Holistic Spatial Management of International Security
The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching...
Saved in:
| Published in: | Математичні машини і системи |
|---|---|
| Date: | 2018 |
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
Інститут проблем математичних машин і систем НАН України
2018
|
| Subjects: | |
| Online Access: | https://nasplib.isofts.kiev.ua/handle/123456789/150664 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
| Cite this: | Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ. |
Institution
Digital Library of Periodicals of National Academy of Sciences of Ukraine| _version_ | 1859818824349515776 |
|---|---|
| author | Sapaty, P.S |
| author_facet | Sapaty, P.S |
| citation_txt | Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ. |
| collection | DSpace DC |
| container_title | Математичні машини і системи |
| description | The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching of distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns expressed in a special high-level recursive language.
Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й керування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій, що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просторових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціальною рекурсивною мовою високого рівня.
Цель этой статьи – представить новый высокоуровневый подход к распределенной обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагаемая модель и технология основаны на пространственном покрытии распределенных динамических систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся пространственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня.
|
| first_indexed | 2025-12-07T15:24:17Z |
| format | Article |
| fulltext |
© Sapaty P.S., 2018 11
ISSN 1028-9763. Математичні машини і системи, 2018, № 4
ОБЧИСЛЮВАЛЬНІ СИСТЕМИ
UDC 623.764
P.S. SAPATY
*
HOLISTIC SPATIAL MANAGEMENT OF INTERNATIONAL SECURITY
*
Institute of Mathematical Machines and Systems National Academy of Sciences of Ukraine, Kyiv, Ukraine
Анотація. Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й ке-
рування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій,
що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія
базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просто-
рових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціа-
льною рекурсивною мовою високого рівня. Було виявлено, що описаний підхід, макетований і випро-
буваний у різних країнах у численному цивільному і військовому застосуванні, може також бути
ефективним для розв’язання проблем міжнародної та глобальної безпеки, які охоплюють великі
території. Грунтуючись на вільному переміщенні та розповсюдженні коду рекурсивних сценаріїв у
розподіленому просторі з імплантованими та взаємодіючими інтерпретаторами базової мови (які
можуть нараховувати до мільйонів та мільярдів вузлів і працювати спільно без будь-яких центра-
льних ресурсів), цей підхід не має потенційних обмежень для вирішення як локальних, так і глоба-
льних системних проблем. Основи технології можуть бути реалізовані за короткий проміжок ча-
су невеликою групою системних програмістів навіть у традиційному університетському середо-
вищі, що вже відбувалось для її попередніх версій у різних країнах. Цей підхід також має соціальну
цінність, що привело до створення нової книги по цілісному просторовому управлінню великими
соціальними системами, яка цитується у даній статті. На сьогоднішній момент технологія розг-
лядається як унікальна, особливо із врахуванням її холістських та гештальт-інспірованих рішень,
які дозволяють охоплювати та опрацьовувати просторові середовища набагато швидше, компа-
ктніше і простіше, ніж в інших моделях і мовах, оскільки більшість традиційних та трудоміст-
ких системних рутин стають притаманними внутрішній автоматичній інтелектуальній та ме-
режевій інтерпретації мови високого рівня.
Ключові слова: Організація Об'єднаних Націй, міжнародна безпека, зони світового конфлікту,
технологія просторового захоплення.
Аннотация. Цель этой статьи – представить новый высокоуровневый подход к распределенной
обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и
кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагае-
мая модель и технология основаны на пространственном покрытии распределенных динамических
систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся про-
странственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня. Было
обнаружено, что описанный подход, ранее макетированный и испытанный в разных странах в
многочисленном гражданском и военном применении, может быть также эффективен для реше-
ния проблем международной и глобальной безопасности, охватывающих большие территории.
Основываясь на свободном перемещении и распространении кода рекурсивных сценариев в распре-
деленных пространствах со встроенными взаимодействующими интерпретаторами базового
языка (которые могут насчитывать до миллионов и миллиардов узлов и работать совместно без
каких-либо центральных ресурсов), этот подход не имеет потенциальных ограничений для реше-
ния как локальных, так и глобальных системных проблем. Основы технологии могут быть реали-
зованы за короткое время небольшой группой системных программистов даже в традиционных
университетских условиях, как это уже осуществлялось для ее предыдущих версий в разных стра-
нах. Этот подход также имеет социальную значимость, что привело к созданию новой книги по
целостному пространственному управлению крупными социальными системами, цитируемой в
данной статье. На сегодняшний момент технология является уникальной, особенно с учетом ее
холистских и гештальт-инспирируемых решений, охватывающих и обрабатывающих простран-
12 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
ственные среды намного компактнее и проще, чем в других моделях и языках, поскольку большин-
ство традиционных и трудоемких системных рутин становятся присущими внутренней интел-
лектуальной сетевой и автоматической интерпретации языка высокого уровня.
Ключевые слова: Организация Объединенных Наций, международная безопасность, зоны мирово-
го конфликта, технология пространственного захвата.
Absrtact. The purpose of this paper is to introduce a novel high-level distributed processing and control
approach capable of finding runtime solutions for irregular, crises, and security problems emerging any
time and in any points of the world. The offered model and technology are based on spatial matching of
distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns ex-
pressed in a special high-level recursive language. It has been found that the described approach, previ-
ously prototyped and tested in different countries on numerous civil and defence applications, may be es-
pecially effective for solving crises and security problems covering large territories. Based on free move-
ment of recursive scenario code in distributed spaces with implanted communicating interpreters of the
scenario language (with may account up to millions to billions of nodes and work without any central re-
sources), the approach has no limitations for solving local and global system problems. The technology
basics can be implemented in a short time and by a small group of system programmers even within tradi-
tional university environments, as was done for its previous versions in different countries. The approach
also has high social implications and value which resulted in the new book on holistic spatial management
of large social systems, cited in the current paper. The technology is unique so far, with its holistic and
gestalt-inspired solutions grasping spatial environments directly being much shorter and simpler than
under other models and languages, as most of traditional and boring system routines are hidden inside
intelligent, networked, and automatic language interpretation.
