Holistic Spatial Management of International Security

The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching...

Full description

Saved in:
Bibliographic Details
Published in:Математичні машини і системи
Date:2018
Main Author: Sapaty, P.S
Format: Article
Language:English
Published: Інститут проблем математичних машин і систем НАН України 2018
Subjects:
Online Access:https://nasplib.isofts.kiev.ua/handle/123456789/150664
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Digital Library of Periodicals of National Academy of Sciences of Ukraine
Cite this:Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ.

Institution

Digital Library of Periodicals of National Academy of Sciences of Ukraine
_version_ 1859818824349515776
author Sapaty, P.S
author_facet Sapaty, P.S
citation_txt Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ.
collection DSpace DC
container_title Математичні машини і системи
description The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching of distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns expressed in a special high-level recursive language. Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й керування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій, що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просторових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціальною рекурсивною мовою високого рівня. Цель этой статьи – представить новый высокоуровневый подход к распределенной обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагаемая модель и технология основаны на пространственном покрытии распределенных динамических систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся пространственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня.
first_indexed 2025-12-07T15:24:17Z
format Article
fulltext © Sapaty P.S., 2018 11 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 ОБЧИСЛЮВАЛЬНІ СИСТЕМИ UDC 623.764 P.S. SAPATY * HOLISTIC SPATIAL MANAGEMENT OF INTERNATIONAL SECURITY * Institute of Mathematical Machines and Systems National Academy of Sciences of Ukraine, Kyiv, Ukraine Анотація. Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й ке- рування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій, що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просто- рових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціа- льною рекурсивною мовою високого рівня. Було виявлено, що описаний підхід, макетований і випро- буваний у різних країнах у численному цивільному і військовому застосуванні, може також бути ефективним для розв’язання проблем міжнародної та глобальної безпеки, які охоплюють великі території. Грунтуючись на вільному переміщенні та розповсюдженні коду рекурсивних сценаріїв у розподіленому просторі з імплантованими та взаємодіючими інтерпретаторами базової мови (які можуть нараховувати до мільйонів та мільярдів вузлів і працювати спільно без будь-яких центра- льних ресурсів), цей підхід не має потенційних обмежень для вирішення як локальних, так і глоба- льних системних проблем. Основи технології можуть бути реалізовані за короткий проміжок ча- су невеликою групою системних програмістів навіть у традиційному університетському середо- вищі, що вже відбувалось для її попередніх версій у різних країнах. Цей підхід також має соціальну цінність, що привело до створення нової книги по цілісному просторовому управлінню великими соціальними системами, яка цитується у даній статті. На сьогоднішній момент технологія розг- лядається як унікальна, особливо із врахуванням її холістських та гештальт-інспірованих рішень, які дозволяють охоплювати та опрацьовувати просторові середовища набагато швидше, компа- ктніше і простіше, ніж в інших моделях і мовах, оскільки більшість традиційних та трудоміст- ких системних рутин стають притаманними внутрішній автоматичній інтелектуальній та ме- режевій інтерпретації мови високого рівня. Ключові слова: Організація Об'єднаних Націй, міжнародна безпека, зони світового конфлікту, технологія просторового захоплення. Аннотация. Цель этой статьи – представить новый высокоуровневый подход к распределенной обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагае- мая модель и технология основаны на пространственном покрытии распределенных динамических систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся про- странственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня. Было обнаружено, что описанный подход, ранее макетированный и испытанный в разных странах в многочисленном гражданском и военном применении, может быть также эффективен для реше- ния проблем международной и глобальной безопасности, охватывающих большие территории. Основываясь на свободном перемещении и распространении кода рекурсивных сценариев в распре- деленных пространствах со встроенными взаимодействующими интерпретаторами базового языка (которые могут насчитывать до миллионов и миллиардов узлов и работать совместно без каких-либо центральных ресурсов), этот подход не имеет потенциальных ограничений для реше- ния как локальных, так и глобальных системных проблем. Основы технологии могут быть реали- зованы за короткое время небольшой группой системных программистов даже в традиционных университетских условиях, как это уже осуществлялось для ее предыдущих версий в разных стра- нах. Этот подход также имеет социальную значимость, что привело к созданию новой книги по целостному пространственному управлению крупными социальными системами, цитируемой в данной статье. На сегодняшний момент технология является уникальной, особенно с учетом ее холистских и гештальт-инспирируемых решений, охватывающих и обрабатывающих простран- 12 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 ственные среды намного компактнее и проще, чем в других моделях и языках, поскольку большин- ство традиционных и трудоемких системных рутин становятся присущими внутренней интел- лектуальной сетевой и автоматической интерпретации языка высокого уровня. Ключевые слова: Организация Объединенных Наций, международная безопасность, зоны мирово- го конфликта, технология пространственного захвата. Absrtact. The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching of distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns ex- pressed in a special high-level recursive language. It has been found that the described approach, previ- ously