Abstracts

[in alphabetical order of the family name of the presenting author]

  • Kiril Alexiev, Iva Nikolova, Methods for Data and Information Fusion
Correct decision making in the security sector mainly depends on information, received from multiple sources. Often, the information is insufficient, unreliable and contradictive. Multisensor data fusion systems seek to combine information from multiple sources and sensors in order to achieve inferences that cannot be achieved with a single sensor or source or in some sense better than single source information. This paper is an attempt to be done an analysis of the fusion theory literature in the last years. The main objective is to provide knowledge of the latest state-of-the art techniques for data and information fusion and to reveal the topics, the scientific society efforts are nowadays concentrated. But, the outcome of this analysis would be insufficient and scanty if it concerns only the past years. That is why the authors turn on a risky deal – to forecast the future research in this field. The authors outlined the most important and interesting topics of research in the next few years. The authors hope that the paper could inspire a discussion about the future of data and information fusion systems and their effective application.

  • Nikolaos Atreas, Costas Karanikas, A New Matching Algorithm Based on Prime Numbers
Let S be the set of all strings of length N written in an alphabet of p-letters. We define a transform on S based on prime numbers, by assigning each element of S to a unique positive rational number. We prove that the reconstruction process is given by the unique solution of a system of N linear Diophantine equations aix + biy  =  ci where ci is defined recursively. To avoid the quadratic time complexity for the execution of the algorithm we use a hash function approximating the transform.

  • Petro Bekh, Volodymyr Shevchenko, Information Security in IT Society: Humanitarian Aspects
Consequences of data security violation may be of different kind: political – the resignation of the cabinet; military – the change of the cryptography technique; business – financial damages; personal – loss of job or accommodation. All these losses can be evaluated in material form, but sometimes the consequences may be irreversible, e.g. man’s death or destruction of heritage. The report discusses two humanitarian aspects of information security: software data protection and safety of data storage. In the IT society more and more information is stored in a digital way: from the list of super agents to financial transactions, from the blood and urine analyses to the holographic copies of masterpieces.
Modern mathematical/software methods of data protection (inscription) mainly satisfy the standard needs, nevertheless the stable growth of computers productivity leads to the development of new algorithms and software. On the other hand, for terrorists it is often enough to raze digitally of physically data storages, so it raises the problem of compression algorithms, firewall and antivirus programs, dubbing methods and read-only storages. Data are not only commercial or political texts or numerical tables; they are also manuscripts and sculptures, soniferous sources (songs, symphonies, etc.) and paintings. Menace to these information/data is not only of crime origin, but it also may be due to natural disasters, like fires, floods or earthquakes. Digitizing humanitarian data and safety storage of digital copies is the main road to secure the cultural data.

  • Dimitrij S. Birjukov, Reliability Optimization of Multi-state Systems with Heterogeneous Multi-state Elements
Many engineering systems can be modeled by a network of interconnecting components, whose cooperation allows to realize a specified task. A successful employment of these systems in a critical real world environment requires an evaluation and optimization of their reliability, i.e. their ability to perform the desired operation despite the effects of malfunctioning and damages. It is recognized that there are systems whose behavior can be modeled by a function with different levels, depending on the operating conditions of the constitutive multi-state elements. Systems characterized by different levels of performance are referred to as Multi-State Systems (MSS).This paper presents model for reliability design of complex-structured MSS with heterogeneous multi-state elements (MSSHE). Approach to evaluate MSSHE reliability and Hybrid Genetic Algorithm to solve Redundancy Optimization Problem (ROP) for MSSHE are proposed.

Keywords: Reliability Design, Discrete Optimization, Redundancy Allocation Problem, Genetic Algorithms

  • Smile Markovski, Danilo Gligoroski, Vesna Dimitrova, Aleksandra Mileva, The Family of Block Ciphers "SD-(n,k)"
The authors present a new family of block ciphers named as "SD-(n,k)" block ciphers. This family is defined by using quasigroup operations and quasigroup string transformations. Design of "SD-(n,k)" is based on quasigroup string transformation properties and it allows choosing different level of security and different kind of performances. Constructions of encryption and decryption functions used in "SD-(n,k)" are described.