Keywords: United Nations, international security, world conflict areas, Spatial Grasp Technology.
1. Introduction
International security, also called global security, refers to the amalgamation of measures taken
by states and international organizations to ensure mutual survival and safety [1]. These measures
may include military actions and diplomatic agreements such as treaties and conventions. Securi-
ty policy is more than defence policy, more than military policy, more than a policy aimed at be-
ing prepared for war; security policy is also aimed at avoiding war [2]. Security policy embraces
domestic security, economic development policy, and policy for influencing the international sys-
tem so as to create a peaceful environment, regionally as well as globally. The world is entering
its most dangerous chapter in decades [3], where the sharp uptick in war over recent years is out-
stripping the ability to cope with consequences. From global refugee crisis to the spread of ter-
rorism, the collective failure to resolve conflict is giving birth to new threats and emergencies.
Even in peaceful societies, the politics of fear is leading to dangerous polarization.
Conflicts are often spreading from local no nonlocal to international to global, covering
large distributed spaces, and it is becoming more and more difficult to prevent, control, and stop
them by traditional centralized agencies and resources, also existing measures and technologies.
Something in a much broader and more powerful scale is needed for maintaining national, inter-
national and global security, which could operate holistically, globally, and spatially. And this is
the aim and main contents of the current publication.
The rest of this paper is organized as follows. Section 2 provides examples and discusses
security issues in concrete areas including disease epidemics, world religious diversity with po-
tential tensions, environmental dangers, refugee crises, armed conflicts, terrorism, etc. Section 3
briefs some existing international security bodies and measures like United Nations, Security
Networks, and security oriented technologies. Section 4 describes basics of the developed Spatial
Grasp Technology, SGT, with its self-evolving spatial patterns, Spatial Grasp Language, SGL,
and its networked interpreter. Section 5 provides security-oriented application examples written
in SGL, like finding suspects worldwide, controlling and impacting the spread of a conflict, and
distributed simulation of territorial conquest by competing forces. Section 6 concludes the paper
https://en.wikipedia.org/wiki/State_(polity)
https://en.wikipedia.org/wiki/International_organization
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 13
Figure 1 – Ebola outbreak in Africa with air traffic
connections to the rest of the world
Figure 2 – World colour-coded map denoting different religious
affiliations
while providing hints for a quick technology implementation, and the References include infor-
mation on the cited review sources and previous technology publications and applications.
2. Security Issues in Concrete Areas
Below are brief excurses into the world areas with potential dangers to international security, all
such dangers having massive, spatial, and distributed nature, and requiring quick and global reac-
tion on them.
2.1. Epidemics
The 2014 West African Ebola Outbreak
[4] was one of the largest and deadliest
recorded in history. The affected coun-
tries, Sierra Leone, Guinea, Liberia, and
Nigeria, had been struggling to contain
and mitigate the outbreak. The ongoing
rise in confirmed and suspected cases,
2615 as of August 2014, was considered
to increase the risk of international dis-
semination, especially because the epi-
demic was affecting cities with major
commercial airports, see Fig. 1. For his-
torical reasons, all these countries had
strong ties with European countries. Nige-
ria, being the most populous country in West Africa with more than 166 million people, was es-
pecially connected to the rest of the world.
2.2. World Religious Diversity
Influence of different religions on the world security should not be underestimated [5]. Historical-
ly, religious war [6] or holy war was a war primarily caused or justified by differences in religion.
In the modern period, debates are common over the extent to which religious, economic, or ethnic
aspects of a conflict predominate in a given war. The nature of the religious dimension of interna-
tional conflict, which is sometimes neglected, is often misunderstood, and frequently exaggerated.
No major religion has been exempt from complicity in violent conflict, but religion is often not
the sole or even primary cause of conflict. With so much emphasis on religion as a source of con-
flict, the role of religion as a force in peacemaking is usually overlooked. In Fig. 2, the main
world religious affiliations [7] are shown in different colours (as of 2011) without further details,
just to highlight the existing religious diversity worldwide.
14 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
2.3. Environmental Dangers
Environmental security [8] considers the abilities of individuals, communities or nations to cope
with environmental risks, conflicts or limited natural resources. For example, climate change can
be viewed a threat to environmental security. Human activity impacts CO2 emissions, influencing
regional and global climatic and environmental changes and thus agricultural output. This can
lead to food shortages causing political debate, ethnic tension, and civil unrest. For example, pro-
tecting the world’s freshwater resources [9] requires diagnosing threats over a broad scale, from
global to local. It has been found that nearly 80% of the world’s population is exposed to high
levels of threat to water security, as shown in Fig. 3 in colours (from blue as lower to red as high-
er). Massive investment in water technology enables rich nations to offset high stressor levels
without remedying their underlying causes, whereas less wealthy nations remain vulnerable.
Figure 3 – World map expressing global threats to human water security
2.4. Refugees Crises
Refugee crises [10–12] for the last years have essential impact on international security. A refu-
gee is a displaced person who has been forced to cross national boundaries and cannot return
home safely. Such a person may be called an asylum seeker until officially granted refugee status
if they formally make a claim for asylum. By the end of 2016, 65,6 million individuals were for-
cibly displaced worldwide as a result of persecution, conflict, violence, or human rights violations.