prototyped and tested in different countries on numerous civil and defence applications, may be es- pecially effective for solving crises and security problems covering large territories. Based on free move- ment of recursive scenario code in distributed spaces with implanted communicating interpreters of the scenario language (with may account up to millions to billions of nodes and work without any central re- sources), the approach has no limitations for solving local and global system problems. The technology basics can be implemented in a short time and by a small group of system programmers even within tradi- tional university environments, as was done for its previous versions in different countries. The approach also has high social implications and value which resulted in the new book on holistic spatial management of large social systems, cited in the current paper. The technology is unique so far, with its holistic and gestalt-inspired solutions grasping spatial environments directly being much shorter and simpler than under other models and languages, as most of traditional and boring system routines are hidden inside intelligent, networked, and automatic language interpretation. Keywords: United Nations, international security, world conflict areas, Spatial Grasp Technology. 1. Introduction International security, also called global security, refers to the amalgamation of measures taken by states and international organizations to ensure mutual survival and safety [1]. These measures may include military actions and diplomatic agreements such as treaties and conventions. Securi- ty policy is more than defence policy, more than military policy, more than a policy aimed at be- ing prepared for war; security policy is also aimed at avoiding war [2]. Security policy embraces domestic security, economic development policy, and policy for influencing the international sys- tem so as to create a peaceful environment, regionally as well as globally. The world is entering its most dangerous chapter in decades [3], where the sharp uptick in war over recent years is out- stripping the ability to cope with consequences. From global refugee crisis to the spread of ter- rorism, the collective failure to resolve conflict is giving birth to new threats and emergencies. Even in peaceful societies, the politics of fear is leading to dangerous polarization. Conflicts are often spreading from local no nonlocal to international to global, covering large distributed spaces, and it is becoming more and more difficult to prevent, control, and stop them by traditional centralized agencies and resources, also existing measures and technologies. Something in a much broader and more powerful scale is needed for maintaining national, inter- national and global security, which could operate holistically, globally, and spatially. And this is the aim and main contents of the current publication. The rest of this paper is organized as follows. Section 2 provides examples and discusses security issues in concrete areas including disease epidemics, world religious diversity with po- tential tensions, environmental dangers, refugee crises, armed conflicts, terrorism, etc. Section 3 briefs some existing international security bodies and measures like United Nations, Security Networks, and security oriented technologies. Section 4 describes basics of the developed Spatial Grasp Technology, SGT, with its self-evolving spatial patterns, Spatial Grasp Language, SGL, and its networked interpreter. Section 5 provides security-oriented application examples written in SGL, like finding suspects worldwide, controlling and impacting the spread of a conflict, and distributed simulation of territorial conquest by competing forces. Section 6 concludes the paper https://en.wikipedia.org/wiki/State_(polity) https://en.wikipedia.org/wiki/International_organization ISSN 1028-9763. Математичні машини і системи, 2018, № 4 13 Figure 1 – Ebola outbreak in Africa with air traffic connections to the rest of the world Figure 2 – World colour-coded map denoting different religious affiliations while providing hints for a quick technology implementation, and the References include infor- mation on the cited review sources and previous technology publications and applications. 2. Security Issues in Concrete Areas Below are brief excurses into the world areas with potential dangers to international security, all such dangers having massive, spatial, and distributed nature, and requiring quick and global reac- tion on them. 2.1. Epidemics The 2014 West African Ebola Outbreak [4] was one of the largest and deadliest recorded in history. The affected coun- tries, Sierra Leone, Guinea, Liberia, and Nigeria, had been struggling to contain and mitigate the outbreak. The ongoing rise in confirmed and suspected cases, 2615 as of August 2014, was considered to increase the risk of international dis- semination, especially because the epi- demic was affecting cities with major commercial airports, see Fig. 1. For his- torical reasons, all these countries had strong ties with European countries. Nige- ria, being the most populous country in West Africa with more than 166 million people, was es- pecially connected to the rest of the world. 2.2. World Religious Diversity Influence of different religions on the world security should not be underestimated [5]. Historical- ly, religious war [6] or holy war was a war primarily caused or justified by differences in religion. In the modern period, debates are common over the extent to which religious, economic, or ethnic aspects of a conflict predominate in a given war. The nature of the religious dimension of interna- tional conflict, which is sometimes neglected, is often misunderstood, and frequently exaggerated. No major religion has been exempt from complicity in violent conflict, but religion is often not the sole or even primary cause of conflict. With so much emphasis on religion as a source of con- flict, the role of religion as a force in peacemaking is usually overlooked. In Fig. 2, the main world religious affiliations [7] are shown in different colours (as of 2011) without further details, just to highlight the existing religious diversity worldwide. 