Matematičeskie mašiny i sistemy最新文献

筛选
英文 中文
Methodological and technological aspects of computer modeling of decision-making scenarios 决策情景计算机建模的方法和技术方面
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-65-88
O.H. Dodonov, V.R. Senchenko, V.H. Putyatin, A.V. Boichenko, O.V. Koval
{"title":"Methodological and technological aspects of computer modeling of decision-making scenarios","authors":"O.H. Dodonov, V.R. Senchenko, V.H. Putyatin, A.V. Boichenko, O.V. Koval","doi":"10.34121/1028-9763-2023-3-65-88","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-65-88","url":null,"abstract":"The scenario approach in the field of decision-making for military structures implies carrying out research, the purpose of which is a detailed description of activities that allows for confirm-ing and determining management measures and avoiding future dangers based on consideration of the broadest possible range of options for the possible sequences of events. So it is unsurpris-ing that methodological problems in computer modeling of different scenarios are still relevant. The authors of the article propose an approach to modeling decision-making scenarios based on graphic methods of BPMN notation, Knowledge Graph technology, and OWL models to provide a semantic analysis of the developed scenario. As an example of the offered approach to the de-velopment of a decision-making scenario, the task «Planning of combat operations and man-agement of the naval unit» has been chosen. The approach lets the authors demonstrate the ad-vantages of the approach both during the formation of the scenario in general and at the stages of its implementation with a simulation complex that simulates the work of functional subsys-tems and consists of modules completing the tasks of each subsystem. The introduction of an ontology into the scenario model contributes to the semantic consistency of the scenario pro-cesses and improves the structure of the scenario model by identifying and eliminating hidden errors and inconsistencies. Using the Neo4j graph database (as a knowledge-based technology) allows for visualizing and detecting anomalies in BPMN models by analyzing dependencies and relationships between the elements and using the graph algorithms to find deviations, identify cycles, determine the shortest paths, and optimize processes. The proposed methodology makes it possible to significantly reduce the number of errors in the scenario model, which subse-quently significantly increases the effectiveness of modeling the organizational and functional structure and actions of officials when performing combat tasks with the simulation complex. The considered scenario is one of many others developed to explore the management processes of a naval unit that make up the knowledge base of the simulation complex scenarios. The simu-lation results have proven that the simulation complex can be used to work out a promising au-tomated control technology for naval and air forces.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135709844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security of corporate databases 企业数据库的信息安全
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-31-37
Yu.M. Lysetskyi, D.Y. Kalbazov
{"title":"Information security of corporate databases","authors":"Yu.M. Lysetskyi, D.Y. Kalbazov","doi":"10.34121/1028-9763-2023-3-31-37","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-31-37","url":null,"abstract":"Every day, companies all over the world collect and generate a large amount of data. Now in-formation is digital and is stored in automated digital databases, the use of which allows for processing large amounts of data that previously were difficult to process. Protecting corporate databases and the information within them is essential for economic security. It includes their physical protection, productivity assurance and monitoring, data protection from destruction or damage, access control, and recording of new databases appearing in the infrastructure. Howev-er, since users of different types and levels of access (internal users, system administrators, contractors, partners, and M2M communications) have access to databases, they can abuse their access rights in several ways. These may be an abuse of excessive, objectively necessary, or non-used rights. As a rule, an inefficiently controlled process of granting access rights creates excessive access rights which in turn may cause new information security risks. Security measures include implementing an access management process, granting minimally necessary access rights, and implementing a mechanism to control and block the given access rights. This article discusses such threats to databases as SQL Injections and NoSQL injection attacks, in-sufficient detailing of events in databases, backup leaks, vulnerabilities and configurations, DDoS attacks, and methods to counter these threats. The most effective way to protect data-bases is to implement specialized software and hardware complexes such as Imperva DBS and Imperva WAF developed for database protection. The use of Imperva DBS will help to solve all the key tasks of database protection and provide complete visibility and control over their usage in the enterprise infrastructure.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of mathematical rationale for a complex datа security system of a medical enterprise 某医疗企业复杂数据安全系统的数学原理特征
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-51-57
H.T. Samoylenko, Yu.Yu. Yurchenko