  • Rafail Gabasov, Constructive Methods of Optimal Control Under Uncertainty
An approach to the optimal synthesis problem based on up-to-date optimization methods [R.Gabasov, F.M. Kirillova et al. Constructive Methods of Optimization. 1998] and the advances of computer technology is suggested. The developed technique are based on a new parameterization of optimal controls and fast algorithms of correcting optimal open-loop solutions in real-time. The topics under discussion are: classical optimal feedback and its realization, optimal guaranteeing feedbacks, optimal control under imperfect information, optimal decentralized control, parallelizing of computations during optimal control of large systems, optimal on-line control with delays, optimal control of time-delay systems, optimal control of PDEs, nonlinear optimal control problems. The algorithms suggested are illustrated by examples.

  • Krassimir Georgiev, Model Studies of Some Atmosphere Aerosols and Comparisons with Measurements
The aerosols in the atmosphere have a big and increasing importance for the assessment of air quality and climate forcing. They play a crutual role for global temperature modifications. The study of aerosols in the surface layer is mainly motivated of their impact on human health and possible ecological effects. Unfortunately, there are not enough measurements of most of the dangerous aerosols available for support of the decision makers. Therefore, the model studies in this field are of big importance for our community. Some model studies of three aerosols (sulfate, ammonium and nitrate) will be reported together with the comparisons with some measurements done. The TM5 model, which is a three dimensional global chemistry transport model, were chosen for our study. It allows two-way nested zooming which leads to possibility to run the model on a relatively fine space grid.

  • Christina Hakopian, Natural Disasters and Present Day Science: Lessons from the Past and Solutions for the Future
As is well know, the primitive man, who went hunting and collected fruit, and, later on, developed farming and livestock breeding, had the only aim-to obtain subsistence means. He could not and did not have sufficient knowledge, means, equipment, etc., to forecast and, moreover, prevent natural disasters like earthquakes, volcanoes, drought, fire, flood, and others. Today, in the ear of the culmination of science development and modern, advanced equipment, man would be able to forecast disasters; however, he either cannot forecast them timely, in order to avoid material and human casualties, or he manages to forecast, but is unable to prevent them. Thus, even at its present level, science is not 'strong' enough to ensure security. That is why it is necessary that natural disasters be classified, measures of forecasting them and ensuring security be carried out, and a complex approach to the in-depth study and solution of issues retaining in present day science be used.

  • Anatoly I. Kalinin, J.O.Grudo, "Optimization of Nonlinear Singularly Perturbed Systems with Hypersphere Control Restriction"
The time-optimal problem for a nonlinear singularly perturbed system with multidimensional control is considered. The values of control are bounded in euclidean norm. An algorithm for the construction of asymptotic approximation to the solution of the problem in question is proposed. The algorithm employs solutions to two optimal control problems of smaller dimension than the original problem.
Key words - optimal control; singular perturbations; asymptotic approximation.

  • Costas Karanikas, Problems for Effective Analysis of Biological Data
We introduce a variety of new discrete (linear or non linear) invertible transforms on symbolic sequences as genes and proteins, mimicking the basic biological functions and operations as: Replication in multiple copies, Dilation, Translation and Splicing of parts. Some of these transforms based on prime number theory or on Stern-Brocot tree and some others on a generalization of Haar Transform and the Riesz-product theory.
Since in biological data sequencing machines are not always letter perfect and one may not have a 100 percent accurate reconstruction. Our main target with these transforms is to encode-decode local information on strings to make fast non-exact string matching and pattern recognition. Thus we deal of the notion of similarity and distances as the Edit Distance i.e. distances measuring the number of the operations delete, insert and substitute required to identify two strings. The effective analysis on biological data requires a revolutionary progress with new tools and ideas. We hope that our research will provide some tools for this purpose.

  • Emil Kelevedjiev, Computational Approach for Assessment of Critical Infrastructure in Network Systems
Methods of computational graph theory are appropriate for studying and modeling of the critical infrastructure. The proposed theoretical model and an experimental computer interactive implementation is intended for predicting critical behaviors of a large flow network system. A possible application is management of the critical infrastructure in water supplying systems or in an electricity power submission network. A model is based on linear programming technique to find solutions in multi-stage in time and multi-criteria optimization of the involved graph flow problem. Due to the ability of interactive re-computing with different sets of input and control data, an expert using the proposed implementation can perform adequate decision making.