In 2017, the total number of forcibly displaced persons was 68,5 million. From them, official to-
tal refugee population number was 25.4 million. An example of world map of refugees for June
2015 is shown in Fig. 4, with darker colours indicating higher refugee levels [12] (sources: UN-
HCR, Migration Policy Institute, Refugees International, press reports).
Figure 4 – Example of 2015 world map of refugees
https://en.wikipedia.org/wiki/Environmental_hazard
https://en.wikipedia.org/wiki/Natural_Resources
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 15
2.5. Armed Conflicts
The main situations of armed violence (in 2017) have been described and discussed in [13] that
amounted to armed conflicts in accordance with definitions under International Humanitarian
Law (IHL) and International Criminal Law (ICL). In any event, the existence of an armed con-
flict was generally limited to the areas where the parties to the conflict were conducting hostilities
against each other, although armed conflicts may potentially evolve into global ones. The most
terrible could be nuclear war [14] theoretically involving most or all nuclear powers releasing a
large proportion of their nuclear weapons. Fig. 5 depicts schemes copied from [15] and related to
six hypothetical escalation scenarios which may be spiralling to the world’s nuclear war. These
pictures (of 2007, already outdated politically and semantically) are used here only to show the
possible spatial world dynamics under such or similar conflicts and which may serve as a hypo-
thetical testbed for the crisis management technology discussed in this paper.
Figure 5 –Six hypothetic escalation nuclear scenarios
2.6. Other Areas
Many other areas can be named containing potential threats to international security [16–21], and
especially terrorism [18], which in the broadest sense is the use of intentionally indiscriminate
violence as a means to create terror among masses of people or the fear to achieve financial, po-
litical, religious or ideological aim. The global terrorism index for 2016 can be found in [20].
3. International Security Bodies and Measures
There are many such bodies and measures worldwide, due to highest importance of national and
international security issues, with few of them mentioned in this section.
3.1. United Nations
Saving succeeding generations from the scourge of war was the main motivation for creating the
United Nations, UN [22]. Since its creation, the UN has often been called upon to prevent dis-
putes from escalating into war, or to help restore peace when armed conflict does break out, and
to promote lasting peace in societies emerging from wars. UN Security Council [23] is the organ
with primary responsibility for the maintenance of international peace and security. When a com-
plaint concerning a threat to peace is brought before it, the Council's first action is usually to rec-
ommend to the parties to try to reach agreement by peaceful means. In some cases, the Council
itself undertakes investigation and mediation. It may appoint special representatives or request
the Secretary-General to do so or to use his good offices. It may set forth principles for a peaceful
settlement.
16 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
3.2. Security Network (ISN)
The International Relations and Security Network (ISN) [24] was an open access information
service located at ETH Zurich. Its mission was to facilitate international relations (IR) and securi-
ty-related dialogue and cooperation within a network of organizations, professionals and students,
and to provide open-source research tools and materials in accessible ways. ISN collated and
shared IR and security-centered content from numerous partners throughout the world and main-
tained a freely accessible multimedia library that provided tens of thousands of IR and security-
related materials. In 2016, the ISN was fully integrated into its parent organization, the Center for
Security Studies, CSS [25]. The ISN was also a co-organizer of the Swiss-sponsored International
Security Forum (ISF), which is a large conference held every two years in Geneva and Zurich on
a rotating basis [26].
3.3. New Technologies
The impact of new technologies on peace, security, and development is crucial [27]. It has been
argued that we are now in the fourth industrial revolution, where a fusion of technologies is blur-
ring lines between the physical, digital, and biological spheres. The new technologies include
everything from the Internet to drones to big data, and the potential applications of these technol-
ogies are rapidly expanding. In the 2020, 60% of individuals are expected to be actively using the
Internet. Many organizations are developing security-oriented technologies like, for example, In-
ternational Security Networks [28], which is a leading manufacturer of complete security solu-
tions, providing the leading software suite for gated communities.
4. Spatial Grasp Technology, SGT
We are briefing here the developed and patented high-level networking control and processing
technology [29–46] tested and prototyped in different countries, which may be suitable for
runtime dealing with urgent international crises and security problems. It can potentially start in
any world points and cover the whole universe with efficient spatial solutions.
4.1. Self-evolving Spatial Patterns
Within SGT, a high-level scenario for any task to be performed in a distributed world is repre-
sented as an active self-evolving pattern rather than traditional program, sequential or parallel.
This pattern, written in a high-level Spatial Grasp Language (SGL) and expressing top semantics
of the problem to be solved, can start from any world point. It then spatially propagates, repli-
cates, modifies, and matches the distributed world, as shown in Fig. 6.
Figure 6 – Spatial pattern growth & coverage & matching
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 17
Figure 7 – Creating distributed knowledge
infrastructures
The self-spreading & matching pat-
terns can create knowledge infrastructures
arbitrarily distributed between system com-
ponents (humans, robots, sensors, other sys-
tems, etc.) as in Fig. 7, where communi-
cating SGL interpreters are shown as univer-
sal control modules U. These infrastructures,
which may be left active, can effectively
support or express distributed databases,
command and control, situation awareness,
autonomous decisions, as well as any other
existing or hypothetical computational and
control models.
4.2. Spatial Grasp Language, SGL
SGL allows us to directly move through, observe, and provide any actions and decisions in fully
distributed environments (whether physical, virtual, executive, or combined). It has universal re-
cursive structure, shown in Fig. 8, capable of representing any parallel and distributed algorithms
operating on, over, or in spatially scattered data or other distributed systems.