14 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 2.3. Environmental Dangers Environmental security [8] considers the abilities of individuals, communities or nations to cope with environmental risks, conflicts or limited natural resources. For example, climate change can be viewed a threat to environmental security. Human activity impacts CO2 emissions, influencing regional and global climatic and environmental changes and thus agricultural output. This can lead to food shortages causing political debate, ethnic tension, and civil unrest. For example, pro- tecting the world’s freshwater resources [9] requires diagnosing threats over a broad scale, from global to local. It has been found that nearly 80% of the world’s population is exposed to high levels of threat to water security, as shown in Fig. 3 in colours (from blue as lower to red as high- er). Massive investment in water technology enables rich nations to offset high stressor levels without remedying their underlying causes, whereas less wealthy nations remain vulnerable. Figure 3 – World map expressing global threats to human water security 2.4. Refugees Crises Refugee crises [10–12] for the last years have essential impact on international security. A refu- gee is a displaced person who has been forced to cross national boundaries and cannot return home safely. Such a person may be called an asylum seeker until officially granted refugee status if they formally make a claim for asylum. By the end of 2016, 65,6 million individuals were for- cibly displaced worldwide as a result of persecution, conflict, violence, or human rights violations. In 2017, the total number of forcibly displaced persons was 68,5 million. From them, official to- tal refugee population number was 25.4 million. An example of world map of refugees for June 2015 is shown in Fig. 4, with darker colours indicating higher refugee levels [12] (sources: UN- HCR, Migration Policy Institute, Refugees International, press reports). Figure 4 – Example of 2015 world map of refugees https://en.wikipedia.org/wiki/Environmental_hazard https://en.wikipedia.org/wiki/Natural_Resources ISSN 1028-9763. Математичні машини і системи, 2018, № 4 15 2.5. Armed Conflicts The main situations of armed violence (in 2017) have been described and discussed in [13] that amounted to armed conflicts in accordance with definitions under International Humanitarian Law (IHL) and International Criminal Law (ICL). In any event, the existence of an armed con- flict was generally limited to the areas where the parties to the conflict were conducting hostilities against each other, although armed conflicts may potentially evolve into global ones. The most terrible could be nuclear war [14] theoretically involving most or all nuclear powers releasing a large proportion of their nuclear weapons. Fig. 5 depicts schemes copied from [15] and related to six hypothetical escalation scenarios which may be spiralling to the world’s nuclear war. These pictures (of 2007, already outdated politically and semantically) are used here only to show the possible spatial world dynamics under such or similar conflicts and which may serve as a hypo- thetical testbed for the crisis management technology discussed in this paper. Figure 5 –Six hypothetic escalation nuclear scenarios 2.6. Other Areas Many other areas can be named containing potential threats to international security [16–21], and especially terrorism [18], which in the broadest sense is the use of intentionally indiscriminate violence as a means to create terror among masses of people or the fear to achieve financial, po- litical, religious or ideological aim. The global terrorism index for 2016 can be found in [20]. 3. International Security Bodies and Measures There are many such bodies and measures worldwide, due to highest importance of national and international security issues, with few of them mentioned in this section. 3.1. United Nations Saving succeeding generations from the scourge of war was the main motivation for creating the United Nations, UN [22]. Since its creation, the UN has often been called upon to prevent dis- putes from escalating into war, or to help restore peace when armed conflict does break out, and to promote lasting peace in societies emerging from wars. UN Security Council [23] is the organ with primary responsibility for the maintenance of international peace and security. When a com- plaint concerning a threat to peace is brought before it, the Council's first action is usually to rec- ommend to the parties to try to reach agreement by peaceful means. In some cases, the Council itself undertakes investigation and mediation. It may appoint special representatives or request the Secretary-General to do so or to use his good offices. It may set forth principles for a peaceful settlement. 16 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 3.2. Security Network (ISN) The International Relations and Security Network (ISN) [24] was an open access information service located at ETH Zurich. Its mission was to facilitate international relations (IR) and securi- ty-related dialogue and cooperation within a network of organizations, professionals and students, and to provide open-source research tools and materials in accessible ways. ISN collated and shared IR and security-centered content from numerous partners throughout the world and main- tained a freely accessible multimedia library that provided tens of thousands of IR and security- related materials. In 2016, the ISN was fully integrated into its parent organization, the Center for Security Studies, CSS [25]. The ISN was also a co-organizer of the Swiss-sponsored International Security Forum (ISF), which is a large conference held every two years in Geneva and Zurich on a rotating basis [26]. 3.3. New Technologies The impact of new technologies on peace, security, and development is crucial [27]. It has been argued that we are now in the fourth industrial revolution, where a fusion of technologies is blur- ring lines between the physical, digital, and biological spheres. The new technologies include everything from the Internet to drones to big data, and the potential applications of these technol- ogies are rapidly expanding. In the 2020, 60% of individuals are expected to be actively using the Internet. Many organizations are developing security-oriented technologies like, for example, In- ternational Security Networks [28], which is a leading manufacturer of complete security solu- tions, providing the leading software suite for gated communities. 