  • Faina M. Kirillova, Optimal On-line Control and Classical Regulation Problems
The basic problems of classical regulation theory and its extensions are under consideration. A method and the algorithm for solving classical optimal synthesis problem are discussed (Balashevich N., Gabasov R., Kirillova F., 2000). The essence of the approach based on dynamic version of the adaptive method of LP (Gabasov R., 1979) consists in on-line constructing realizations of the optimal feedbacks by the use of a new parameterization of optimal programs and their corrections in real-time mode. The following questions will be considered: basic problems of classical regulation theory, a linear optimal control problem (optimal open-loop solutions), optimal feedbacks to linear control systems, stabilization by bounded controls, examples: an oscillating system, damping oscillations of a string, stabilization of nonlinear inverted pendulums, regulation of a crane, realization of dynamic systems with a prescribed behavior, synthesis of systems with prescribed limit cycles.

  • Jana Djounova, Kiril Kirov, Nikolay Kirov, Database Structure for Radiation Incidents and for Treatment of Affected People
This article describes an effort to create a national database of radiation incidents in Bulgaria. It is intended for use by National Center for Radiobiology and Radiation Protection . The purpose of the database is to store specific description of the radiation incident and to trace the health effect on people who participated in the incident. We show also data from the recent radiation incident in Sliven stored in our database.

  • Ognyan Kounchev, About Some New Applications of ApproximationTheory forForecasting in Time Series
We apply some new approaches for the forecasting of the behaviour of time series. It is based on techniques of Approximation and Spline theory. These maybe applied to various types of data.

  • Valery V. Krakhotko, G. P. Razmyslovich, The Controllability Problem For Differential-Algebraic Dynamical Systems
In the report a dynamical system of the differential-algebraic equations is considered. For this system the various problems of the controllability on the subspace (H-controllability, complete H-controllability) is set. Using the representation of the solution of the system in the closed form the necessary and sufficient conditions for the stated mode of the controllability are obtained. The condition of the controllability are written in terms of the solutions of the determining equations which are constructed using the input system. The received results are generalized for the differential-algebraic systems with delay.

  • Axel Lehmann, Verification, Validation and Accreditation of Simulation Models and Applications
Under pressure of time- and cost-constraints, the importance of modelling and simulation (M&S) techniques for representation and analysis of dynamic system behaviour is permanently increasing. While the complexity of real systems and processes are permanently increasing, the complexity of models and simulation applications, and the need for guaranteeing their correctness and credibility is increasing accordingly. This talk will summarize at first perspectives for future needs and potentials in M&S development and applications. The basic requirement for analysis of a model´s credibility is to verify the model´s correctness , and to validate its validity with respect to predefined application purpose and validity criteria. This can only be afforded when the different design, development and application phases of M&S are well documented. This talk will present a M&S verification and validation process based on a multi-phase M&S model development and application concept. It demonstrates how this method can be applied in various application scenarios, and how it can be tailored according to credibility criteria, or to application requirements. We will demonstrate, that a component-based M&S approach will support model verification and validation.

  • Stein Malerud, A Multi-Methodological Framework for Analysing Crisis Management and Low Intensity Conflicts
During recent years the security environment has become more uncertain and complex. The armed forces face a broader spectrum of tasks, with an increased focus on low intensity conflicts. The inherent uncertainty and complexity of these operations are indeed a challenge for long-term planning as well as for direct OR support to military operations. The first problem is to define the problems. Problem structuring methods (PSM) such as Soft Systems Methodology (SSM) are a useful approach for discussing and agreeing on which problems to address. The next challenge is how to include risk and uncertainty in the analysis models and evaluations. Use of scenarios is one common approach to explore uncertainties in the future security environment. Uncertainties and inaccuracy related to model parameters and human decision making may be represented by, for instance, probability distributions and fuzzy sets. Decision making related to complex problems usually includes more then one decision criterion. Various methods for multi-criteria decision analysis offer different approaches to modelling preferences and to rank alternatives. We believe that combining different OR methods – soft and hard – is a fruitful approach in order to deal with complexity and uncertainty. Thus, we have developed a framework of methods that combines elements of SSM, elements of scenario planning, value modelling and a multi-criteria model for evaluation and prioritizing of decision alternatives. This framework is currently applied in a case study addressing the effectiveness of the Norwegian oil-spill preparedness system.

  • Todor Tagarev, Boyan Mednikarov, Planning of Security Sector Capabilities for Protection of Maritime Sovereignty
Capability-based planning (CBP) is proving its efficiency in the armed forces. This approach has a considerable potential for implementation in managing the development of the security sector. This article takes a look at a particular application in the area of maritime sovereignty. Our approach is based on centralized planning of the capabilities for protection of maritime sovereignty and agency-based development of these capabilities. We use a process that links objectives, ambitions, planning scenarios, tasks, required capabilities, and planning risks. The distribution of capabilities among security sector organizations accounts for their traditions and current roles, but focuses on cost effectiveness. In the final section of the paper we examine major decision support requirements to capability planning for maritime sovereignty.

