SlideShare a Scribd company logo
1 of 6
Download to read offline
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 1 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
Development Principles of Knowledge Database of
Intelligent System for Estimation of Dynamical
Interaction of Orbital Systems with Space Debris
Paliukh Boris Vasilievich, Kemaykin Valery Konstantinovich, Kozlova Yuliya Gennadyevna
Tver State Technical University
TvSTU
Tver, Russian Federation
Abstract—In the paper, a principles underlying the construc-
tion of an intelligent information system estimated results of the
dynamic interaction of orbital systems with space debris is pre-
sented. It describes the knowledge database model based on these
principles which is the synthesis of theoretical and practical in-
formation in the field of estimating the high-speed interaction of
objects.
Keywords—intelligent information system; space garbage;
knowledge database; fuzzy systems; damage risk assessment
Spacecrafts (S) are exposed to blows of particles of space
garbage (SG). Therefore the solution of a problem of damage
risk assessment and development of actions for its decrease
and creation of protection systems of S against influence of
superfast particles of SG is very urgent [12].
The main information about impact of SG on spacecrafts is
given by ground bench tests with superfast blows application.
Computer simulation is used as supplement.
The main method of development testing is experimental
superfast blow and its purpose is examination how S or its
components will be able to sustain collision in space with SG.
However there are certain borders of opportunities in this
direction. There are difficulties with acceleration of large
shells to typical speeds of collisions in low-orbital area of the
near-Earth space environment. These restrictions reduce dam-
age prediction accuracy from collision with average and small
SG.
Computer modeling serves as the connecting link between
results of inspection of the surfaces which were really affected
by SG in space and researchers assumptions and checks and
calibrates the last. Models also allow extrapolating the data
obtained in laboratory in the limited range to a wide range of
conditions which cannot be reproduced in laboratory [11].
According to OST 134-1031-2003 "The general require-
ments for protection of space means from mechanical influ-
ence of particles of a natural and technogenic origin" (item
5.6), an resistance indicator of S to mechanical influence of
high-speed particles of a natural and technogenic origin is its
undamage probability (UDP). It is probability that it doesn't
happen any "dangerous" collision of a high-speed particle with
a vulnerable surface of S (n = 0) during time τ. PUD is calcu-
lated on a formula:
N
n 0UDP P e−
=≡ =
Given that it is convenient to use GNP for operational es-
timates of one element of a vulnerable surface, value is de-
fined as:
ex elN N S= τ
where Nex is value of medium-integrated flux of high-
speed particles with a critical mass of mex - extreme minimum
value of particle mass of SG at which the considered element
of a surface of S, m–2
·year–1
is damaged (according to the ac-
cepted criterion);
Sel is the considered area of a vulnerable element of surface
of S, m2
;
τ is residence time of S in SG environment - time of ex-
ploitation of S, year.
The value of Nkp depends on the critical mass of mex or,
equivalently, the critical diameter of dex-particles of SG which
cause damage to protection of S. It is expected that density of
particles material of SG is known. The value of dex is defined
with help of ballistic limit equations (BLE).
BLE represent ratios for determination of the minimum di-
ameter (the minimum weight) of the flying particle at which
wall damage occurs. The specified type of the equations is
called the efficiency equations. When it determines UDP,
damage function is built by means of BLE of efficiency. It
shows dependence of dkp on the speed of blow of V.
The known BLE for a single wall are considered in
[1, 3, 7]. To improve veracity BLE were modified with use of
experimental surveys results and measured data which carried
The research was done within the government task of the Ministry
of Education and Science. The number for the publication is 2.1777.2017/4.6
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 2 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
out on the returned elements of S, space stations "Mir" and
the ISS, the Hubble space telescope, the LDEF (LongDuratio-
nExposureFacility) satellite, etc. [2, 5, 7-9] .
BLE are equated for multilayered protection (several
walls at distance from each other with additional layers on
surfaces and between them) allow to calculate thickness of a
forward wall from blow, and the minimum thickness of a back
wall without damage. It is accepted that a wall from blow of
SG is called a bumper.
According to the analysis of calculations results and expe-
rimental data is shown that reliability of the analysis of protec-
tion S against SG on UDP will be reached if BLE, which use
at this case, are satisfied the following requirements [7]:
• BLE have to include all optimized variables;
• range of optimized variables change in BLE has to be
rather wide.
Thus, it is possible to allocate the following main problems
inherent in a problem of forecasting of results of interaction of
S and SG:
• possibility of collecting a large number of data about
interaction of S and SG and practical lack of their sta-
tistical stability that calls into question trust degree to
the models constructed by methods of probability
theory and classical mathematical statistics;
• insufficient reliability of representation of forecasting
results in the form of the determined defeat functions
because many influencing factors have the fuzzy nature
and difficult formalizations for traditional modeling
methods application.
Within the conducted researches there is a problem of
creation of the knowledge base of an intellectual information
system which considers results of forecasting of dynamic inte-
raction of orbital systems and space debris and is effectively
applied in the conditions of uncertainty. KB has to conform to
requirements of adequacy, completeness and consistency, and
also accuracy and an interpretation of the received results.
Mechanisms of its construction have to provide a possibility of
introduction of new data on subject domain and use these data
for maintenance of KB in an urgent state, including its timely
correction (training).
Existence of statistical data gives an opportunity to consid-
er as effective tools of technology of the operational account-
ing of data (OLAP) and their intellectual analysis (Data Min-
ing): genetic algorithms and neural networks.
Two aspects of information resource lie in the modern
theory of the artificial intelligence (AI) at the heart of methods
of the knowledge representation (KR) and representation of
abilities:
• mathematical formalization or logical completeness of
the considered information object;
• cognitive approach or understanding (percep-
tion/interpretation) of process of awareness of
knowledge by the person.
The greatest distribution at practical developments in the
field of artificial intelligence was gained by productional,