4. Spatial Grasp Technology, SGT We are briefing here the developed and patented high-level networking control and processing technology [29–46] tested and prototyped in different countries, which may be suitable for runtime dealing with urgent international crises and security problems. It can potentially start in any world points and cover the whole universe with efficient spatial solutions. 4.1. Self-evolving Spatial Patterns Within SGT, a high-level scenario for any task to be performed in a distributed world is repre- sented as an active self-evolving pattern rather than traditional program, sequential or parallel. This pattern, written in a high-level Spatial Grasp Language (SGL) and expressing top semantics of the problem to be solved, can start from any world point. It then spatially propagates, repli- cates, modifies, and matches the distributed world, as shown in Fig. 6. Figure 6 – Spatial pattern growth & coverage & matching ISSN 1028-9763. Математичні машини і системи, 2018, № 4 17 Figure 7 – Creating distributed knowledge infrastructures The self-spreading & matching pat- terns can create knowledge infrastructures arbitrarily distributed between system com- ponents (humans, robots, sensors, other sys- tems, etc.) as in Fig. 7, where communi- cating SGL interpreters are shown as univer- sal control modules U. These infrastructures, which may be left active, can effectively support or express distributed databases, command and control, situation awareness, autonomous decisions, as well as any other existing or hypothetical computational and control models. 4.2. Spatial Grasp Language, SGL SGL allows us to directly move through, observe, and provide any actions and decisions in fully distributed environments (whether physical, virtual, executive, or combined). It has universal re- cursive structure, shown in Fig. 8, capable of representing any parallel and distributed algorithms operating on, over, or in spatially scattered data or other distributed systems. Figure 8 – SGL recursive syntax An SGL scenario develops as parallel transition between sets of progress points (or props), with self-modified and self-replicating scenario code freely moving in distributed spaces. Starting from a prop, an action may result in new props (which may be multiple). Each prop has a resulting value, which may be arbitrarily complex, and resulting state (one of: thru, done, fail, and abort). Different actions may evolve independently or interdependently from the same prop, split- ting and parallelizing in space. Actions may also spatially succeed each other, with new ones ap- plied sequentially or in parallel from the props reached by previous actions. Elementary operations can directly use states and values of props reached by other actions whatever complex and remote they might be. Any prop can associate with a position in physical, virtual, executive or combined world. Staying with world points, it is possible to directly access and impact local world parameters in them. Overall organization and control of the breadth and depth space navigation and coverage is provided by SGL rules, which may be nested. These rules, for example, can be as follows. • Elementary arithmetic, string, or logic operation. 18 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 • Hop in a physical, virtual, execution, or combined space. • Hierarchical fusion and return of (remote) data. • Distributed control, both sequential and parallel. • A variety of special contexts for navigation in space, influencing embraced operations and decisions. • Type or sense of a value or its chosen usage, guiding automatic interpretation. • Creation or removal of nodes and links in distributed knowledge networks. • A rule can be a compound one, integrating other rules; it can also be defined as a result of operations of arbitrary complexity. Working in fully distributed physical, virtual or executive environments, SGL has differ- ent types of variables, called spatial, effectively serving multiple cooperative processes: • Heritable variables – starting in a prop and serving all subsequent props which can share them in both read & write operations. • Frontal variables – transferred on wavefronts between consecutive props and replicated if multiple new props emerge. • Environmental variables – accessing different elements of physical and virtual words when navigating them, also certain parameters of SGL interpreter. • Nodal variables – a temporary property of world nodes, accessed and shared by all activ- ities associated with these nodes. These types of variables, especially when used together, allow us to create flexible and robust spatial algorithms working in between components of distributed systems rather than in them. Such algorithms can replicate, spread and migrate in distributed environments (partially or as a whole), always preserving global integrity and control. To simplify SGL programs, some traditional abbreviations of operations and delimiters can be used too, as substituting certain rules, but altogether always remaining within the general syntactic structure shown in Fig. 8. 4.3. SGL Networked Interpreter The SGL interpreter consists of a number of specialized modules handling and sharing specific data structures, as in Fig. 9. Figure 9 – SGL interpreter organization and main components The interpreters can communicate with each other, and their distributed network can be mobile and open, changing the number of nodes and communication structure at runtime. The backbone and nerve system of the distributed interpreter is its dynamic spatial track system with its parts kept in the Track Forest memory of local interpreters. These are logically interlinked with similar parts in other interpreter copies, providing altogether global control cov- ISSN 1028-9763. Математичні машини і системи, 2018, № 4 19 Figure 10 – SGL interpretation network as a universal spatial machine erage. The distributed track structure enables for hierarchical and horizontal control, also remote data and code access, with high integrity of