the operating influence withdrawing system from the conflict in normal and abnormal situation.
Pages: 3-8
References
  1. Чечкин А. В. Обеспечение информационно-системной безопасности сложной системы на основе среды нейрорадикалов ее проблемной области // Нейрокомпьютеры: разработка, применение. 2008. № 7. С. 6 - 11.
  2. Галатенко В. А. Основы информационной безопасности: курс лекций: учебное пособие. М.: ИНТУИТ.РУ. 2006.
  3. Пирогов М. В. Интеллектуальный стенд обеспечения информационно-системной безопасности сложных систем // Нейрокомпьютеры: разработка, применение. 2008. № 7. С. 18 - 25.
  4. Пирогов М. В. Метод ухода от конфликтов сложных систем // Информационно-измерительные и управляющие системы. 2009. Т. 7. № 3. С. 34 - 48.
  5. Соболева Т. С.,Чечкин А. В. Дискретная математика. М.: Издательский центр «Академия». 2006.
  6. Чечкин А. В. Математическая информатика. М.: Наука. 1991.
  7. Чечкин А. В., Евграфов А. Е., Рожков В. В., Лощенков В.И., Пирогов М. В.Применение схем радикалов для описания проблемной области автоматизированного комплекса планирования и управления // Информационно-измерительные и управляющие системы. 2009. Т. 7. № 3. С. 5 - 11.
  8. Чечкин А. В., Пирогов М. В. Методика обеспечения информационно - системной безопасности сложных систем // Нейрокомпьютеры: разработка, применение. 2008. № 7. С. 11 - 17.
  9. Чечкин А. В., Пирогов М. В. Метод интеллектуализации критических систем с использованием таблиц радикалов // Нейрокомпьютеры: разработка, применение. 2012. № 2. С.