frame models and semantic networks, and also a specific place
was held by hybrid model, thanks to object-oriented approach
of representation of knowledge [15].
For creation of knowledge base, the hybrid model of repre-
sentation of knowledge in the form of a neuro and indistinct
network formalism is chosen. Constructed, on its basis the
neuro and indistinct network, is isomorphic to matrixes of
rules (knowledge) and reflects the interrelations revealed in
experimental data and has important human (intellectual)
properties: representation of knowledge in a natural language,
an interpretation of the received results and learning ability in
real time.
This approach application gives the chance to eliminate a
number of the defects characteristic of traditional methods.
First, fuzzy sets are convenient means of formalization of the
sizes having the qualitative nature, and their application for
formation of the fuzzy forecast is most acceptable in the con-
ditions of uncertainty of parameters of forecasting. Secondly,
efficiency of forecasting model and forecast reliability are
great importance and they demand the choice of the corres-
ponding methods for its construction. In this regard, genetic
algorithms which realize the mechanism of random search and
are characterized by the corresponding advantages (overcom-
ing problems of a local optimum and "dimension damna-
tions"), represent the effective instrument of design of indis-
tinct knowledge bases by their extraction from experimental
data.
I. PRINCIPLES OF CREATION OF THE KNOWLEDGE BASE OF
INTELLECTUAL SYSTEM
The main idea of the evaluation is concluded in the follow-
ing rule: "If collision happened, the damage caused to SG de-
pends on the sizes and the relative speed of S and SG, compo-
sition of their material, a corner under which the SG hit in S
and degree of vulnerability of the place (component) of S on
which the blow fell".
From these positions it is possible to consider defeat of S
as the problem of identification having the following proper-
ties [4]:
• it is necessary to establish dependence between input
and output variables for evaluating results;
• input variables are associated with parameters of con-
dition of an identification object and conditions of
possible interaction. The quantity of particles of SG
and their characteristic taking into account features of
S is initial information for determination of the ex-
pected damage;
• the output variable is associated with a condition of S
after interaction with SG. Vulnerability (defeat) of S in
a flux of SG can be defined as a combination of proba-
bilities of elements undamage, taking into account im-
portance (criticality) of everyone components
• output and input variables can have quantitative and
quality standards.
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 3 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
• the structure of interrelation between output and input
variables is described by the rules IF <inputs>, THEN
<output> which use quality standards of variables and
representing fuzzy knowledge base.
Principles of creation of the knowledge base of intellectual
system for estimate of results of S and SG dynamic interaction
include:
1. The principle of the linguistic description of the used va-
riables on an input and an output.
According to this principle, inputs of an object and its out-
put are considered as linguistic variables which are estimated
by qualitative terms (a term - from English term - to call).
The undamage probability of S (UDP) depends on the fol-
lowing factors which influence on vulnerability of S is most
essential and for which it exists real possibility of collecting
experimental data.
The influencing factors and the UDP output parameter
with ranges of values and used for the description term-sets
are shown in table 1.
2. The principle of use of one-dimensional and multidi-
mensional membership functions of linguistic terms for the
description of input and output variables.
In compliance with this principle fuzzy variables with
functions of accessory of one or several arguments can be
used as terms during a fuzzy logical conclusion.
It is connected with initial division of space of input va-
riables into classes.
Generally it is considered independent variables on an in-
put which form set of not crossed classes. Each input variable
has own input sets, it allows to use simple and evident repre-
sentation of membership function (for example, triangular or
trapezoid), and also to apply simple computing procedures
when carrying out all stages of fuzzy conclusion. As applied to
solvable problems of assessment of interaction between SC
and SG, such variables are the linguistic variables connected
with parameters of particles of SG, parameters of a wall of SC
and a protective bumper.
TABLE I. CHARACTERISTICS OF FORMED TERM-SETS
Name (linguistic
variable)
Sym
bol
Variable
range (uni-
versal set)
and its di-
mension
Term-sets of linguis-
tic variable value
High-speed collision parameters
Interaction speed SG
and S in encounter
point, vn, km·s–1
X1 0…20 km·s–1
Low (L),
Under average (UA),
Average (A),
Above average (AA),
High (H)
A corner between a
particle speed vector
and a normal to a
surface, θ
X2 0…±180° Small (S),
Average (A),
Normal (N),
Big (B),
Huge (H)
Parameters of a SG
Particle diameter, dp X3 0.1…1000 cm Small (S),
Average (A),
Name (linguistic
variable)
Sym
bol
Variable
range (uni-
versal set)
and its di-
mension
Term-sets of linguis-
tic variable value
Big (B)
Particle speed, vp X4 3…8 km·s–1
Low (L),
Average (A),
High (H)
Density of the particle
material, ρp
X5 2.5-5 g/cm3 Aluminum alloy
(Aap), Titanium alloy
(Tap), Stainless steel
(Ssp)
Particle mass, mp X6 10-5
…103
t Small (S),
Average (A),
Big (B)
S wall parameters
Wall thickness, lw X7 0.13-0.4 cm Small (S),
Average (A),
Big (B)
Density of the wall
material, ρw
X8 2.5-7 g/cm3 Aluminum alloy
(Aa),
Titanium alloy (Ta),
Stainless steel (Ss)
Hardness of the wall
material by Brinell,
HB
X9 60-150 MPa Small (S),
Average (A),
Big (B)
Bumper parameters
Bumper thickness, lw X10 0.33-0.55 cm Small (S),
Average (A),
Big (B)
Hardness of the
bumper material, ρb
X11 0.01-2.5
g/cm3
Small (S),
Average (A),
Big (B)
A gap between a
bumper and a back
wall of S
X12 0…6 cm Small (S),
Average (A),
Big (B)
Value of material
yielding stress of back
wall, σw
X13 130-540 MPa
(N/mm2 )
Low (L),
Average (A),
High (H)
Speed of S, vs X14 3…8 km·s–1
Low (L),
Average (A),
High (H)
Undamage wall
probability, UDPs
P 0.5…0.999 Low (L),
Average (A),
High (H)
However linguistic variables can have rather difficult
physical nature demanding to use several connected sizes. For
hierarchical systems of fuzzy conclusion, it spring up a certain
degree of blurring that can lead to loss of the importance of
result. One of solutions of this problem is use of terms of lin-
guistic variables with functions of accessory of several argu-
ments.
Methods of fuzzy clustering can be used when multidi-
mensional membership function is being formed [14].
The way of a task of multidimensional functions of acces-
sory of terms of linguistic variables includes the following
stages:
• selection of linguistic variables and comparison
of modeling subject characteristics to it;
• collecting statistical data on activity of a model-
ing subject;