emerging parallel and distributed solutions achieved without any centralized resources. Dynamically created track forests spanning the systems in which SGL scenarios evolve are also used for supporting spatial variables and echoing & merging control states and remote data, while self-optimizing in parallel echo processes. They also route further grasps to the posi- tions in physical, virtual, executive or combined spaces reached by the previous grasps, uniting them with frontal variables left there by preceding grasps. The distributed SGL interpreter may have any number of communi- cating nodes, up to thousands to mil- lions to billions, effectively converting the whole world into a universal spa- tial machine operating under spread- ing intelligent scenarios. Any number of such scenarios can operate simulta- neously (cooperatively or competitive- ly) while starting at any time and from same or different world points, see Fig. 10. Being very compact (by the gained experience of implementation on different platforms) the U copies may be integrated with (or implanted into) any existing systems, popular media and email including. They can also be concealed if to operate in hostile environments, allowing the latter to be analyzed and impacted in a stealth manner. In the next section, we will be showing fully distributed and parallel solutions in SGL for exemplary problems that may relate to international security, showing their compactness and ca- pability of effectively working in a global, worldwide scale. 5. SGL Application Examples For the following scenarios, we will be first providing their natural language descriptions with key words marked in bold, and then showing formal versions in SGL where the same words are identifying corresponding operations or parameters in their bodies, thus showing the transition from informal to formal descriptions, with the latter capable of direct execution by the technology offered. 5.1. Finding Suspects Worldwide Imagine we have to find detailed information about individuals belonging to some Group inden- tified by specific group’s features, with the group historically originating in START position represented by certain physical or virtual address. When staying in this position, the group mem- bers can be found by a match of the group’s features with local_databases. The latter may, how- ever, fail to have records on some or all individuals sought, but their traces may exist in lo- cal_security systems checking, for example, movement of passengers at air and sea ports or on roads, etc. If such traces exist and lead to other world locations, it will be reasonable to search both data and security records at the other points too, and so on. This combined database & secu- rity checking may, in principle, spread and cover the whole world, and in parallel. The found concrete match in different world points can be collected with its return (along with exact whereabouts of individuals) to the START point with output there. 20 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 Figure 12 – Spatial coverage and impact of the evolving distributed processes This scenario can be directly expressed in SGL in a compact manner, as follows, with its possible spatial evolution shown in Fig. 11. hop_first(START); nodal(Other); frontal(Group) = features; output(‘Records found worldwide:’ && repeat(return(match(Group, local_databases)), Other = traces(Group, local_security); hop_first(Other))) Figure 11 – Spatial worldwide search for individuals with the return of data found Answer in the START point may be as follows: Records found worldwide: match_1, match_2, …, match_m 5.2. Controlling and Impacting the Spread of Conflict Imagine there is evolving and spreading phenomenon in some region (like, for example, ethnic or military conflict). And we want, beginning from some node START determined as being inside this conflict, to spread our search through the conflict area, via neighbors of the reached nodes, and in parallel, with trying in each new node where its STATE returns active to impact (like ex- tinguish, or quench) the conflict there. After reaching boundary of the activity zone, we may de- cide to continue spreading further with trying to prevent the conflict appear- ance in new nodes if their STATE still indicates as prone to the conflict. After reaching boundary of conflict prone zone, we may want to collect and bring back coordinates, or WHERE, of all nodes lying on this boundary and out- put them as indication of the beginning of totally safe area. All this can be ex- pressed in SGL in a compact form as follows (see also Fig. 12), where opera- tion hop_first allows for reaching new nodes only once, thus preventing possi- ble cycling. ISSN 1028-9763. Математичні машини і системи, 2018, № 4 21 hop_first(START); output(‘Conflict prone boundary:’ && repeat(or_sequence((STATE == active; impact(quench)), (STATE == prone; impact(prevent)), done(WHERE)); hop_first(neighbors))) The answer in the START node may be as follows: Conflict prone boundary: x1_y1, x2_y2, x3_y3, …, xm_ym For a simplified variant of this scenario, like only spreading throughout the active conflict zone with doing nothing at nodes reached but providing output of the coordinates of nodes on the zone’s boundary, we may write: hop_first(START); output(‘Active conflict boundary:’ && (repeat(STATE == active; hop_first(neighbors)); WHERE)) The answer in START this time will be as: Active conflict boundary: x1_y1, x2_y2, x3_y3, …, xn_yn Another variant of this scenario by which coordinates of all nodes reached inside the ac- tive conflict area are to be collected, returned, and output, may look like follows: hop_first(START); output(‘All active conflict nodes:’ && repeat(STATE == active; free(WHERE), hop_first(neighbors))) The answer in START position now will be as: All active conflict points: x1_y1, x2_y2, x3_y3, …, xk_yk The scenarios presented above may also relate to other types of evolving phenomena, like spreading of diseases, where inside the active zone we may use strong, say, virus killing drugs and outside it, within the disease prone zone, prophylactic ones. Other similar scenarios may be used for forest fires, flooding, famine, etc. 5.3. Distributed Simulation of Territorial Conquest Imagine we have