{"title":"Features of mathematical rationale for a complex datа security system of a medical enterprise","authors":"H.T. Samoylenko, Yu.Yu. Yurchenko","doi":"10.34121/1028-9763-2023-4-51-57","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-51-57","url":null,"abstract":"The article is dedicated to the analysis of data protection issues, particularly personal data, in medical institutions of various ownership forms. The necessity of implementing comprehensive data security systems is justified by the Bell-LaPadula model, which is considered a foundation for the development of a complex data security system within the enterprise. The Bell-LaPadula model represents an access control system based on a hierarchical data access structure. How-ever, using a rigid hierarchical approach when building an information infrastructure of an en-terprise based on this model, taking into account different levels of information confidentiality, might not account for the possibility of insider intervention at higher levels. The article analyz-es the key aspects of this model, including assigning special security levels to all participants in data processing and to documents containing the protected data. To ensure security and access regulation based on an adapted model, individual access levels that correspond to each user’s responsibilities and confidentiality level are proposed for them. After implementing a compre-hensive system for protecting confidential data and assigning special security levels to all par-ticipants in the processing of protected data and documents, a clear differentiation of ownership rights to information of different values emerged. This facilitates further expansion of the circle of employees with access to this information, reduces access time, and forms informational and analytical reports on access control system performance. The use of the hierarchical Bell-LaPadula access model allows for effective control over access to the information system and ensures overall enterprise security.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating distributed consciousness with spatial grasp model 利用空间把握模型模拟分布式意识
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-13-30
P.S. Sapaty
{"title":"Simulating distributed consciousness with spatial grasp model","authors":"P.S. Sapaty","doi":"10.34121/1028-9763-2023-3-13-30","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-13-30","url":null,"abstract":"This work is focused on the organization and management of large distributed dynamic systems supplied with global awareness and consciousness, being based on different organizational philosophy, model and technology using holistic, self-spreading, recursive code rather than managing distributed systems as parts exchanging messages. The paper reviews many existing works and publications related to consciousness ideas, which have been appearing for centuries, grouping them into different categories and providing short abstracts for each. It summarizes the main ideas of the Spatial Grasp Model and Technology (SGT) reflecting general technology aspects and its Spatial Grasp Language (SGL) with its distributed interpretation in open networks. The article also compares SGT with the work on mobile agents through its predecessor WAVE using code mobility and emphasizing that the developed spatial paradigm is much more universal and powerful and that it was implemented many years before mobile agents. A simple example in SGL that demonstrates managing a swarm of chasers searching for scattered targets, providing it with higher awareness and consciousness, and improving performance is provided in the paper. The idea of the existence of global awareness and even the consciousness of the whole country is introduced by representing it as the integrity of vital components like the economy, society, defense, ecology, and government. The paper also provides some examples of solutions in SGL to very practical problems in these fields. Obtaining and simulating consciousness-related features like global feelings and opinions is discussed, which may fundamentally influence the development of the whole system. A concluding summary is provided on the potential applicability of SGT for different consciousness categories. The paper confirms the efficiency of the spatial model and technology for simulating different awareness and consciousness features in various distributed systems.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attributive model of software dependability assessment taking into account ДСТУ ISO/IEC 25051:2016 考虑ДСТУ ISO/IEC 25051:2016的软件可靠性评估属性模型
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-113-133
M.M. Redkovska, O.V. Fedukhin
{"title":"Attributive model of software dependability assessment taking into account ДСТУ ISO/IEC 25051:2016","authors":"M.M. Redkovska, O.V. Fedukhin","doi":"10.34121/1028-9763-2023-3-113-133","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-113-133","url":null,"abstract":"The article is devoted to the development of an attributive model of dependable software, defin-ing its metrics, and development of an object-independent universal approach to assessment at-tributes and dependable software metrics. The attributive model of dependable software (AMDS) is designed by analogy with the attributive model for dependable computer systems (CS) and expanded with special attributes and metrics according to the ДСТУ ISO/IEC 25051:2016 Systems and software engineering. Requirements for the quality of systems and software tools and their evaluation (SQuaRE). Requirements for the quality of ready-to-use software product (RUSP) and instructions for its testing (ISO/IEC 25051:2014, IDT). The main attributes of the model have been defined. These are functional suitability, performance level, compatibility, availability of use, reliability, security, ease of support, mobility, efficiency, productivity, satisfaction, the lack of risks, coverage, redundancy, and self-control. An object-independent multipurpose approach to the evaluation of software attributes and metrics has been developed. The comprehensive assessment of software dependability is carried out using AMDS in the form of a linear functional containing estimates of all attributes of the model. A quantitative assessment of the level of software dependability has been considered using the example of the Laboratory Information System (LIS) which automates the work of medical la-boratories. The given example of the software has an overall rating that, according to the rating scale, has a satisfactory level of dependability. The attributive model of dependable software and the assessment of dependability levels can be used by specialists in the field of system de-pendability in various fields of application.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing distributed systems with spatial grasp patterns 管理具有空间把握模式的分布式系统