• fuzzy clustering of statistical data for each lin-
guistic variable;
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 4 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
• linguistic variable terms formation by giving to
the received clusters of names;
• formalization of functions of accessory of terms.
[6].
As an example it is considered the linguistic variable
"speed of interaction be-tween SG and S in a meeting point",
including, "a corner between a vector of particle speed and a
normal to a surface of S", "particle speed" and "speed of S".
Linguistic variables terms are formed by assignment
names to the received clus-ters. For each term it is set in tabu-
lar form multidimensional membership function in the form of
the matrix including arguments values matrix of Xi and a col-
umn of function values which is the appropriate for term line
of a matrix of membership functions Mi.
3. The principle of formation of structure of dependence
"input output" in the form of a matrix of rules
Matrixes of fuzzy conclusion rules are formed on the basis
of empirical knowledge or experts knowledge in problem area,
and they are presented in the form of fuzzy production of a
standard look.
Each matrix of rules of a look IF <inputs>, THEN <out-
put> characterizes the revealed interrelations in the allocated
set of experimental data on each element of a design of S.
By consideration of a problem of interaction between S
and SG it exists large number experimental and settlement
data of the different nature and different in physical sense. In
this regard it is quite difficult to find the expert who could
create all necessary set of the fuzzy logical rules which are the
basis for the fuzzy knowledge base as kernels of intellectual
system.
In such situation there is a need of the solution of a prob-
lem of extraction of set of fuzzy logical rules which will dis-
play in the best way regularities of communications "inputs
outputs" on a set of the available experimental data, without
participation of the expert. The solution of this task is possible
by carrying out the data mining based on genetic algorithms of
optimization [4, 10].
Set of rules IF-THEN can be considered as a set of points
in space <inputs outputs>. Use of the device of a fuzzy logical
conclusion allows to restore a multidimensional surface which
connects values of an exit at various combinations of values of
input variables on these points.
4. Principle of hierarchy of the knowledge base
Interpretation and control of the received results it is con-
nected with intellectual opportunities of the person on the li-
mited volume of its random access memory.
In this regard it is expedient to carry out classification of
input variables and to construct on its basis so-called tree of a
conclusion which will represent system of hierarchically con-
nected contours of mini-bases of smaller dimension.
Derivation tree for the entered input variables it is shown
in fig. 1.
Fig. 1. Derivation tree.
Functional dependence P=P (x1, x2, x3,…, x14) which
connected x1…x14 inputs and P output, are replaced with the
sequence of substitutions:
( ) ( )
( ) ( )
P P p1, p2, p3 , y1 y1 x3, x4, x5, x6 ,
z z x1, x2, x14 , y2 y2 x7,x8, x9 ,
= =
= =
where y1, y2, y3, z, p1, p2 and p3-the intermediate outputs
considered as linguistic variables.
Due to the principle of hierarchy it is possible to consider
almost unlimited number of the input variables influencing
assessment of an output variable. At creation of a derivation
tree it is necessary to aspire to that the number of arguments
(en-trance arrows) in each knot of a tree satisfied to the rule
7±2.
Expediency of stepwise representation of expert know-
ledge is caused not only by natural hierarchy of objects of
identification, but also need of the accounting of new variables
in process of object knowledge accumulation.
5. Principle of two-stage setting up of fuzzy knowledge
bases.
According to this principle, creation of model of the know-
ledge base is carried out step by step (fig. 2) which by analogy
with classical methods can be considered stages structural and
parametrical identification. The configured settings are the
weight of fuzzy rules IF-THEN and a membership functions
form.
At the first stage creation of a matrix of rules is carried out
according to available information. In the chosen subject area
there is no possibility of involvement of the expert who would
simulate this or that object (process) that is connected with its
complexity and a certain novelty and as a result that is con-
nected its insufficient development.
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 5 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
In this regard process of creation of fuzzy knowledge bases
is organized on the basis of the available experimental data
obtained as a result of a research. For extraction rules it is used
of the known mechanism of data mining realized in genetic
algorithms of optimization.
As a result of creation of set of rules matrixes is formed the
initial knowledge base. For ensuring reliability of the received
estimates the second stage is provided at which training of a
neural and fuzzy network formalism in examples, formed of
experimental data.
Fig. 2. Stages of setting up the fuzzy knowledge base.
The essence of KB fine tuning stage consists in selection
of such weights of fuzzy rules IF-THEN and such parameters
of membership functions which minimize distinction between
desirable (experimental) and model (theoretical) behavior of
an object.
The stage of the KB fine tuning is formulated as a problem
of nonlinear optimiza-tion which can be solved by various
methods among which the most universal method is method of
steepest descent.
However, at a large number of input varia-bles and fuzzy
terms in the knowledge base application of a method of steep-
est descent demands search of a minimum from the different
initial points that significantly increases machine timetable. In
work it is offered fine tuning of the fuzzy knowledge base
with application of a method of neural networks training
known as backpropagation [14].
6. The principle of multiloop setting up the fuzzy know-
ledge base for the objects having hierarchical structure.
It is necessary to allocate the contours solving independent
problems of assessment during modeling the difficult systems
having hierarchical structure.
Each contour has to learn independently. For this, it is ne-
cessary to form the training selections purposefully on each
subtask.
In the knowledge base constructed for area of high-speed
impact of SC and SG it is possible to allocate three contours:
• the first contour allowing to estimate materials re-
sistance of a design of SC to influence of SG. Da-
ta for rules extraction and matrixes creation can
include all volume of results of the carried-out
bench, polygon tests, at the same time the firing
angle of targets is chosen 90 °. Input data are cha-
racteristics of a particle of SG (drummer): the
weight, density, the size and speed of a particle,
and also property of wall material of S: thickness,
density and hardness of material ac-cording to
Brinell. Output contour parameter is the received
UDP value for wall material of S at interaction
from SG on corners θ close to 90 ° (Normal).
Such approach considers limited opportunities of