different opposing forces, let them be three, and which have individual strengths identified by data1, data2, data3, which are starting, correspondingly, in positions START1, START2, and START3. Each Force tries to conquer and cover the whole Area de- fined by coordinate limits while competing with other forces on the same territory. The resultant space coverage by particular force can depend on combination of the force’s strength, QUALI- TIES of this point of the region, which may include ethnicity and acceptance of this Force by local population, also take into account its previous occupation which may be by a different Force (kept in its CONTENT). The changing from one particular occupation force to another may not be acceptable by locals, and the fixed Level from the previous occupation should be tak- en into account too. So Real power needed to occupy this point by the current Force may differ from the individual strength of this force. As a result, we may have a complex occupation map of the Area similar to the one shown in Fig. 13 (a bit similar, say, to what we may see now in Syria), 22 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 with corresponding SGL scenario code provided below. The previous versions of the technology were efficiently used for similar tasks to this one, like distributed interactive simulations of large military systems [43–46]. Figure 13 – Spatial simulation of the territory coverage by conflicting forces frontal(Force, Area = limits); nodal(Real, Level); branch((hop(START1); Force = data1), (hop(START2); Force = data2), (hop(START3); Force = data3)); repeat(Real = power(Force, CONTENT, QUALITIES); Real > Level; Level = Real; CONTENT = Force; hop(neighbours, Area)) To list coordinates of all nodes, say, marked with Force1, we may write: output(‘Force1:’ && (hop_nodes(Area); CONTENT == data1; WHERE)) The answer in this scenario starting position (which can be any one, including outside the system) may be as follows: Force1: x1_y1, x2_y2, x3_y3, …, xn_yn Any other scenarios for solving nonlocal to global conflict problems by the world cover- age with self-spreading, self-matching, and self-replicating high-level SGL code can be readily offered too. No centralized resources are needed for such solutions at all, and moreover, no copy- ing of the huge and distributed information before its analysis either, with spatial solutions found directly where multiple data pieces and their relations reside. 6. Conclusion The offered approach can believably make useful contribution to the international and global se- curity, allowing complex problems to be solved in distributed environments without vulnerable centralized resources, while operating in a flexible spatial matching, flooding, or even virus-like mode. The technology can be incorporated within UN or other international bodies as a special global security technique for predicting, preventing, avoiding, and analyzing local and global cri- ses in real time and often even ahead of it. The main difference of the ideology and technology offered is that it directly operates on surfaces of large distributed worlds expressing (grasping) only top semantics and key decisions of the problems to be solved while hiding most of tradition- al system organizational routines (up to 99 percent) inside intelligent and automatic language im- plementation. This allows us to have highly compact, holistic, gestalt-like solutions that can be created on the fly when timely reacting on rapidly changing and asymmetric situations. ISSN 1028-9763. Математичні машини і системи, 2018, № 4 23 SGL has very simple recursive syntax of its core subset, which can be easily implemented in a short time and even within usual university environments, as was done before in different countries for previous technology versions, with the author usually serving as team’s playing coach, top scenario programmer, and supervisor of related MSc and PhD projects. Implementation of SGL interpreters can also be done with their effective embedment into any existing internet, popular media, robotic, and command and control systems. The full language version can be readily implemented for extended applications too, with the author always ready to help with this. Acknowledgments Special thanks to: Springer International Publishing for the lasting support of the author’s ideas and publication of book chapters and recent books, and personally Thomas Ditzinger for sharing admiration of gestalt psychology and theory born in Germany, which influenced holistic orienta- tion of the current work; Takao Ito, Hiroshima University, Japan, whose recent visit to the Na- tional Academy of Sciences and discussions on management of large social and industrial sys- tems with links to international relations and security were productive; Masanori Sugisaka, ALife Robotics Japan, for long and fruitful cooperation in the robotics area and common publications on crises management cited in the paper; Bob Nugent, retired US Navy Commander, currently with Virginia Tech, for meetings and discussions on advanced command and control which ap- peared useful for the world security solutions considered in this paper. REFERENCES 1. International security. URL: https://en.wikipedia.org/wiki/International_security. 2. Kristensen, Heurlin B. International Security. International Relations. UNESCO & EOLSS. 2009. Vol. II. P. 17–20. URL: https://www.eolss.net/sample-chapters/C14/E1-35-04-02.pdf. 3. Guehenno J.-M. 10 Conflicts to Watch in 2017. FP Magazine. 2017. 5 Jan. URL: https://foreignpolicy.com/2017/01/05/10-conflicts-to-watch-in-2017/. 4. Gomes M.F.C., Piontti A.P., Rossi L., Chao D., Longini I., Halloran M.E., Vespignani A. Assessing the International Spreading Risk Associated with the 2014 West African Ebola Outbreak. PLOS Currents, 2014. 2 Sept. URL: http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk- associated-with-the-2014-west-african-ebola-outbreak/. 5. Smock D. Religion in World Affairs, its Role in Conflict and Peace. Special Report 201. United States Institute of Peace. 2008. Feb. URL: https://www.usip.org/sites/default/files/sr201.pdf. 6. Religious war. URL: https://en.wikipedia.org/wiki/Religious_war. 7. Major Religious Groups. URL: https://en.wikipedia.org/wiki/Major_religious_groups. 