Figure 8 – SGL recursive syntax
An SGL scenario develops as parallel transition between sets of progress points (or
props), with self-modified and self-replicating scenario code freely moving in distributed spaces.
Starting from a prop, an action may result in new props (which may be multiple). Each prop has a
resulting value, which may be arbitrarily complex, and resulting state (one of: thru, done, fail, and
abort). Different actions may evolve independently or interdependently from the same prop, split-
ting and parallelizing in space. Actions may also spatially succeed each other, with new ones ap-
plied sequentially or in parallel from the props reached by previous actions.
Elementary operations can directly use states and values of props reached by other actions
whatever complex and remote they might be. Any prop can associate with a position in physical,
virtual, executive or combined world. Staying with world points, it is possible to directly access
and impact local world parameters in them. Overall organization and control of the breadth and
depth space navigation and coverage is provided by SGL rules, which may be nested. These
rules, for example, can be as follows.
• Elementary arithmetic, string, or logic operation.
18 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
• Hop in a physical, virtual, execution, or combined space.
• Hierarchical fusion and return of (remote) data.
• Distributed control, both sequential and parallel.
• A variety of special contexts for navigation in space, influencing embraced operations
and decisions.
• Type or sense of a value or its chosen usage, guiding automatic interpretation.
• Creation or removal of nodes and links in distributed knowledge networks.
• A rule can be a compound one, integrating other rules; it can also be defined as a result
of operations of arbitrary complexity.
Working in fully distributed physical, virtual or executive environments, SGL has differ-
ent types of variables, called spatial, effectively serving multiple cooperative processes:
• Heritable variables – starting in a prop and serving all subsequent props which can share
them in both read & write operations.
• Frontal variables – transferred on wavefronts between consecutive props and replicated
if multiple new props emerge.
• Environmental variables – accessing different elements of physical and virtual words
when navigating them, also certain parameters of SGL interpreter.
• Nodal variables – a temporary property of world nodes, accessed and shared by all activ-
ities associated with these nodes.
These types of variables, especially when used together, allow us to create flexible and
robust spatial algorithms working in between components of distributed systems rather than in
them. Such algorithms can replicate, spread and migrate in distributed environments (partially or
as a whole), always preserving global integrity and control. To simplify SGL programs, some
traditional abbreviations of operations and delimiters can be used too, as substituting certain
rules, but altogether always remaining within the general syntactic structure shown in Fig. 8.
4.3. SGL Networked Interpreter
The SGL interpreter consists of a number of specialized modules handling and sharing specific
data structures, as in Fig. 9.
Figure 9 – SGL interpreter organization and main components
The interpreters can communicate with each other, and their distributed network can be
mobile and open, changing the number of nodes and communication structure at runtime.
The backbone and nerve system of the distributed interpreter is its dynamic spatial track
system with its parts kept in the Track Forest memory of local interpreters. These are logically
interlinked with similar parts in other interpreter copies, providing altogether global control cov-
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 19
Figure 10 – SGL interpretation network as a universal
spatial machine
erage. The distributed track structure enables for hierarchical and horizontal control, also remote
data and code access, with high integrity of emerging parallel and distributed solutions achieved
without any centralized resources.
Dynamically created track forests spanning the systems in which SGL scenarios evolve
are also used for supporting spatial variables and echoing & merging control states and remote
data, while self-optimizing in parallel echo processes. They also route further grasps to the posi-
tions in physical, virtual, executive or combined spaces reached by the previous grasps, uniting
them with frontal variables left there by preceding grasps.
The distributed SGL interpreter
may have any number of communi-
cating nodes, up to thousands to mil-
lions to billions, effectively converting
the whole world into a universal spa-
tial machine operating under spread-
ing intelligent scenarios. Any number
of such scenarios can operate simulta-
neously (cooperatively or competitive-
ly) while starting at any time and from
same or different world points, see
Fig. 10.
Being very compact (by the
gained experience of implementation on different platforms) the U copies may be integrated with
(or implanted into) any existing systems, popular media and email including. They can also be
concealed if to operate in hostile environments, allowing the latter to be analyzed and impacted in
a stealth manner.
In the next section, we will be showing fully distributed and parallel solutions in SGL for
exemplary problems that may relate to international security, showing their compactness and ca-
pability of effectively working in a global, worldwide scale.
5. SGL Application Examples
For the following scenarios, we will be first providing their natural language descriptions with
key words marked in bold, and then showing formal versions in SGL where the same words are
identifying corresponding operations or parameters in their bodies, thus showing the transition
from informal to formal descriptions, with the latter capable of direct execution by the technology
offered.
5.1. Finding Suspects Worldwide
Imagine we have to find detailed information about individuals belonging to some Group inden-
tified by specific group’s features, with the group historically originating in START position
represented by certain physical or virtual address. When staying in this position, the group mem-
bers can be found by a match of the group’s features with local_databases. The latter may, how-
ever, fail to have records on some or all individuals sought, but their traces may exist in lo-
cal_security systems checking, for example, movement of passengers at air and sea ports or on
roads, etc. If such traces exist and lead to other world locations, it will be reasonable to search
both data and security records at the other points too, and so on. This combined database & secu-
rity checking may, in principle, spread and cover the whole world, and in parallel. The found
concrete match in different world points can be collected with its return (along with exact
whereabouts of individuals) to the START point with output there.