the test bench on impact speeds (to 5 m/s), but al-
lows to use these results for carrying out training
of the second contour;
• the second contour of interaction results assess-
ment of SG with a single-layer wall of S. Data for
extraction of rules include the known data on a
picture of real collisions in space, results of
ground bench tests and the analysis of defeat
function graphs for single-layer constructive ma-
terials S. Input data are characteristics of a par-
ticle of SG (drummer) - the weight, density, the
size and speed of a particle, interaction condition
between S and SG: a corner between a particle
speed vector and a normal to a surface of S and
the interaction speed between SG and S in a meet-
ing point, and also characteristics of a wall of S:
thickness, density and hardness of material ac-
cording to Brinell. Output contour parameter is
UDP value assessment for a single-layer wall of
SC which can be interpreted as result for a two-
layer wall (protection with a bumper) provided
that S distance between a wall and a bumper is
close to 0 cm (Small). Such approach allows to
use the received results for training of the third
contour;
• the third contour of interaction results assessment
between SG and a two-layer wall of S. Data for
rules extraction include the same data as in the
second contour, but in relation to a wall with a
protective bumper. Input data are characteristics
of a particle of SG (drummer) - the weight, densi-
ty, the size and speed of a particle, interaction
condition between SC and SG: a corner between a
vector of speed of a particle and a normal to a sur-
face of S and the interaction speed between SG
and S in a point of a meeting, the characteristic of
IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018
Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 6 ISSN (Print): 2204-0595
Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731
a wall of S: thickness, density and hardness of
material according to Brinell, and also characte-
ristics and features of placement of a bumper of
protection: thickness and density of a bumper,
tension of fluidity of material of a back wall and
distance between a bumper and a back wall. Out-
put parameter of a contour is UDP value assess-
ment for a two-layer wall (protection with a bum-
per).
7. The principle of control (training) of KB in selections of
experimental data which contain both accurate, and fuzzy (in-
distinct) values of input and output variables.
Fuzzy model control consists in finding of such parameters
which minimize deviations between desirable and valid beha-
vior of model. At the same time it is sup-posed that the desira-
ble model behavior is set by the fuzzy training selection.
The illegibility in experimental data is not an obstacle for
the KB exact control. In conditions when available experimen-
tal data are set by fuzzy numbers the problem of fuzzy KB
control is carried out on the training selection with an accurate
input and a fuzzy output. In this case modeling accuracy in-
creases for fuzzy and accurate selection of data.
When experimental data for creation of rules matrix in the
"inputs-an output" for-mat are formed on the expert judgments
basis, the training selection can include fuzzy values of input
and output variables. For ensuring accuracy of the KB tuning
fuzzy selection has to be 3-4 times more, than accurate selec-
tion [9].
In a solvable task training selections are formed during
tuning fuzzy knowledge database.
The results of materials stability assessment of S structure
for influence of SG is used for tuning of the second contour.
The examples were created by results of interaction be-
tween SG and a single-layer wall of S is used for tuning of the
third contour.
So the training selection will include both accurate and
fuzzy (indistinct) values of input and output variables.
II. CONCLUSIONS
The problem of forecasting outcomes of dynamic interac-
tion between S and SG is difficult from a position of accurate
solutions.
Convenience of approach for assessment of high-speed in-
teraction between S and SG is defined by simplicity and de-
monstrativeness which are inherent in the mechanism of fuzzy
logical conclusion.
The formulated principles of building a fuzzy knowledge
base summarize and they are development of the known pro-
visions which define the solution of identification problems of
a difficult objects condition by means of expert and experi-
mental information.
Realization of the specified principles within the projected
intellectual information system will allow to solve a problem
of detection in real time the SG particles posing a threat of S,
to predict results of possible interaction for making timely and
informed decisions on operational protection, development
and design of active and passive protection measures of SC in
orbital flight.
The further direction of researches is development of the
procedure of training of multicircuit neuro fuzzy network on
the basis of realization of "generative competitive neural net-
works" mechanisms.
REFERENCES
[1] Gäde A., Miller A. Project: ESABASE2/ Debris Release 6.0. Technical
Description.Ref.
[2] Dobritsa D.B. “Theoretical and experimental assessment of firmness of
cellular panels of the spaceship at influence of meteoric and technogenic
particles” in Bulletin of the Tomsk state university. Mathematics and
mechanics. Tomsk. No 1(28). pp. 58–68 (2014).
[3] Protection manual. IADC-04-03.Version 5.0.Inter-agency space debris
coordination committee.Prepared by the IADC WG3 members. October,
2012.
[4] Rotshteyn, A.P. “Intellectual technologies of identification: fuzzy logic,
genetic algorithms, neural networks”. Vinnitsa, 1999.
[5] Protection manual. IADC-04-03.Version 7.0.Inter-agency space debris
coordination committee.Prepared by the IADC WG3 members. 19
September 2014.
[6] Shushura A.N., Tarasova I.A “Way of a task of multidimensional
functions of accessory of terms of linguistic variables” in Information
technologies and computer engineering, No 1. p. 39 (2012).
[7] Mironov V.V., Tolkach M.A. “The ballistic limit equations for
optimization of system of protection of spacecrafts against
mikrometeoroid and space debris” in Space equipment and technologies.
No 3(14). p.26 (2016).
[8] Novikov L.S. “Impact of firm particles of a natural and artificial origin
on spacecrafts”. Moscow. 2009.
[9] Meteoroid and debris models / ESA Requirements and Standards
Division. ESTEC, P.O. Box 299, 2200. AG Noordwijk, The
Netherlands. The ECSS document ECSSE-ST-10-04C (15 November
2008).
[10] Mityushkin Yu. I., Mokin B. I., Rotshteyn A. P. “SoftComputing:
identification of regularities indistinct knowledge bases” Vinnitsa, 2002.
[11] Nazarenko A.I. Modeling of space debris
[12] Kurenkov V.I., Lukashev L.G., Yumashev L.P. Assessment of meteoric
and technogenic danger of flight of the spacecraft. Samara. 2004
[13] Shtovba S.D. “Control of fuzzy model on the training selection with an
fuzzy exit” in Cybernetics and the system analysis. No. 3.pp. 26-32
(2007).
[14] Shtovba S.D. Design of fuzzy systems means of MATLAB Moscow.
2007.
[15] Ostreykovsky V.A., Bulgakov K.N., Mikshina V.S. “To development of
the generalizing model of representation of knowledge in systems of
support of decisions of the doctor” in Basic researches. No. 2. pp. 85-86.
(2004).