  • Smile Markovski, Danilo Gligoroski, Vesna Dimitrova, Aleksandra Mileva, Avalanche Effect in the Family of Block Ciphers "SD-(n,k)"
"SD-(n,k)" in new family of block ciphers, based on the properties of quasigroup string transformations with possibility of choosing different level of security and different kind of performances, by choosing the key length, the plaintext length and the set of letters. Constructing a cipher to exhibit a substantial avalanche effect is one of the primary design goals. If a block cipher does not exhibit the avalanche effect to a significant degree, then it has poor randomization, and thus a cryptanalyst can make predictions about the input, being given only the output. This may be sufficient to partially or completely break the algorithm. In this paper the authors showed that family of block ciphers "SD-(n,k)" exhibit a substantial avalanche effect.

  • Zlatogor Minchev, Intelligent Scenario Development for Computer Assisted eXercises
Scenario development for Computer Assisted eXercises (CAX) is a very ambitious area especially in Crises Management field. The reason for this is that CAX, generally works in the digital environment and implements real world crises and objects. Additionally, if we consider a terrorist attacks representation, there is an information uncertainty. The paper will show a mathematical tool, based on the application of Intuitionistic Fuzzy Sets, random numbers and software implementation of a real operative system for CAX scenario development in Borland Delphi environment.

  • Boris Mnatsakanyan, L. Chilingaryan, K. Aghababyan, On the Calculation of Maximal Outlets of Small Mountainous Rivers
In mountainous countries with complex physical geographical conditions, such as the territory of the Republic of Armenia, the calculation of the maximal outlets of small rivers has a very important practical meaning, since these rivers bring mudflows and cause serious damage to many branches of economy.
The methods used to evaluate the maximal outlets are often not accurate enough.
We have carried out a comparative research of the case study of the Marmarik river with application of a number of methods used in Soviet times and methods used abroad. The research shows that when calculating the maximal outlets of small rivers it is more efficient to use the formulae or the maps, so far as the values calculated with the use of these formulae and maps are close to the maximal outlets values defined by the rivers with long series of measurements.

  • Klaus Niemeyer, A Contribution to the Theory of Models
The model and its application, simulation, have got an ever increasing weight as instrument in many disciplines since computers became available. At the same time new scientific theoretical approaches have been developed in order to classify and systematize this method. In this paper an approach is discussed, which describes the modelling method on the basis of the theory of science. The hypothetical statements as formulated in the paper perhaps serve as stimulus for further work in this area and could contribute to the more common understanding of the phenomena of modelling in the context of intelligent and rational behaviour. A model theory has been presented by Stachowiak /1973/ as a fundamental contribution to the theory of science, which is seen as the basis and starting-point for the contribution in this paper. Most important attributes of models are:
 • purpose
 • model-original-relation
 • contraction.
The intellectual feedback cycle of models is the principal element of the paper which can serve as an extension to the theory of modelling. The distinction between perception models and anticipation models is introduced as well as the hierarchical or fractal approach to describe systems of model applications in the context of intellectual behaviour. Examples of real life systems are discussed and presented.

  • Stavri G. Nikolov, T. D. Dixon, J. J. Lewis, C. N. Canagarajah, D. R. Bull, T. Troscianko, J. M. Noyes, How Multi-Modality Image Displays Affect Decision Making
 Accurate and efficient information processing and presentation are critical to optimal decision making and the success of military operations. Image fusion is the process of combining information from multiple images of a scene, e.g. captured by different sensors, into a single composite image that is more suitable for visual perception or computer processing. There are several benefits to multi-sensor image fusion including wider spatial and temporal coverage, extended range of operation, decreased uncertainty, improved reliability and increased robustness of system performance. Multi-sensor image fusion technology offers a means of enhancing vision, improving situation awareness and target detection in many military and security applications. Image fusion is primarily intended for man-in-the-loop systems. In this talk we will review how different multi-modality fused image or video displays affect visual information perception, interpretation, and decision making. The human decision process can be aided significantly by reducing the cognitive load and more importantly displaying task-relevant and decision-relevant information. Results from several recent studies undertaken at the University of Bristol will be presented. These include findings about the way different multi-modality displays have an effect on rapid decision making (very short display times), target tracking in visible and IR surveillance videos; and image segmentation.