20 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
Figure 12 – Spatial coverage and impact of the evolving
distributed processes
This scenario can be directly expressed in SGL in a compact manner, as follows, with its
possible spatial evolution shown in Fig. 11.
hop_first(START);
nodal(Other);
frontal(Group) = features;
output(‘Records found worldwide:’ &&
repeat(return(match(Group, local_databases)),
Other = traces(Group, local_security);
hop_first(Other)))
Figure 11 – Spatial worldwide search for individuals with the return of data found
Answer in the START point may be as follows:
Records found worldwide: match_1, match_2, …, match_m
5.2. Controlling and Impacting the Spread of Conflict
Imagine there is evolving and spreading phenomenon in some region (like, for example, ethnic or
military conflict). And we want, beginning from some node START determined as being inside
this conflict, to spread our search through the conflict area, via neighbors of the reached nodes,
and in parallel, with trying in each new node where its STATE returns active to impact (like ex-
tinguish, or quench) the conflict there. After reaching boundary of the activity zone, we may de-
cide to continue spreading further with
trying to prevent the conflict appear-
ance in new nodes if their STATE still
indicates as prone to the conflict. After
reaching boundary of conflict prone
zone, we may want to collect and bring
back coordinates, or WHERE, of all
nodes lying on this boundary and out-
put them as indication of the beginning
of totally safe area. All this can be ex-
pressed in SGL in a compact form as
follows (see also Fig. 12), where opera-
tion hop_first allows for reaching new
nodes only once, thus preventing possi-
ble cycling.
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 21
hop_first(START);
output(‘Conflict prone boundary:’ &&
repeat(or_sequence((STATE == active; impact(quench)),
(STATE == prone; impact(prevent)),
done(WHERE));
hop_first(neighbors)))
The answer in the START node may be as follows:
Conflict prone boundary: x1_y1, x2_y2, x3_y3, …, xm_ym
For a simplified variant of this scenario, like only spreading throughout the active conflict
zone with doing nothing at nodes reached but providing output of the coordinates of nodes on the
zone’s boundary, we may write:
hop_first(START);
output(‘Active conflict boundary:’ &&
(repeat(STATE == active; hop_first(neighbors));
WHERE))
The answer in START this time will be as:
Active conflict boundary: x1_y1, x2_y2, x3_y3, …, xn_yn
Another variant of this scenario by which coordinates of all nodes reached inside the ac-
tive conflict area are to be collected, returned, and output, may look like follows:
hop_first(START);
output(‘All active conflict nodes:’ &&
repeat(STATE == active; free(WHERE),
hop_first(neighbors)))
The answer in START position now will be as:
All active conflict points: x1_y1, x2_y2, x3_y3, …, xk_yk
The scenarios presented above may also relate to other types of evolving phenomena, like
spreading of diseases, where inside the active zone we may use strong, say, virus killing drugs
and outside it, within the disease prone zone, prophylactic ones. Other similar scenarios may be
used for forest fires, flooding, famine, etc.
5.3. Distributed Simulation of Territorial Conquest
Imagine we have different opposing forces, let them be three, and which have individual
strengths identified by data1, data2, data3, which are starting, correspondingly, in positions
START1, START2, and START3. Each Force tries to conquer and cover the whole Area de-
fined by coordinate limits while competing with other forces on the same territory. The resultant
space coverage by particular force can depend on combination of the force’s strength, QUALI-
TIES of this point of the region, which may include ethnicity and acceptance of this Force by
local population, also take into account its previous occupation which may be by a different
Force (kept in its CONTENT). The changing from one particular occupation force to another
may not be acceptable by locals, and the fixed Level from the previous occupation should be tak-
en into account too. So Real power needed to occupy this point by the current Force may differ
from the individual strength of this force. As a result, we may have a complex occupation map of
the Area similar to the one shown in Fig. 13 (a bit similar, say, to what we may see now in Syria),
22 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
with corresponding SGL scenario code provided below. The previous versions of the technology
were efficiently used for similar tasks to this one, like distributed interactive simulations of large
military systems [43–46].
Figure 13 – Spatial simulation of the territory coverage by conflicting forces
frontal(Force, Area = limits);
nodal(Real, Level);
branch((hop(START1); Force = data1),
(hop(START2); Force = data2),
(hop(START3); Force = data3));
repeat(Real = power(Force, CONTENT, QUALITIES);
Real > Level; Level = Real; CONTENT = Force;
hop(neighbours, Area))
To list coordinates of all nodes, say, marked with Force1, we may write:
output(‘Force1:’ && (hop_nodes(Area); CONTENT == data1; WHERE))
The answer in this scenario starting position (which can be any one, including outside the
system) may be as follows:
Force1: x1_y1, x2_y2, x3_y3, …, xn_yn
Any other scenarios for solving nonlocal to global conflict problems by the world cover-
age with self-spreading, self-matching, and self-replicating high-level SGL code can be readily
offered too. No centralized resources are needed for such solutions at all, and moreover, no copy-
ing of the huge and distributed information before its analysis either, with spatial solutions found
directly where multiple data pieces and their relations reside.
6. Conclusion
The offered approach can believably make useful contribution to the international and global se-
curity, allowing complex problems to be solved in distributed environments without vulnerable
centralized resources, while operating in a flexible spatial matching, flooding, or even virus-like
mode. The technology can be incorporated within UN or other international bodies as a special
global security technique for predicting, preventing, avoiding, and analyzing local and global cri-
ses in real time and often even ahead of it. The main difference of the ideology and technology
offered is that it directly operates on surfaces of large distributed worlds expressing (grasping)
only top semantics and key decisions of the problems to be solved while hiding most of tradition-
al system organizational routines (up to 99 percent) inside intelligent and automatic language im-
plementation. This allows us to have highly compact, holistic, gestalt-like solutions that can be
created on the fly when timely reacting on rapidly changing and asymmetric situations.