More Related Content

What's hot

A semantic framework and software design to enable the transparent integratio...
A semantic framework and software design to enable the transparent integratio...A semantic framework and software design to enable the transparent integratio...
A semantic framework and software design to enable the transparent integratio...
Patricia Tavares Boralli
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
IJECEIAES
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
S3 Infotech IEEE Projects
 
Data Science Solutions by Materials Scientists: The Early Case Studies
Data Science Solutions by Materials Scientists: The Early Case StudiesData Science Solutions by Materials Scientists: The Early Case Studies
Data Science Solutions by Materials Scientists: The Early Case Studies
Tony Fast
 
Activity Context Modeling in Context-Aware
Activity Context Modeling in Context-AwareActivity Context Modeling in Context-Aware
Activity Context Modeling in Context-Aware
Editor IJCATR
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
IJCSIS Research Publications
 

What's hot (14)

A semantic framework and software design to enable the transparent integratio...
A semantic framework and software design to enable the transparent integratio...A semantic framework and software design to enable the transparent integratio...
A semantic framework and software design to enable the transparent integratio...
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
 
IEEE Big data 2016 Title and Abstract
IEEE Big data  2016 Title and AbstractIEEE Big data  2016 Title and Abstract
IEEE Big data 2016 Title and Abstract
 
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
Advanced Intelligent Systems - 2020 - Sha - Artificial Intelligence to Power ...
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Data Science Solutions by Materials Scientists: The Early Case Studies
Data Science Solutions by Materials Scientists: The Early Case StudiesData Science Solutions by Materials Scientists: The Early Case Studies
Data Science Solutions by Materials Scientists: The Early Case Studies
 
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
 
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Activity Context Modeling in Context-Aware
Activity Context Modeling in Context-AwareActivity Context Modeling in Context-Aware
Activity Context Modeling in Context-Aware
 
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
Improved K-mean Clustering Algorithm for Prediction Analysis using Classifica...
 
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...
 
New books dec 2013
New books dec 2013New books dec 2013
New books dec 2013
 

Similar to Development Principles of Knowledge Database of Intelligent System for Estimation of Dynamical Interaction of Orbital Systems with Space Debris

COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
acijjournal
 
9517cnc08
9517cnc089517cnc08
9517cnc08
IJCNCJournal
 

Similar to Development Principles of Knowledge Database of Intelligent System for Estimation of Dynamical Interaction of Orbital Systems with Space Debris (20)

Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
 
1809.05680.pdf
1809.05680.pdf1809.05680.pdf
1809.05680.pdf
 
Demand forecast of PV integrated bioclimatic buildings using ensemble framework
Demand forecast of PV integrated bioclimatic buildings using ensemble frameworkDemand forecast of PV integrated bioclimatic buildings using ensemble framework
Demand forecast of PV integrated bioclimatic buildings using ensemble framework
 
Cost Estimation Predictive Modeling: Regression versus Neural Network
Cost Estimation Predictive Modeling: Regression versus Neural NetworkCost Estimation Predictive Modeling: Regression versus Neural Network
Cost Estimation Predictive Modeling: Regression versus Neural Network
 
Modelling and simulation methodology for unidirectional composite laminates i...
Modelling and simulation methodology for unidirectional composite laminates i...Modelling and simulation methodology for unidirectional composite laminates i...
Modelling and simulation methodology for unidirectional composite laminates i...
 
