The authors study the process of decision-making optimization in the control of the spacecraft onboard systems. To ensure the continuous operation of a remotely controlled complex technical system, it is necessary, on the basis of an analysis of the state of the onboard systems, to formulate control effects, the absence of which could lead to the system's failure to fulfill its tasks or system failure. In order to prevent such situations, an approach based on a simulation model is proposed, the use of which will reduce the risk of accidents in the onboard systems of the spacecraft. The proposed model is represented by factor space. The state of the onboard parameters of the spacecraft at different points in time is matched by the set of points that form the decision-making surface in this factor space. The basic stages of forming the optimal trajectory on the decision surface, which are approximated by numerical methods, are given and described. Using the actual values of the parameters obtained in a 15-minute data communication session from the board of the artificial satellite Earth "Ocean-1", a decision-making surface was constructed. The equation of the optimal trajectory on the created surface is obtained. The simulation results will be used to develop emergency management and control systems.
The experience of the military aggression of the Russian Federation against Ukraine has shown the relevance and necessity of understanding the problems of moral and psychological support in the Armed Forces of Ukraine in modern conditions. The problem of constant misinformation of the population, the spread of propaganda and the implementation of destructive psychological influence in the interests of the enemy is very sensitive. The simplest tool for distribution misinformation is the Internet (its easy access and wide popularity). The goal of the article is to develop a methodology for monitoring negative psychological influences in online media. The basis of develop methodology is the build a mathematical model using a 4th order polynomial trendline. To determine the number of text messages that were simultaneously processed in statistical analysis, the Hurst exponent was applied. Indicators of negative psychological influences in text messages are selected. Statistical observation is carried out at the expense of a database with text messages from online media. The coefficients of the polynomial regression model are calculated using the least squares method for using a spreadsheet processor Microsoft Excel, or by solving a system of linear algebraic equations using Cramer's method. It has been proved that the developed mathematical model for monitoring negative psychological influences is adequate over the time interval under study. Due to the developed methodology for monitoring negative psychological influences in online media, it is possible to mathematically describe the process of the influence of text messages on a person. The mathematical model underlying the methodology can be used not only at the monitoring stage, but also at the stage of counteracting destructive psychological effects, as well as for the implementation of preventive measures to prevent the spread of such effects by taking into account the frequency and common ways of spreading negative psychological effects in text messages online media. It should be noted that the developed methodology can be used to automate online media monitoring in order to timely identify information threats to military command and control bodies and the personnel of the Armed Forces of Ukraine in the context of ensuring the information security of the state.
Modern types of internal threats and methods of counteracting these threats are analyzed. It is established that increasing the competence of the staff of the institution through training (education) is the most effective method of counteracting internal threats to information. A method for assessing the influence of personnel competence on institutional information security is proposed. This method takes into account violator models and information threat models that are designed for a specific institution. The method proposes to assess the competence of the staff of the institution by three components: the level of knowledge, skills, and character traits (personal qualities). It is proposed to assess the level of knowledge based on the results of test tasks of different levels of complexity. Not only the number of correct answers is taken into account, but also the complexity of test tasks. It is proposed to assess the assessment of the level of skills as the ratio of the number of correctly performed practical tasks to the total number of practical tasks. It is assumed that the number of practical tasks, their complexity is determined for each institution by the direction of activity. It is proposed to use a list of character traits for each position to assess the character traits (personal qualities) that a person must have to effectively perform the tasks assigned to him. This list should be developed in each institution. It is proposed to establish a quantitative assessment of the state of information security, defining it as restoring the amount of probability of occurrence of a threat from the relevant employee to the product of the general threat and employees of the institution. An experiment was conducted, the results of which form a particular institution show different values of the level of information security of the institution for different values of the competence of the staff of the institution. It is shown that with the increase of the level of competence of the staff of the institution the state of information security in the institution increases.
The main aim of this research is the creation of information technology for mobile (of rapid deployment) security systems of the area perimeter. This system appears to be a complex of models and methods, information, software, and hardware mean that have interacted with users during decision-making and control of implementation for management solutions. The proposed information technology aimed at improving the protection level for security departments by automating the process of danger detection for perimeters and decision-making for alarm. The structural model of the system, the model of the system's components interaction, and the model of identifying the subjects of emergency threats have been proposed. A method for identifying unauthorized access to the perimeter of the secure facilities, using the production model of knowledge representation, was created. It is a set of linguistic expressions (such as "IF-THEN") and the knowledge matrix. The method of ranking for objects, which are threats of unauthorized access to the perimeter for secure facilities, has been proposed. The practical value of work consists of the possibility of the use of this information technology by perimeter's security systems of various objects. Proposed models are complete and suitable for hardware and software implementation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.