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-11-25
P.S. Sapaty
{"title":"Managing distributed systems with spatial grasp patterns","authors":"P.S. Sapaty","doi":"10.34121/1028-9763-2023-4-11-25","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-11-25","url":null,"abstract":"The pattern is everything around us. It can represent the world’s regularity, a human-made design, a model, plan, diagram, a standard way of modeling, acting and thinking, a distinctive style or form, a combination of qualities and tendencies, etc. That is why the theory, research, and practical works on patterns are so important for different scientific and technological fields, having also stimulated the preparation and writing of the current paper. The paper reviews existing works on patterns, grouping them by different categories, and briefs the developed Spatial Grasp Model and Technology (SGT) and its Spatial Grasp Language (SGL) with the distributed networked implementation, which provide effective distributed solutions in systems management, control, and simulation by active self-spreading patterns. The article shows how practical patterns can be expressed in SGL, including regular patterns, patterns of concrete objects, and different pattern-based management solutions like coordinating transport columns, finding distributed zone coordinates, and spatial tracking of mobile objects. It also gives network examples of distributed pattern recognition and matching with the use of self-propagating active network templates reflecting images to be found. The paper provides a classified summary of the investigated use of SGL for pattern operations in different areas, which includes descriptive patterns, creative patterns, patterns as spatial processes, pattern recognition, self-matching patterns, combined patterns, cooperating and conflicting patterns, psychological patterns, and recursive patterns. The work concludes with the belief that SGL can be used as a real, very effective, and compact language for pattern representation and operations, and SGT should contribute to the pattern theory and resultant technologies.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approaches to ensuring information security 确保信息安全的途径
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-26-32
Yu.M. Lysetskyi, D.Y. Kalbazov
{"title":"Approaches to ensuring information security","authors":"Yu.M. Lysetskyi, D.Y. Kalbazov","doi":"10.34121/1028-9763-2023-4-26-32","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-26-32","url":null,"abstract":"The article analyzes situational, integration, and integration and innovation approaches that have emerged among domestic enterprises in today's market to ensure information security. The following differences between them have been identified: the situational approach involves the point implementation of information security systems, decentralized management, the lack of a unified approach to system design, and inertia in system implementation; the integration ap-proach involves the presence of planning and information security provisioning services, the formulation of unified requirements for information security, analysis of the criticality of in-formation assets, risk and threat management, and the design of information security from business processes of the enterprise; the integration and innovation approach includes the pres-ence of security operation centers, operational response centers, centralized information securi-ty monitoring systems, the creation of Business Continuity Plans and Disaster Recovery Plans, and the formation of fault-tolerant protection systems. Some existing problems in choosing methods and information protection technologies are presented in the paper. The ways and means for ensuring effective information security in an enterprise are discussed. These are next-generation network firewalls, SIEM systems, DLP systems, as well as a cloud access security broker – CASB. Using CASB to ensure information security in the cloud allows for addressing the following tasks: access control; data protection; detection and response to threats; compli-ance with regulatory requirements; monitoring and auditing; and security policy management. Analyzing the approaches to ensuring information security in domestic enterprises, we can con-clude that it should be based on a comprehensive approach and effective integration of all ele-ments of IT infrastructure at different levels of their interaction.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of the residual life of products under the influence of several degradation processes 几种降解过程影响下产品剩余寿命的测定
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-104-112
О.V. Fedukhin, Ar.A. Mukha
{"title":"Determination of the residual life of products under the influence of several degradation processes","authors":"О.V. Fedukhin, Ar.A. Mukha","doi":"10.34121/1028-9763-2023-3-104-112","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-104-112","url":null,"abstract":"At present, there are a significant number of research results devoted to the study of various types of degradation processes occurring in technical elements and systems. In most works, each of the processes is analyzed separately, and taking into account their influence on the re-sidual life of the product is reduced to choosing and taking into account the dominant process – the most intensively developing process, representing a so-called «weak link» in the theory of reliability. This approach greatly simplifies the degradation pattern of the product, which leads to overestimated prediction results that are unacceptable in critical application systems. The article proposes a method that in an accessible engineering form allows for calculating the re-sidual resource of objects that are subject to the simultaneous influence of several degradation processes with different partial participation. The method is based on the calculation