10 9242 it geo-spatial information for managing ambiguity(edit ty)
10 9242 it  geo-spatial information for managing ambiguity(edit ty)10 9242 it  geo-spatial information for managing ambiguity(edit ty)
10 9242 it geo-spatial information for managing ambiguity(edit ty)
 
PROBABILISTIC SEISMIC HAZARD ANALYSIS FOR SEISMIC RISK ASSESSMENT
PROBABILISTIC SEISMIC HAZARD ANALYSIS FOR SEISMIC RISK ASSESSMENTPROBABILISTIC SEISMIC HAZARD ANALYSIS FOR SEISMIC RISK ASSESSMENT
PROBABILISTIC SEISMIC HAZARD ANALYSIS FOR SEISMIC RISK ASSESSMENT
 
Spiking ink drop spread clustering algorithm and its memristor crossbar conce...
Spiking ink drop spread clustering algorithm and its memristor crossbar conce...Spiking ink drop spread clustering algorithm and its memristor crossbar conce...
Spiking ink drop spread clustering algorithm and its memristor crossbar conce...
 
Sec2003
Sec2003Sec2003
Sec2003
 
Performance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of DocumentsPerformance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of Documents
 
Classification accuracy of sar images for various land
Classification accuracy of sar images for various landClassification accuracy of sar images for various land
Classification accuracy of sar images for various land
 
s1756973715500080
s1756973715500080s1756973715500080
s1756973715500080
 
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
 
9517cnc08
9517cnc089517cnc08
9517cnc08
 
Application of Multiple Kernel Support Vector Regression for Weld Bead Geomet...
Application of Multiple Kernel Support Vector Regression for Weld Bead Geomet...Application of Multiple Kernel Support Vector Regression for Weld Bead Geomet...
Application of Multiple Kernel Support Vector Regression for Weld Bead Geomet...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
Multi-task learning using non-linear autoregressive models and recurrent neur...
Multi-task learning using non-linear autoregressive models and recurrent neur...Multi-task learning using non-linear autoregressive models and recurrent neur...
Multi-task learning using non-linear autoregressive models and recurrent neur...
 
Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...
Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...
Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...
 
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
 
A Review on Prediction of Compressive Strength and Slump by Using Different M...
A Review on Prediction of Compressive Strength and Slump by Using Different M...A Review on Prediction of Compressive Strength and Slump by Using Different M...
A Review on Prediction of Compressive Strength and Slump by Using Different M...
 

More from ITIIIndustries

Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
ITIIIndustries
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
ITIIIndustries
 

More from ITIIIndustries (20)

Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT Governance
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
Image Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningImage Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold Learning
 
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
 
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
 
Programmatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelProgrammatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based model
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow Detection
 
Core Bank Transformation in Practice
Core Bank Transformation in PracticeCore Bank Transformation in Practice
Core Bank Transformation in Practice
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
 
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
 
Speech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationSpeech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data Visualisation
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
 
Instance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksInstance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural Networks
 
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Development Principles of Knowledge Database of Intelligent System for Estimation of Dynamical Interaction of Orbital Systems with Space Debris