  • Michel Rademaker, Technology Trends and Developments - Approaches and Use in Defense Planning
Technology is for modern defence and security organisations an important force multiplier. In their strategic planning they therefore have to take good notice of short and longterm technology developments. To have an assessment of premature technologies is not often made by military staff. A methodology is presented that is currently under development and tested by NATO RTO Task Group-062 to assess the potential disruptiveness of these premature technologies. The methodology supports both technology push and demand pull and has the potential to help technology experts and military planners to assess the disruptiveness of new technological developments for defence and security.

  • Hermann Render, Constructive Methods in Geometric Modeling
Bezier curves and Bernstein polynomials are fundamental tools in geometric modeling. In this talk we consider Bernstein-type bases in the framework of exponential polynomials. The main result is the construction of a positive Bernstein-type operator which preserves two given exponential polynomials. A sufficient condition for the convergence of the Bernstein-type operators is presented.

  • Roberto San Jose, J. L. Perez, R. M. Gonzalez, Real-Time Air Quality Operational Forecasting System for Industrial and Urban Areas
In this contribution we show the description, implementation and operation of an Operational Air Quality Forecasting System for industrial plants and for urban and regional areas. The system is called OPANA (OPerational Atmospheric Numerical model for urban and regional Areas) and is the evolution and result of more than 10 years of research on sophisticated state-of-the-art numerical air quality modelling systems and the implementation on state-of-the-art computer platforms; from old Pentium III to actual dual core 64 bits PC platforms. The system is in operation since 2005 on different industrial plants in the south of Madrid area and for urban areas it is in operation on several cities (Madrid, Leicister city (UK), Las Palmas (Canary Islands, Spain), etc.). The system is actually using MM5 mesoscale meteorological model (PSU/NCAR, US) and CMAQ (Community Multiscale Air Quality Modelling System) developed by EPA (US). Additionally a complex emission modeld (EMIMO) developed by UPM (Spain) is also described and needed to provide hourly and high resolution (1 km) pollution data at global level. Results show that these tools can provide reliable and robust information to authorities and industrial managers to secure - in forecasting mode - the quality of the air in surrounding areas.

  • Hans-Jurgen Schirlitzki, Simulation within the Transformation Process and CAX
Simulation is one of the key tools to support transformation and computer-assisted exercises. The presentation will discuss different categories of tasks in transformation and CAX which can be supported by modelling & simulation, the systems-of-systems approach used, basic problem areas supported, necessary components of integrated simulation systems, examples of simulation systems and simulation system federations in use and finally concepts for using those simulation tools for experimentation and testing.

  • Velizar Shalamanov, Integration of C2 and M&S Elements in CAX for Crisis Management
CAX are main tool for training and respectively change management ofcomplex systems. Integrated emergency management system is a typical element of complex adaptive system, which needs effective change management internally and at the same time is an effective change management tool for the whole security sector in transition from traditional national security to civil security concept. CAX requires integration of traditional C2 system with M&S tools to provide real test–bed for new concepts and new technologies including the key element – people in the loop. There are three critical elements in CAX architecture – simulation cell, operations cell and analytical cell that need conceptual, information, hardware and software integration in order to support realistic flow of the training process. Current paper presents a model of such integration based on static and dynamic technological diagrams with distributed nodes in these three cells. In normal C2 system all nodes will “sit” in operations and analytical cell with tendency to have as much as possible of them in the analytical cell providing scientific best solution for problems arising during crisis management scenario. In exercise simulation cell has to cover all nodes that is impossible to be covered by operations and analytical cells. So in one end is a system with participants in the exercise only looking at closed simulation run by simulation cell, without any input from operations or analytical cell. Next step is when we have some nodes implemented in analytical or operations cell and at the other end is a full C2 system where there are no elements in simulation cell – all of the nodes are implemented in operations and analytical cell.