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 23
SGL has very simple recursive syntax of its core subset, which can be easily implemented
in a short time and even within usual university environments, as was done before in different
countries for previous technology versions, with the author usually serving as team’s playing
coach, top scenario programmer, and supervisor of related MSc and PhD projects.
Implementation of SGL interpreters can also be done with their effective embedment into any
existing internet, popular media, robotic, and command and control systems. The full language
version can be readily implemented for extended applications too, with the author always ready
to help with this.
Acknowledgments
Special thanks to: Springer International Publishing for the lasting support of the author’s ideas
and publication of book chapters and recent books, and personally Thomas Ditzinger for sharing
admiration of gestalt psychology and theory born in Germany, which influenced holistic orienta-
tion of the current work; Takao Ito, Hiroshima University, Japan, whose recent visit to the Na-
tional Academy of Sciences and discussions on management of large social and industrial sys-
tems with links to international relations and security were productive; Masanori Sugisaka, ALife
Robotics Japan, for long and fruitful cooperation in the robotics area and common publications
on crises management cited in the paper; Bob Nugent, retired US Navy Commander, currently
with Virginia Tech, for meetings and discussions on advanced command and control which ap-
peared useful for the world security solutions considered in this paper.
REFERENCES
1. International security. URL: https://en.wikipedia.org/wiki/International_security.
2. Kristensen, Heurlin B. International Security. International Relations. UNESCO & EOLSS. 2009.
Vol. II. P. 17–20. URL: https://www.eolss.net/sample-chapters/C14/E1-35-04-02.pdf.
3. Guehenno J.-M. 10 Conflicts to Watch in 2017. FP Magazine. 2017. 5 Jan. URL:
https://foreignpolicy.com/2017/01/05/10-conflicts-to-watch-in-2017/.
4. Gomes M.F.C., Piontti A.P., Rossi L., Chao D., Longini I., Halloran M.E., Vespignani A. Assessing the
International Spreading Risk Associated with the 2014 West African Ebola Outbreak. PLOS Currents,
2014. 2 Sept. URL: http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk-
associated-with-the-2014-west-african-ebola-outbreak/.
5. Smock D. Religion in World Affairs, its Role in Conflict and Peace. Special Report 201. United States
Institute of Peace. 2008. Feb. URL: https://www.usip.org/sites/default/files/sr201.pdf.
6. Religious war. URL: https://en.wikipedia.org/wiki/Religious_war.
7. Major Religious Groups. URL: https://en.wikipedia.org/wiki/Major_religious_groups.
8. Environmental Security. URL: https://en.wikipedia.org/wiki/Environmental_security.
9. Vorosmarty C.J., McIntyre P.B., Gessner M.O., Dudgeon D., Prusevich A., Green P., Glidden S., Bunn
S.E., Sullivan C.A., Reidy C. Global threats to human water security and river biodiversity. Nature. 2010.
Vol. 467. P. 555–561. URL: http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/
fall/humanhealth/Vorosmarty%20et%20al%202010.pdf.
10. Refugee. URL: https://en.wikipedia.org/wiki/Refugee.
11. Global Trends. Forced Displacement in 2016. UNHCR. The UN Refugee Agency. 2016. URL:
http://www.unhcr.org/5943e8a34.pdf.
12. The world’s refugee crisis: past and present. URL: https://www.economist.com/graphic-
detail/2016/05/27/the-worlds-refugee-crisis-past-and-present.
13. Bellal A. The War Report. Armed Conflicts in 2017. The Geneva Academy of International Humani-
tarian Law and Human Rights. 2018. March. URL: https://www.geneva-academy.ch/joomlatools-
files/docman-files/The%20War%20Report%202017.pdf.
14. Moore C. Is World Nuclear War Inevitable? CAROLMOORE.NET. 2007. Nov. URL:
http://www.carolmoore.net/nuclearwar/index.html.
15. Moore C. Six Escalation Scenarios Spiralling to World Nuclear War. Is World Nuclear War Inevita-
ble? 2007. URL: http://www.carolmoore.net/nuclearwar/alternatescenarios.html.
https://en.wikipedia.org/wiki/International_security
https://www.eolss.net/sample-chapters/C14/E1-35-04-02.pdf
https://foreignpolicy.com/2017/01/05/10-conflicts-to-watch-in-2017/
http://currents.plos.org/outbreaks/author/marfcg/
http://currents.plos.org/outbreaks/author/anapastore/
http://currents.plos.org/outbreaks/author/luca-rossi-itgmail-com/
http://currents.plos.org/outbreaks/author/dchaofhcrc-org/
http://currents.plos.org/outbreaks/author/ilonginiufl-edu/
http://currents.plos.org/outbreaks/author/betzfhcrc-org/
http://currents.plos.org/outbreaks/author/alessandrovespignani/
http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk-associated-with-the-2014-west-african-ebola-outbreak/
http://currents.plos.org/outbreaks/article/assessing-the-international-spreading-risk-associated-with-the-2014-west-african-ebola-outbreak/
https://www.usip.org/sites/default/files/sr201.pdf
https://en.wikipedia.org/wiki/Religious_war
https://en.wikipedia.org/wiki/Major_religious_groups
https://en.wikipedia.org/wiki/Environmental_security
http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/%20fall/humanhealth/Vorosmarty%20et%20al%202010.pdf
http://www.zoology.ubc.ca/~sunday.member/bdg/pdfs_bdg/2013/%20fall/humanhealth/Vorosmarty%20et%20al%202010.pdf
https://en.wikipedia.org/wiki/Refugee
http://www.unhcr.org/5943e8a34.pdf
https://www.economist.com/graphic-detail/2016/05/27/the-worlds-refugee-crisis-past-and-present
https://www.economist.com/graphic-detail/2016/05/27/the-worlds-refugee-crisis-past-and-present
https://www.geneva-academy.ch/joomlatools-files/docman-files/The%20War%20Report%202017.pdf
https://www.geneva-academy.ch/joomlatools-files/docman-files/The%20War%20Report%202017.pdf
http://www.carolmoore.net/nuclearwar/index.html
http://www.carolmoore.net/nuclearwar/alternatescenarios.html
24 ISSN 1028-9763. Математичні машини і системи, 2018, № 4
16. Five biggest security threats facing the world in 2016. The conversation. URL:
https://theconversation.com/five-biggest-security-threats-facing-the-world-in-2016-52456.