  • 1. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 1 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 Development Principles of Knowledge Database of Intelligent System for Estimation of Dynamical Interaction of Orbital Systems with Space Debris Paliukh Boris Vasilievich, Kemaykin Valery Konstantinovich, Kozlova Yuliya Gennadyevna Tver State Technical University TvSTU Tver, Russian Federation Abstract—In the paper, a principles underlying the construc- tion of an intelligent information system estimated results of the dynamic interaction of orbital systems with space debris is pre- sented. It describes the knowledge database model based on these principles which is the synthesis of theoretical and practical in- formation in the field of estimating the high-speed interaction of objects. Keywords—intelligent information system; space garbage; knowledge database; fuzzy systems; damage risk assessment Spacecrafts (S) are exposed to blows of particles of space garbage (SG). Therefore the solution of a problem of damage risk assessment and development of actions for its decrease and creation of protection systems of S against influence of superfast particles of SG is very urgent [12]. The main information about impact of SG on spacecrafts is given by ground bench tests with superfast blows application. Computer simulation is used as supplement. The main method of development testing is experimental superfast blow and its purpose is examination how S or its components will be able to sustain collision in space with SG. However there are certain borders of opportunities in this direction. There are difficulties with acceleration of large shells to typical speeds of collisions in low-orbital area of the near-Earth space environment. These restrictions reduce dam- age prediction accuracy from collision with average and small SG. Computer modeling serves as the connecting link between results of inspection of the surfaces which were really affected by SG in space and researchers assumptions and checks and calibrates the last. Models also allow extrapolating the data obtained in laboratory in the limited range to a wide range of conditions which cannot be reproduced in laboratory [11]. According to OST 134-1031-2003 "The general require- ments for protection of space means from mechanical influ- ence of particles of a natural and technogenic origin" (item 5.6), an resistance indicator of S to mechanical influence of high-speed particles of a natural and technogenic origin is its undamage probability (UDP). It is probability that it doesn't happen any "dangerous" collision of a high-speed particle with a vulnerable surface of S (n = 0) during time τ. PUD is calcu- lated on a formula: N n 0UDP P e− =≡ = Given that it is convenient to use GNP for operational es- timates of one element of a vulnerable surface, value is de- fined as: ex elN N S= τ where Nex is value of medium-integrated flux of high- speed particles with a critical mass of mex - extreme minimum value of particle mass of SG at which the considered element of a surface of S, m–2 ·year–1 is damaged (according to the ac- cepted criterion); Sel is the considered area of a vulnerable element of surface of S, m2 ; τ is residence time of S in SG environment - time of ex- ploitation of S, year. The value of Nkp depends on the critical mass of mex or, equivalently, the critical diameter of dex-particles of SG which cause damage to protection of S. It is expected that density of particles material of SG is known. The value of dex is defined with help of ballistic limit equations (BLE). BLE represent ratios for determination of the minimum di- ameter (the minimum weight) of the flying particle at which wall damage occurs. The specified type of the equations is called the efficiency equations. When it determines UDP, damage function is built by means of BLE of efficiency. It shows dependence of dkp on the speed of blow of V. The known BLE for a single wall are considered in [1, 3, 7]. To improve veracity BLE were modified with use of experimental surveys results and measured data which carried The research was done within the government task of the Ministry of Education and Science. The number for the publication is 2.1777.2017/4.6
  • 2. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 2 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 out on the returned elements of S, space stations "Mir" and the ISS, the Hubble space telescope, the LDEF (LongDuratio- nExposureFacility) satellite, etc. [2, 5, 7-9] . BLE are equated for multilayered protection (several walls at distance from each other with additional layers on surfaces and between them) allow to calculate thickness of a forward wall from blow, and the minimum thickness of a back wall without damage. It is accepted that a wall from blow of SG is called a bumper. According to the analysis of calculations results and expe- rimental data is shown that reliability of the analysis of protec- tion S against SG on UDP will be reached if BLE, which use at this case, are satisfied the following requirements [7]: • BLE have to include all optimized variables; • range of optimized variables change in BLE has to be rather wide. Thus, it is possible to allocate the following main problems inherent in a problem of forecasting of results of interaction of S and SG: • possibility of collecting a large number of data about interaction of S and SG and practical lack of their sta- tistical stability that calls into question trust degree to the models constructed by methods of probability theory and classical mathematical statistics; • insufficient reliability of representation of forecasting results in the form of the determined defeat functions because many influencing factors have the fuzzy nature and difficult formalizations for traditional modeling methods application. Within the conducted researches there is a problem of creation of the knowledge base of an intellectual information system which considers results of forecasting of dynamic inte- raction of orbital systems and space debris and is effectively applied in the conditions of uncertainty. KB has to conform to requirements of adequacy, completeness and consistency, and also accuracy and an interpretation of the received results. Mechanisms of its construction have to provide a possibility of introduction of new data on subject domain and use these data for maintenance of KB in an urgent state, including its timely correction (training). Existence of statistical data gives an opportunity to consid- er as effective tools of technology of the operational account- ing of data (OLAP) and their intellectual analysis (Data Min- ing): genetic algorithms and neural networks. Two aspects of information resource lie in the modern theory of the artificial intelligence (AI) at the heart of methods of the knowledge representation (KR) and representation of abilities: • mathematical formalization or logical completeness of the considered information object; • cognitive approach or understanding (percep- tion/interpretation) of process of awareness of knowledge by the person. The greatest distribution at practical developments in the field of artificial intelligence was gained by productional, frame models and semantic networks, and also a specific place was held by hybrid model, thanks to object-oriented approach of representation of knowledge [15]. For creation of knowledge base, the hybrid model of repre- sentation of knowledge in the form of a neuro and indistinct network formalism is chosen. Constructed, on its basis the neuro and indistinct network, is isomorphic to matrixes of rules (knowledge) and reflects the interrelations revealed in experimental data and has important human (intellectual) properties: representation of knowledge in a natural language, an interpretation of the received results and learning ability in real time. This approach application gives the chance to eliminate a number of the defects characteristic of traditional methods. First, fuzzy sets are convenient means of formalization of the sizes having the qualitative nature, and their application for formation of the fuzzy forecast is most acceptable in the con- ditions of uncertainty of parameters of forecasting. Secondly, efficiency of forecasting model and forecast reliability are great importance and they demand the choice of the corres- ponding methods for its construction. In this regard, genetic algorithms which realize the mechanism of random search and are characterized by the corresponding advantages (overcom- ing problems of a