8. Environmental Security. URL: https://en.wikipedia.org/wiki/Environmental_security. 9. Vorosmarty C.J., McIntyre P.B., Gessner M.O., Dudgeon D., Prusevich A., Green P., Glidden S., Bunn S.E., Sullivan C.A., Reidy C. Global threats to human water security and river biodiversity. Nature. 2010. Vol. 467. P. 555–561. URL: http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/ fall/humanhealth/Vorosmarty%20et%20al%202010.pdf. 10. Refugee. URL: https://en.wikipedia.org/wiki/Refugee. 11. Global Trends. Forced Displacement in 2016. UNHCR. The UN Refugee Agency. 2016. URL: http://www.unhcr.org/5943e8a34.pdf. 12. The world’s refugee crisis: past and present. URL: https://www.economist.com/graphic- detail/2016/05/27/the-worlds-refugee-crisis-past-and-present. 13. Bellal A. The War Report. Armed Conflicts in 2017. The Geneva Academy of International Humani- tarian Law and Human Rights. 2018. March. URL: https://www.geneva-academy.ch/joomlatools- files/docman-files/The%20War%20Report%202017.pdf. 14. Moore C. Is World Nuclear War Inevitable? CAROLMOORE.NET. 2007. Nov. URL: http://www.carolmoore.net/nuclearwar/index.html. 15. Moore C. Six Escalation Scenarios Spiralling to World Nuclear War. Is World Nuclear War Inevita- ble? 2007. URL: http://www.carolmoore.net/nuclearwar/alternatescenarios.html. https://en.wikipedia.org/wiki/International_security https://www.eolss.net/sample-chapters/C14/E1-35-04-02.pdf https://foreignpolicy.com/2017/01/05/10-conflicts-to-watch-in-2017/ http://currents.plos.org/outbreaks/author/marfcg/ http://currents.plos.org/outbreaks/author/anapastore/ http://currents.plos.org/outbreaks/author/luca-rossi-itgmail-com/ http://currents.plos.org/outbreaks/author/dchaofhcrc-org/ http://currents.plos.org/outbreaks/author/ilonginiufl-edu/ http://currents.plos.org/outbreaks/author/betzfhcrc-org/ http://currents.plos.org/outbreaks/author/alessandrovespignani/ http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk-associated-with-the-2014-west-african-ebola-outbreak/ http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk-associated-with-the-2014-west-african-ebola-outbreak/ https://www.usip.org/sites/default/files/sr201.pdf https://en.wikipedia.org/wiki/Religious_war https://en.wikipedia.org/wiki/Major_religious_groups https://en.wikipedia.org/wiki/Environmental_security http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/%20fall/humanhealth/Vorosmarty%20et%20al%202010.pdf http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/%20fall/humanhealth/Vorosmarty%20et%20al%202010.pdf https://en.wikipedia.org/wiki/Refugee http://www.unhcr.org/5943e8a34.pdf https://www.economist.com/graphic-detail/2016/05/27/the-worlds-refugee-crisis-past-and-present https://www.economist.com/graphic-detail/2016/05/27/the-worlds-refugee-crisis-past-and-present https://www.geneva-academy.ch/joomlatools-files/docman-files/The%20War%20Report%202017.pdf https://www.geneva-academy.ch/joomlatools-files/docman-files/The%20War%20Report%202017.pdf http://www.carolmoore.net/nuclearwar/index.html http://www.carolmoore.net/nuclearwar/alternatescenarios.html 24 ISSN 1028-9763. Математичні машини і системи, 2018, № 4 16. Five biggest security threats facing the world in 2016. The conversation. URL: https://theconversation.com/five-biggest-security-threats-facing-the-world-in-2016-52456. 17. Cybersecurity Threats. CIS, Center of International Security. 2018. URL: https://www.cisecurity.org/cybersecurity-threats/. 18. Terrorism. URL: https://en.wikipedia.org/wiki/Terrorism. 19. Terrorism, Counter-Terrorism and International Humanitarian Law. 17th Bruges Colloquium. 2016. 20–21 October. URL: https://www.coleurope.eu/sites/default/files/uploads/page/collegium_47_v7.pdf. 20. Global Terrorism Index. The Institute for Economics and Peace (IEP). 2016. URL: http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf. 21. UN Security Council: Open Debate: Threats to International Peace and Security caused by Terrorist Acts. 2016. 12 Dec. URL: https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and- speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist- acts-3/. 22. United nations. Peace and Security. URL: http://www.un.org/en/sections/issues-depth/peace-and- security/. 23. United Nations Security Council. URL: http://www.un.org/en/sc/. 24. International Relations and Security Network (ISN). ETH Zurich. URL: http://www.css.ethz.ch/en/services/css-partners/partner.html/13306. 25. Center for Security Studies. URL: http://www.css.ethz.ch/en/services.html. 26. International Security Forum. URL: https://en.wikipedia.org/wiki/International_Security_Forum. 27. The Impact of New Technologies on Peace, Security and Development, Discussion Paper, Independ- ent Commission on Multilateralism (ICM) and International Peace Institute (IPM). 2016. URL: https://www.icm2016.org/IMG/pdf/new_tech_paper.pdf. 28. International Security Networks, ISN. URL: http://www.isnsecurity.com/home/. 29. Sapaty P. A Distributed Processing System: European Patent. № 0389655; Publ. 10.11.93; European Patent Office, Munich, 1993. 30. Sapaty P. Mobile Processing in Distributed and Open Environments. New York: John Wiley & Sons, 1999. 410 p. 31. Sapaty P. Ruling Distributed Dynamic Worlds. New York: John Wiley & Sons, 2005. 255 p. 32. Sapaty P. Managing Distributed Dynamic Systems with Spatial Grasp Technology. Berlin: Springer, 2017. 284 p. 33. Sapaty P. Holistic Analysis and Management of Distributed Social Systems. Berlin: Springer, 2018 (in print). 234 p. 34. Sapaty P. Distributed Technology for Global Control. Book chapter. Lecture Notes in Electrical Engi- neering. 2009. Vol. 37, Part 1. P. 3–24. DOI: 10.1007/978-3-642-00271-7_1. 35. Sapaty P. Meeting the World Challenges with Advanced System Organizations. Informatics in Control Automation and Robotics. Lecture Notes in Electrical Engineering. 2011. Vol. 85, 1st Ed. P. 29–46. 36. Sapaty P.S. Withstanding Asymmetric Situations and Threats in Distributed Dynamic Worlds. Journal of Mathematical Machines and Systems. 2012. N 1. P. 3–12. 37. Sapaty P.S. Global Electronic Dominance. 12th International Fighter Symposium. Grand Connaught Rooms, London, UK. 2012. 6–8 November. 45 p. 38. Sapaty P. Providing Global Awareness in Distributed Dynamic Environments. International summit ISR. London, 2013. 16–18 April. 