17. Cybersecurity Threats. CIS, Center of International Security. 2018. URL:
https://www.cisecurity.org/cybersecurity-threats/.
18. Terrorism. URL: https://en.wikipedia.org/wiki/Terrorism.
19. Terrorism, Counter-Terrorism and International Humanitarian Law. 17th Bruges Colloquium. 2016.
20–21 October. URL: https://www.coleurope.eu/sites/default/files/uploads/page/collegium_47_v7.pdf.
20. Global Terrorism Index. The Institute for Economics and Peace (IEP). 2016. URL:
http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf.
21. UN Security Council: Open Debate: Threats to International Peace and Security caused by Terrorist
Acts. 2016. 12 Dec. URL: https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-
speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-
acts-3/.
22. United nations. Peace and Security. URL: http://www.un.org/en/sections/issues-depth/peace-and-
security/.
23. United Nations Security Council. URL: http://www.un.org/en/sc/.
24. International Relations and Security Network (ISN). ETH Zurich. URL:
http://www.css.ethz.ch/en/services/css-partners/partner.html/13306.
25. Center for Security Studies. URL: http://www.css.ethz.ch/en/services.html.
26. International Security Forum. URL: https://en.wikipedia.org/wiki/International_Security_Forum.
27. The Impact of New Technologies on Peace, Security and Development, Discussion Paper, Independ-
ent Commission on Multilateralism (ICM) and International Peace Institute (IPM). 2016. URL:
https://www.icm2016.org/IMG/pdf/new_tech_paper.pdf.
28. International Security Networks, ISN. URL: http://www.isnsecurity.com/home/.
29. Sapaty P. A Distributed Processing System: European Patent. № 0389655; Publ. 10.11.93; European
Patent Office, Munich, 1993.
30. Sapaty P. Mobile Processing in Distributed and Open Environments. New York: John Wiley & Sons,
1999. 410 p.
31. Sapaty P. Ruling Distributed Dynamic Worlds. New York: John Wiley & Sons, 2005. 255 p.
32. Sapaty P. Managing Distributed Dynamic Systems with Spatial Grasp Technology. Berlin: Springer,
2017. 284 p.
33. Sapaty P. Holistic Analysis and Management of Distributed Social Systems. Berlin: Springer, 2018 (in
print). 234 p.
34. Sapaty P. Distributed Technology for Global Control. Book chapter. Lecture Notes in Electrical Engi-
neering. 2009. Vol. 37, Part 1. P. 3–24. DOI: 10.1007/978-3-642-00271-7_1.
35. Sapaty P. Meeting the World Challenges with Advanced System Organizations. Informatics in Control
Automation and Robotics. Lecture Notes in Electrical Engineering. 2011. Vol. 85, 1st Ed. P. 29–46.
36. Sapaty P.S. Withstanding Asymmetric Situations and Threats in Distributed Dynamic Worlds. Journal
of Mathematical Machines and Systems. 2012. N 1. P. 3–12.
37. Sapaty P.S. Global Electronic Dominance. 12th International Fighter Symposium. Grand Connaught
Rooms, London, UK. 2012. 6–8 November. 45 p.
38. Sapaty P. Providing Global Awareness in Distributed Dynamic Environments. International summit
ISR. London, 2013. 16–18 April. 52 p.
39. Sapaty P.S., The World as Distributed Brain with Spatial Grasp Paradigm. Chen L., Kapoor S.,
Bhatia R. (eds.) Intelligent Systems for Science and Information. Studies in Computational Intelligence.
Springer, Cham, 2014. Vol. 542. P. 65–85.
40. Sapaty P. Distributed Human Terrain Operations for Solving National and International Problems. In-
ternational Relations and Diplomacy. 2014. Vol. 2, N 9. P. 597–622.
41. Sapaty P., Sugisaka M., Finkelstein R., Delgado-Frias J., Mirenkov N. Emergent Societies: An Ad-
vanced IT Support of Crisis Relief Missions. Proc. Eleventh International Symposium on Artificial Life
and Robotics (AROB 11th’06). Beppu, Japan, 2006. 23–26 Jan. 15 p.
42. Sapaty P., Sugisaka M. Countering Asymmetric Situations with Distributed Artificial Life and Robot-
ics Approach. Proc. Fifteenth International Symposium on Artificial Life and Robotics (AROB 15th’10).
