The paper proposes a method, an algorithm and scenarios of the use of a group of unmanned aerial vehicles (UAVs) as base stations to provide radio communication for a group of ground mobile agents (GMAs) as part of he...
详细信息
ISBN:
(数字)9798350349818
ISBN:
(纸本)9798350349825
The paper proposes a method, an algorithm and scenarios of the use of a group of unmanned aerial vehicles (UAVs) as base stations to provide radio communication for a group of ground mobile agents (GMAs) as part of heterogeneous dynamic technical systems (HDTSs) operating in an intelligent environment. The work gives the mathematical description of the problem of choosing sub-optimal (rational) composition and spatial distribution of the UAV s, and calculating the coverage range (radius) for DAV-DAV and DAV - GMA links respectively. The proposed algorithm allows forming the composition of the DAV group (iteratively) to ensure that the coverage for the GMAs when moving in a given region. The algorithm checks the expediency of moving the D A V s (or their operation in current positions), moves additional DAVs from the base or returns unused DAVs to the base (changes their state to inactive), if necessary. The main tasks to be performed by the HDTS (composed of the groups of DAVs and GMAs) have been determined. The paper proposes several scenarios for the use of the UAVs to ensure radio communications for ground mobile agents. The work offers the requirements to the developed solution as part of the security monitor of a HDTS, including the functionality, a set of target parameters, and the main events/possible failures that can occur during the mission
In this paper, we tried to summarize the practical experience of information security audits of nuclear power plants' automated process control system (I&C). The article presents a methodology for auditing the...
详细信息
For present-day facilities of increased danger, such time-related performance measures as delays in control actions transmission and emergency signals presentation are critical. Taking into consideration the appropria...
For present-day facilities of increased danger, such time-related performance measures as delays in control actions transmission and emergency signals presentation are critical. Taking into consideration the appropriate controlsystems, one can note that the knowledge of arrival processes is necessary for the assessment of such delays. A couple of significant branches of applied mathematics: queueing theory and a theory of deterministic queuing systems network calculus operate with arrival processes and can help with delay evaluation. Arrival curves, a representation of arrival processes in network calculus, seem to be much easier to handle and obtain than probability distributions used in queueing theory. Nevertheless, many different arrival curves can be distinguished, each of them having its pros and cons. The article considers the problem of arrival curve representation and calculation for facilities of increased danger. It discloses the duality of the concept of arrival curve and investigates different types of them: the classical minimal arrival curve, the empirical one, linear arrival curves based on the empirical ones, and arrival curves on finite intervals. For the empirical arrival curve, the algorithm is presented, and the drawbacks are revealed. The advantages and disadvantages of empirical-based linear arrival curves are pointed out. The concept of arrival curves on finite intervals is considered, and the linear representation of them is highlighted. The algorithm for the calculation of linear arrival curves on finite intervals is presented, and their advantages are discussed.
The paper considers the problem of analyzing the characteristics of a digital control system as a black box based on the input and output flows characteristics. The Network calculus method is proposed as a system mode...
详细信息
The paper considers the problem of analyzing the characteristics of a digital control system as a black box based on the input and output flows characteristics. The Network calculus method is proposed as a system model. The method makes possible to describe the system as a set of deterministic constraints or arrival curve on the flow. The paper proposes to extend the Network Calculus for the case when the flow is described by more than two parameters and extend Network Calculus for multidimensional feature space. An example the feature space may be consist from a packet sequence number, packet size and packet arrival time. The multidimensional flow might be described in a framework of the Network Calculus by some multidimensional arrival cure used to compute boundaries on the flow behavior and characteristics. The proposed extension of the network Calculus makes possible to model a wider class of systems, for example, considering non-uniform data flows.
This article aims to compare two risk assessment methods: EBIOS and FSTEC. EBIOS is published by the National Cybersecurity Agency of France (ANSSI), while FSTEC originates from Russia. Both methods are used relativel...
This article aims to compare two risk assessment methods: EBIOS and FSTEC. EBIOS is published by the National Cybersecurity Agency of France (ANSSI), while FSTEC originates from Russia. Both methods are used relatively locally, but prove capable in France and Russia respectively. This article briefly describes those methods and compares them. The following research is subjective, and the author compares those methods based on his personal preferences, since no other such comparisons are known. During the research, both methods are briefly described and compared since both have appropriate pros and cons, while both may perform better in a particular situation. It leads to the conclusion that the application of both such methods can prove effective, and the main goal is to choose the most suitable approach for a particular situation.
The paper presents a mathematical model for calculating an NPP power unit's steam generator (SG) level with a VVER-1000 reactor, part of a flexible modeling system (FMS). The distributed model of an SG is designed...
The paper presents a mathematical model for calculating an NPP power unit's steam generator (SG) level with a VVER-1000 reactor, part of a flexible modeling system (FMS). The distributed model of an SG is designed for a more detailed description of processes in a two-phase volume of SG and modeling the readings of level gauges in non-stationary operating modes. The results of verification of the presented model as part of the FMS in the dynamic mode (disconnection of one turbopump pump from two operating ones) of the NPP power unit are presented.
This article presents the model of the lossless network system with an input flow control regulator. The regulator uses a static window flow control algorithm to cut out of band data. The system consists of sequent co...
详细信息
The article presents a flexible modeling system (FMS) of an NPP power unit. The principles of constructing an FMS based on selective programming and its structure are described, and the modeling and experimental data ...
详细信息
The article discusses an approach to the quality management system of digital systems, which unites all stages of the life cycle. Some aspects of quality assurance in digital systems development were considering this ...
详细信息
One of the main directions of management development in current conditions has become the massive use of the latest computer and telecommunications equipment and the formation of highly efficient information technolog...
One of the main directions of management development in current conditions has become the massive use of the latest computer and telecommunications equipment and the formation of highly efficient information technologies. information technology, informationsystems, and high-productivity technologies are the key systems of the innovation economy. These technologies are fundamentally changing all ways of receiving, processing, transmitting, and producing information and are fundamentally technologizing intellectual activity. Hence the exceptional importance of building reliable and functionally secure informationsystems, the central element of which is software. The paper presents models and metrics of software quality, considers issues of ensuring functional reliability, shows the relationship between functional and information security of critical informationsystems for facilities with an increased risk of operation, and presents a comprehensive model for determining the probability of parrying any information attack from a stream of attacks. The presented approaches are used to develop top-level systems for automated process controlsystems for nuclear power plants.
暂无评论