52 p. 39. Sapaty P.S., The World as Distributed Brain with Spatial Grasp Paradigm. Chen L., Kapoor S., Bhatia R. (eds.) Intelligent Systems for Science and Information. Studies in Computational Intelligence. Springer, Cham, 2014. Vol. 542. P. 65–85. 40. Sapaty P. Distributed Human Terrain Operations for Solving National and International Problems. In- ternational Relations and Diplomacy. 2014. Vol. 2, N 9. P. 597–622. 41. Sapaty P., Sugisaka M., Finkelstein R., Delgado-Frias J., Mirenkov N. Emergent Societies: An Ad- vanced IT Support of Crisis Relief Missions. Proc. Eleventh International Symposium on Artificial Life and Robotics (AROB 11th’06). Beppu, Japan, 2006. 23–26 Jan. 15 p. 42. Sapaty P., Sugisaka M. Countering Asymmetric Situations with Distributed Artificial Life and Robot- ics Approach. Proc. Fifteenth International Symposium on Artificial Life and Robotics (AROB 15th’10). B-Con Plaza, Beppu, Oita, Japan, 2010. 5–7 Feb. 4 p. https://theconversation.com/five-biggest-security-threats-facing-the-world-in-2016-52456 https://www.cisecurity.org/cybersecurity-threats/ https://en.wikipedia.org/wiki/Terrorism https://www.coleurope.eu/sites/default/files/uploads/page/collegium_47_v7.pdf http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/ https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/ https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/ http://www.un.org/en/sections/issues-depth/peace-and-security/ http://www.un.org/en/sections/issues-depth/peace-and-security/ http://www.un.org/en/sc/ http://www.css.ethz.ch/en/services/css-partners/partner.html/13306 http://www.css.ethz.ch/en/services.html https://en.wikipedia.org/wiki/International_Security_Forum https://www.icm2016.org/IMG/pdf/new_tech_paper.pdf http://www.isnsecurity.com/home/ ISSN 1028-9763. Математичні машини і системи, 2018, № 4 25 43. Sapaty P.S., Corbin M.J., Borst P.M. Towards the development of large-scale distributed simulations. Proc. 12th Workshop on Standards for the Interoperability of Distributed Simulations, IST UCF. Orlando, FL, 1995. March. P. 199–212. 44. Sapaty P., Corbin M.J., Seidensticker S. Mobile Intelligence in Distributed Simulations. Proc. 14th Workshop on Standards for the Interoperability of Distributed Simulations, IST UCF. Orlando, FL, 1995. March. 10 p. 45. Sapaty P.S., Borst P.M., Corbin M.J., Darling J. Towards the intelligent infrastructures for distributed federations. Proc. 13th Workshop on Standards for the Interoperability of Distributed Simulations. IST UCF: Orlando, 1995. Sept. P. 351–366. 46. Sapaty P.S. A New Technology for Integration, Simulation, and Testing of Distributed Dynamic Sys- tems, NATO. Proc. Integration of Simulation with System Testing. RTO-MP-083. AC/323(SCI-083) TP/43. 2002. June. 12 p. Стаття надійшла до редакції 28.09.2018
id nasplib_isofts_kiev_ua-123456789-150664
institution Digital Library of Periodicals of National Academy of Sciences of Ukraine
issn 1028-9763
language English
last_indexed 2025-12-07T15:24:17Z
publishDate 2018
publisher Інститут проблем математичних машин і систем НАН України
record_format dspace
spelling Sapaty, P.S
2019-04-12T18:30:21Z
2019-04-12T18:30:21Z
2018
Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ.
1028-9763
https://nasplib.isofts.kiev.ua/handle/123456789/150664
623.764
The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching of distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns expressed in a special high-level recursive language.
Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й керування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій, що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просторових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціальною рекурсивною мовою високого рівня.
Цель этой статьи – представить новый высокоуровневый подход к распределенной обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагаемая модель и технология основаны на пространственном покрытии распределенных динамических систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся пространственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня.
Special thanks to: Springer International Publishing for the lasting support of the author’s ideas and publication of book chapters and recent books, and personally Thomas Ditzinger for sharing admiration of gestalt psychology and theory born in Germany, which influenced holistic orienta-tion of the current work; Takao Ito, Hiroshima University, Japan, whose recent visit to the Na-tional Academy of Sciences and discussions on management of large social and industrial sys-tems with links to international relations and security were productive; Masanori Sugisaka, ALife Robotics Japan, for long and fruitful cooperation in the robotics area and common publications on crises management cited in the paper; Bob Nugent, retired US Navy Commander, currently with Virginia Tech, for meetings and discussions on advanced command and control which ap-peared useful for the world security solutions considered in this paper.
en
Інститут проблем математичних машин і систем НАН України
Математичні машини і системи
Обчислювальні системи
Holistic Spatial Management of International Security
Цілісне просторове управління міжнародною безпекою
Целостное пространственное управление международной безопасностью
Article
published earlier
spellingShingle Holistic Spatial Management of International Security
Sapaty, P.S
Обчислювальні системи
title Holistic Spatial Management of International Security
title_alt Цілісне просторове управління міжнародною безпекою
Целостное пространственное управление международной безопасностью
title_full Holistic Spatial Management of International Security
title_fullStr Holistic Spatial Management of International Security
title_full_unstemmed Holistic Spatial Management of International Security
title_short Holistic Spatial Management of International Security
title_sort holistic spatial management of international security
topic Обчислювальні системи
topic_facet Обчислювальні системи
url https://nasplib.isofts.kiev.ua/handle/123456789/150664
work_keys_str_mv AT sapatyps holisticspatialmanagementofinternationalsecurity
AT sapatyps cílísneprostoroveupravlínnâmížnarodnoûbezpekoû
AT sapatyps celostnoeprostranstvennoeupravleniemeždunarodnoibezopasnostʹû