B-Con Plaza, Beppu, Oita, Japan, 2010. 5–7 Feb. 4 p.
https://theconversation.com/five-biggest-security-threats-facing-the-world-in-2016-52456
https://www.cisecurity.org/cybersecurity-threats/
https://en.wikipedia.org/wiki/Terrorism
https://www.coleurope.eu/sites/default/files/uploads/page/collegium_47_v7.pdf
http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf
http://economicsandpeace.org/wp-content/uploads/2016/11/Global-Terrorism-Index-2016.2.pdf
https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/
https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/
https://www.mfat.govt.nz/en/media-and-resources/ministry-statements-and-speeches/un-security-council-open-debate-threats-to-international-peace-and-security-caused-by-terrorist-acts-3/
http://www.un.org/en/sections/issues-depth/peace-and-security/
http://www.un.org/en/sections/issues-depth/peace-and-security/
http://www.un.org/en/sc/
http://www.css.ethz.ch/en/services/css-partners/partner.html/13306
http://www.css.ethz.ch/en/services.html
https://en.wikipedia.org/wiki/International_Security_Forum
https://www.icm2016.org/IMG/pdf/new_tech_paper.pdf
http://www.isnsecurity.com/home/
ISSN 1028-9763. Математичні машини і системи, 2018, № 4 25
43. Sapaty P.S., Corbin M.J., Borst P.M. Towards the development of large-scale distributed simulations.
Proc. 12th Workshop on Standards for the Interoperability of Distributed Simulations, IST UCF. Orlando,
FL, 1995. March. P. 199–212.
44. Sapaty P., Corbin M.J., Seidensticker S. Mobile Intelligence in Distributed Simulations. Proc. 14th
Workshop on Standards for the Interoperability of Distributed Simulations, IST UCF. Orlando, FL, 1995.
March. 10 p.
45. Sapaty P.S., Borst P.M., Corbin M.J., Darling J. Towards the intelligent infrastructures for distributed
federations. Proc. 13th Workshop on Standards for the Interoperability of Distributed Simulations. IST
UCF: Orlando, 1995. Sept. P. 351–366.
46. Sapaty P.S. A New Technology for Integration, Simulation, and Testing of Distributed Dynamic Sys-
tems, NATO. Proc. Integration of Simulation with System Testing. RTO-MP-083. AC/323(SCI-083)
TP/43. 2002. June. 12 p.
Стаття надійшла до редакції 28.09.2018
|
| id | nasplib_isofts_kiev_ua-123456789-150664 |
| institution | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
| issn | 1028-9763 |
| language | English |
| last_indexed | 2025-12-07T15:24:17Z |
| publishDate | 2018 |
| publisher | Інститут проблем математичних машин і систем НАН України |
| record_format | dspace |
| spelling | Sapaty, P.S 2019-04-12T18:30:21Z 2019-04-12T18:30:21Z 2018 Holistic Spatial Management of International Security / P.S Sapaty // Математичні машини і системи. — 2018. — № 4. — С. 11–25. — Бібліогр.: 46 назв. — англ. 1028-9763 https://nasplib.isofts.kiev.ua/handle/123456789/150664 623.764 The purpose of this paper is to introduce a novel high-level distributed processing and control approach capable of finding runtime solutions for irregular, crises, and security problems emerging any time and in any points of the world. The offered model and technology are based on spatial matching of distributed dynamic systems by self-navigating, self-replications and self-modifying spatial patterns expressed in a special high-level recursive language. Мета цієї статті – подати новий високорівневий підхід до розподіленої обробки й керування, який дозволяє знаходити у реальному часі рішення для нерегулярних та кризових ситуацій, що можуть виникати у будь-який час та у різних точках світу. Запропоновані модель і технологія базуються на покритті розподілених динамічних систем за допомогою самонавігаційних просторових шаблонів, здатних до самостійного розмноження і самомодифікації, які задаються спеціальною рекурсивною мовою високого рівня. Цель этой статьи – представить новый высокоуровневый подход к распределенной обработке и управлению, позволяющий находить в реальном времени решения для нерегулярных и кризисных ситуаций, которые могут возникать в любое время и в любых точках мира. Предлагаемая модель и технология основаны на пространственном покрытии распределенных динамических систем посредством самонавигационных, саморазмножающихся и самомодифицирующихся пространственных шаблонов, выраженных на специальном рекурсивном языке высокого уровня. Special thanks to: Springer International Publishing for the lasting support of the author’s ideas and publication of book chapters and recent books, and personally Thomas Ditzinger for sharing admiration of gestalt psychology and theory born in Germany, which influenced holistic orienta-tion of the current work; Takao Ito, Hiroshima University, Japan, whose recent visit to the Na-tional Academy of Sciences and discussions on management of large social and industrial sys-tems with links to international relations and security were productive; Masanori Sugisaka, ALife Robotics Japan, for long and fruitful cooperation in the robotics area and common publications on crises management cited in the paper; Bob Nugent, retired US Navy Commander, currently with Virginia Tech, for meetings and discussions on advanced command and control which ap-peared useful for the world security solutions considered in this paper. en Інститут проблем математичних машин і систем НАН України Математичні машини і системи Обчислювальні системи Holistic Spatial Management of International Security Цілісне просторове управління міжнародною безпекою Целостное пространственное управление международной безопасностью Article published earlier |
| spellingShingle | Holistic Spatial Management of International Security Sapaty, P.S Обчислювальні системи |
| title | Holistic Spatial Management of International Security |
| title_alt | Цілісне просторове управління міжнародною безпекою Целостное пространственное управление международной безопасностью |
| title_full | Holistic Spatial Management of International Security |
| title_fullStr | Holistic Spatial Management of International Security |
| title_full_unstemmed | Holistic Spatial Management of International Security |
| title_short | Holistic Spatial Management of International Security |
| title_sort | holistic spatial management of international security |
| topic | Обчислювальні системи |
| topic_facet | Обчислювальні системи |
| url | https://nasplib.isofts.kiev.ua/handle/123456789/150664 |
| work_keys_str_mv | AT sapatyps holisticspatialmanagementofinternationalsecurity AT sapatyps cílísneprostoroveupravlínnâmížnarodnoûbezpekoû AT sapatyps celostnoeprostranstvennoeupravleniemeždunarodnoibezopasnostʹû |