  • Volodymyr N. Shemaiev, Oleksandr F. Velichko, The Methods of Scenario’s Estimation and Managements of Situations in the Sphere of Maintenance of Military Safety of the State
The modern military-political environment is characterized by dynamism and instability. In such terms, development and realization of the weighed policy of all the components of the national security is the one of the basic sphere of the state institutions activities. Military security is the one of the critical components.
The difficulties of an estimation and forecasting in this sphere are caused by the following features:
- interrelation of processes, multi-aspect processes;
- absence of sufficient capacity of the quantitative information on dynamics of processes;
- necessity of the account of the purposes, interests of active subjects of inves-tigated processes.
In this case, usage of traditional methods for formalization and algorithmic development of scenarios of the case management does not bring desirable result owing to complexity of reception of adequate formal models of processes. The of-fered Methods are based on the method of system dynamics, which bases have been developed by J. Forester [1]. Key point of this method is that the system can be presented in the form of structure. All the elements of the structure are intercon-nected that enables researches both behaviour of system as a whole, and its sepa-rate components. For the realization of given methods the mathematical device cognitive mod-elling that allows to solve algorithmically both direct, and return problems of man-agement [2] is used.
Usage of the developed Methods allows to reveal in due time threats in mili-tary sphere and to form scenarios of their neutralization.
Sources:
1. J. Forester. World dynamics. - Ì.: Science, 1978. – 304 p.
2. B.Kosko. Fuzzy thinking. Hyperion, 1993. – 320 p.

  • Volodymyr Shevchenko, Information Systems’ Security: Saper vs. Electronics
In contemporary society companies and individuals rely on information systems to manage their jobs and personal lives. Modern corporations rely on computerized information systems to process financial accounts and manage human resources; municipal governments rely on information systems to provide basic services to its citizens; and individuals use information systems to study, shop, bank, and invest. Information systems’ security is responsible for the integrity and safety of system resources and activities. Most organizations in developed countries are dependent on the secure operation of their information systems.
New technologies for recording and processing information as well as for information safety have been invented, new capabilities have appeared. The main advantage of electronic systems – “rewrite ability” - is in the same time the largest threat to their security. Correctly done electronic change of A to B in information system can’t be detected any way. On the other hand in paper document it can be detected easily. So to guarantee the safety or possibility to find a criminals information systems should use “incombustible paper” (“once write memory”) which via hardware or software methods support the registration of all information changes.
In the same time disasters such as earthquakes, floods, and fires destroy papers as fast as floppy, CD or memory chips. This problem has no electronic or mathematics solution. That’s why we use for safety of our paper and electronic media the same measures: copying, fireproof boxes, etc. But the simplicity of copying electronic information generates a new circle of security problems.

  • Tsvetomir Tsachev, A Dynamic Evacuation Model
The population of several settlements has to be evacuated to safe locations because it is threatened by an approaching hazardous phenomenon (e.g. poisonous or radioactive cloud, flood, storm, etc.). A precise forecast for the dynamics (the movement) of the phenomenon is assumed to exist until all the roads leading out of the settlements, that are to be evacuated, are cut off. The problem is to determine the transport flows dispatched out of these settlements, at each of the (discrete) time moments until they are hit by the hazardous phenomenon.
A continuous model of the evacuation in the form of an optimal control problem will also be discussed.

  • Hassan Ugail, E. Elyan, Efficient 3D Data Representation for Biometric Applications
An important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data often is available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful.
Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilised to represent complex 3D data where the data can be parameterised in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.

  • Trahel Vardanian, Will the Present-day Scientific Approaches Enable to Forecast Natural Disasters?
In the age of present-day scientific and technical achievements, man’s safety does not seem to be ensured. In particular, it refers to the process of forecasting and managing natural phenomena. Today, man is unable to resist to some natural disasters (earthquakes, floods and so on), of which he can become a victim any time. Science has developed thousands of mathematical models of forecasting natural disasters, which, however, cannot entirely explain and predict the cause-and-effect relations of the appearance of these phenomena. The reason is that natural phenomena are affected by numerous factors and cannot be managed by science; they have a complex mechanism, which is like a higher live organism. Thus, mathematics cannot forecast these phenomena with its “dead” models. Yet, mathematics has “managed” to make phenomena forecasting rigid and by this, to approach to some solution of this issue. It is necessary to form a synthesized science (Geography is an example of such science), which would comprise all cause-and-effect relations contributing to forecasting of phenomena, and, what is most important, would “enliven” the rigid mathematical models used in studying these phenomena.