of the av-erage rate and the coefficient of variation of the generalized degradation process. The calcula-tions are carried out using a probabilistic-physical approach which includes a probabilistic model of a diffusion-monotonous distribution of failures (DM-distribution). This distribution is specially formalized on the basis of a Markov random process of diffuse type with a constant rate. The diffusion-monotonic distribution most accurately aligns the statistical data on failures of mechanical objects. Under the influence of several degradation processes, the normalization of initial data and information on the share participation of each of the constituent degradation processes in the generalized degradation process was used for the first time. The method makes it possible to refine the estimate of the product's residual life in comparison with the estimate obtained by taking into account only one dominant degradation process. The obtained refined estimate of the residual life allows for reducing operating costs by optimizing the overhaul in-tervals and establishing the actual life of the objects under study.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135709842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct digital control in the systems of technological process automation 工艺过程自动化系统中的直接数字控制
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-58-67
H.H. Hrabovskyi, M.H. Ievlev
{"title":"Direct digital control in the systems of technological process automation","authors":"H.H. Hrabovskyi, M.H. Ievlev","doi":"10.34121/1028-9763-2023-4-58-67","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-58-67","url":null,"abstract":"In direct digital control (DDC) systems, computers replace traditional analog control devices. Direct digital control systems not only more efficiently perform the functions carried out by analog control devices but also provide new opportunities for increasing control flexibility, such as reprogramming to achieve the required control effects. The principles of developing di-rect digital control systems are described using the example of systems for regulating the tech-nological parameters of rolling. Both analog and discrete automatic control systems (ACS) are used to control mechanisms and equipment at the lower level of the integrated automated con-trol system (IACS) as well as to regulate the technological parameters of rolling. Direct digital control systems built on microprocessor computing technology are widely used. This is basic automation. With traditional control carried out using local automation tools at the lower level of the IACS, each executive mechanism is associated with a separate local system. In a DDC system, a computer operating in a multiplexed time-sharing mode simultaneously regulates several control loops. The computer works on the principle of step-by-step control with a short-term sequential connection to each of the serviced control circuits. It calculates and provides each control loop with new control input values. The main advantages of using DDC systems are listed in the paper. Some algorithms for direct digital control on heavy plate rolling mills and the structure of the algorithm and software of DDC are provided in the article. Some solu-tions regarding the development of DDC systems used for the creation of technological process automation systems at rolling mills are also described.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robots in modern war. Prospects for the development of smart autonomous robots with artificial brain 现代战争中的机器人。具有人工大脑的智能自主机器人的发展前景
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-3-12
A.O. Morozov, V.O. Yashchenko
{"title":"Robots in modern war. Prospects for the development of smart autonomous robots with artificial brain","authors":"A.O. Morozov, V.O. Yashchenko","doi":"10.34121/1028-9763-2023-3-3-12","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-3-12","url":null,"abstract":"The article considers the role of artificial intelligence and robotics in the modern military sphere. It describes how since the beginning of the 21st century, robots have become an integral part of military operations, providing a wide variety of opportunities for the armies of various countries. The prospects for the development of autonomous robots with artificial brains that can operate without continuous human control are considered. Human brain modeling projects are considered in the context of creating electronic brains and smart systems capable of imitating and even surpassing the work of a biological brain. The world human brain modeling projects are briefly reviewed, and their comparative characteristics are given. The Ukrainian project Thinking Computer (Artificial Brain) is described in the paper. The project is a new approach in computerization based on the latest non-traditional technology for the simultaneous processing of various types of information in a single homogeneous multidimensional active associative neuron-like structure that allows creation of a new type of humanoid thinking machines. The article tells about the technological basis of the project, its goals and objectives, as well as the effect of the introduction of the proposed technology. The article describes in detail the principles of operation and features of the new technology of a multi-connected, multidimensional, receptor-effector actively associative neural-like growing network, which has no analogs in modern neural networks. It also explains what advantages thinking computers have over traditional ones, and what prospects the new technology opens up for various areas of human activity. The article demonstrates the research findings and developments regarding the creation of a prototype of an electronic brain for a humanoid robot, as well as plans for organizing the industrial production of thinking computers. In addition, it substantiates the relevance and necessity of implementing the Thinking Computer project to increase the competitiveness and security of Ukraine in the global community.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信