  • Vladimir M. Veliov, Viable Control of the Air Quality in Case of Accidental Pollution
A control model of the air pollution in a bounded area with internal and external emission sources will be presented. The main scenario assumes that the safety bounds would be violated as a result of an abnormal pollution. The aim of control is to prevent violation by temporary restrictions on the emissions in the area. This should be done (if possible at all) either at a minimal cost, or an optimal trade-off between the cost of emission reduction and the damage caused by the pollution should be determined. Mathematically, the model involves a transport PDE with varying wind, controllable emission and non-linear deposition, and objective functions representing the cost of control and the cost of damage caused by the pollution. The theoretical background and a solution approach to the arising control problems will be presented.

  • Rene Willems, On the Role of Scenario's for Defence Planning
This paper discusses the role of defence forces in today's world. Subject to much deeper uncertainty as to where the security environment stands today compared to what is was engaged with in the 2nd half of the last century, the role, hence the capabilities forces require have to be adaptive and flexible.
Planning what kind of capabilities nations desire/wish to have to support their defense ambitions and the decisions what systems and doctrine to be fielded, require a much more flexible approach then ever before.
A systematic approach to guide decision makers and a discussion on how the development of scenario's and scenario-analyses may support this process will be presented as a strong mechanism as of how to cope with today's challenges.

  • Vladimir A. Zaslavsky, Integration Risk Optimization Models and Algorithms
Risk management and safety providing are system problems that concern different countries and unite industrial regions, depend on technical conditions of enterprises and influence on economy and ecology. Harmful attitude connecting with human activity to nature and its resources has a great negative influence on ecology, land and water resources and requires more and more financial expenses for risk reduction, reconstruction and prevention of technical and ecological cataclysms. Exclusive importance of risk management problems connected with the concept of sustainable development and it’s component - provision of life safety and environment protection.
On each management level it’s necessary to evaluate scales of the damages and losses, to have real and adequate cards of risk regions and classification of dangerous objects. System approach to risk investigation and hazards ranking (taking into account uncertainties) is very important along with understanding the fact that they can be interconnected, affect one another thus intensifying the negative effect.

  • Nikolay Zhivkov, Two Models for Decision-Making Support in Computer Assisted Exercise
This article present two models for decision-making support designed for the participants in the computer assisted exercise EU TACOM 2006 held in Sofia, Bulgaria, July 23-24. The first model is a real time simulation for prognoses and management of the relief supplies processes during crises and the second model estimates the area of the radiological contamination caused by a "dirty’’ bomb explosion and measures the health impact.
In a critical situation the natural equilibrium of the cycle demand-supply of a stable economic system is violated for many material products, resources or services. After an extremely short period of time there is necessity to plan the system behavior due to the increased demand of a certain resource, product, or service. The variety might be overwhelming; this could be life-saving medicaments, food products, water, protective equipment, clothing, instruments, sheltering, fuel, transportation services etc. For those whose responsibilities imply the neutralization of the crisis and its consequences, it is important to quickly evaluate the increased demand of any resource, product, or service, and to suggest ways to meet it. The simulation model gives a prognostic estimate for the increased demand based on a prognostic function of the crisis impact. Moreover, it describes the quantitative dynamics of the demand-supply cycle and thus helps the player to form a satisfactory strategy.
According to the scenario, in the second model a "dirty’’ bomb explosion occurred on a parking area in a highly populated region in a big city. The explosion dispersed small radioactive pearls containing Cs 137. Two ways of dispersion of the radioactive material after calculating the ballistic trajectories of the small pearls are compared.
Both models are implemented in the program environment of PowerSim Studio 2005.

  • Zahari Zlatev, Environmental Modelling, Security Measures and Decision Making
Comprehensive mathematical models can successfully be used in order to find out whether some critical levels of the environmental pollution (for example, critical levels established in the European Union) are exceeded or not. Exceeded critical levels of the environmental pollution may cause different damages on eco-systems, vegetables, animals and, what is perhaps most important, on human health. Therefore, different measures have to be taken if the critical levels of the environmental pollution are either already exceeded or will be exceeded in the near future. This is a difficult task, because the measures that have to be done are normally very expensive. The decision about what kind of measures are to be taken should be made after many runs of the available mathematical models with different scenarios (see Zlatev and Dimov [1]). The questions of the reliability of the model results and the choice of a sufficiently large set of scenarios will be discussed in this talk. The conclusions will be illustrated by some results obtained in several comprehensive environmental studies.
[1] Z. Zlatev and I. Dimov: "Computational and Numerical Challenges in Environmental Modelling", Studies in Computational Mathematics, Vol. 13, Elsevier Science, Amsterdam, 2006.