local optimum and "dimension damna- tions"), represent the effective instrument of design of indis- tinct knowledge bases by their extraction from experimental data. I. PRINCIPLES OF CREATION OF THE KNOWLEDGE BASE OF INTELLECTUAL SYSTEM The main idea of the evaluation is concluded in the follow- ing rule: "If collision happened, the damage caused to SG de- pends on the sizes and the relative speed of S and SG, compo- sition of their material, a corner under which the SG hit in S and degree of vulnerability of the place (component) of S on which the blow fell". From these positions it is possible to consider defeat of S as the problem of identification having the following proper- ties [4]: • it is necessary to establish dependence between input and output variables for evaluating results; • input variables are associated with parameters of con- dition of an identification object and conditions of possible interaction. The quantity of particles of SG and their characteristic taking into account features of S is initial information for determination of the ex- pected damage; • the output variable is associated with a condition of S after interaction with SG. Vulnerability (defeat) of S in a flux of SG can be defined as a combination of proba- bilities of elements undamage, taking into account im- portance (criticality) of everyone components • output and input variables can have quantitative and quality standards.
  • 3. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 3 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 • the structure of interrelation between output and input variables is described by the rules IF <inputs>, THEN <output> which use quality standards of variables and representing fuzzy knowledge base. Principles of creation of the knowledge base of intellectual system for estimate of results of S and SG dynamic interaction include: 1. The principle of the linguistic description of the used va- riables on an input and an output. According to this principle, inputs of an object and its out- put are considered as linguistic variables which are estimated by qualitative terms (a term - from English term - to call). The undamage probability of S (UDP) depends on the fol- lowing factors which influence on vulnerability of S is most essential and for which it exists real possibility of collecting experimental data. The influencing factors and the UDP output parameter with ranges of values and used for the description term-sets are shown in table 1. 2. The principle of use of one-dimensional and multidi- mensional membership functions of linguistic terms for the description of input and output variables. In compliance with this principle fuzzy variables with functions of accessory of one or several arguments can be used as terms during a fuzzy logical conclusion. It is connected with initial division of space of input va- riables into classes. Generally it is considered independent variables on an in- put which form set of not crossed classes. Each input variable has own input sets, it allows to use simple and evident repre- sentation of membership function (for example, triangular or trapezoid), and also to apply simple computing procedures when carrying out all stages of fuzzy conclusion. As applied to solvable problems of assessment of interaction between SC and SG, such variables are the linguistic variables connected with parameters of particles of SG, parameters of a wall of SC and a protective bumper. TABLE I. CHARACTERISTICS OF FORMED TERM-SETS Name (linguistic variable) Sym bol Variable range (uni- versal set) and its di- mension Term-sets of linguis- tic variable value High-speed collision parameters Interaction speed SG and S in encounter point, vn, km·s–1 X1 0…20 km·s–1 Low (L), Under average (UA), Average (A), Above average (AA), High (H) A corner between a particle speed vector and a normal to a surface, θ X2 0…±180° Small (S), Average (A), Normal (N), Big (B), Huge (H) Parameters of a SG Particle diameter, dp X3 0.1…1000 cm Small (S), Average (A), Name (linguistic variable) Sym bol Variable range (uni- versal set) and its di- mension Term-sets of linguis- tic variable value Big (B) Particle speed, vp X4 3…8 km·s–1 Low (L), Average (A), High (H) Density of the particle material, ρp X5 2.5-5 g/cm3 Aluminum alloy (Aap), Titanium alloy (Tap), Stainless steel (Ssp) Particle mass, mp X6 10-5 …103 t Small (S), Average (A), Big (B) S wall parameters Wall thickness, lw X7 0.13-0.4 cm Small (S), Average (A), Big (B) Density of the wall material, ρw X8 2.5-7 g/cm3 Aluminum alloy (Aa), Titanium alloy (Ta), Stainless steel (Ss) Hardness of the wall material by Brinell, HB X9 60-150 MPa Small (S), Average (A), Big (B) Bumper parameters Bumper thickness, lw X10 0.33-0.55 cm Small (S), Average (A), Big (B) Hardness of the bumper material, ρb X11 0.01-2.5 g/cm3 Small (S), Average (A), Big (B) A gap between a bumper and a back wall of S X12 0…6 cm Small (S), Average (A), Big (B) Value of material yielding stress of back wall, σw X13 130-540 MPa (N/mm2 ) Low (L), Average (A), High (H) Speed of S, vs X14 3…8 km·s–1 Low (L), Average (A), High (H) Undamage wall probability, UDPs P 0.5…0.999 Low (L), Average (A), High (H) However linguistic variables can have rather difficult physical nature demanding to use several connected sizes. For hierarchical systems of fuzzy conclusion, it spring up a certain degree of blurring that can lead to loss of the importance of result. One of solutions of this problem is use of terms of lin- guistic variables with functions of accessory of several argu- ments. Methods of fuzzy clustering can be used when multidi- mensional membership function is being formed [14]. The way of a task of multidimensional functions of acces- sory of terms of linguistic variables includes the following stages: • selection of linguistic variables and comparison of modeling subject characteristics to it; • collecting statistical data on activity of a model- ing subject; • fuzzy clustering of statistical data for each lin- guistic variable;
  • 4. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 4 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 • linguistic variable terms formation by giving to the received clusters of names; • formalization of functions of accessory of terms. [6]. As an example it is considered the linguistic variable "speed of interaction be-tween SG and S in a meeting point", including, "a corner between a vector of particle speed and a normal to a surface of S", "particle speed" and "speed of S". Linguistic variables terms are formed by assignment names to the received clus-ters. For each term it is set in tabu- lar form multidimensional membership function in the form of the matrix including arguments values matrix of Xi and a col- umn of function values which is the appropriate for term line of a matrix of membership functions Mi. 3. The principle of formation of structure of dependence "input output" in the form of a matrix of rules Matrixes of fuzzy conclusion rules are formed on the basis of empirical knowledge or experts knowledge in problem area, and they are presented in the form of fuzzy production of a standard look. Each matrix of rules of a look IF <inputs>, THEN <out- put> characterizes the revealed interrelations in the allocated set of experimental data on each element of a design of S. By consideration of a problem of interaction between S and SG it exists large number experimental and settlement data of the different nature and different in physical sense. In this regard it is quite difficult to find the expert who could create all necessary set of the fuzzy logical rules which are the basis for the fuzzy knowledge base as kernels of intellectual system. In such situation there is a need of the solution of a prob- lem of extraction of set of fuzzy logical rules which will dis- play in the best way regularities of communications "inputs outputs" on a set of the available experimental data, without participation of the expert. The solution of this task is possible by carrying out the data mining based on genetic algorithms of optimization [4, 10]. Set of rules IF-THEN can be considered as a set of points in space <inputs outputs>. Use of the device of a fuzzy logical conclusion allows to restore a multidimensional surface which connects values of an exit at various combinations of values of input variables on these points. 4. Principle of hierarchy of the knowledge base Interpretation and control of the received results it is con- nected with intellectual opportunities of the person on the li- mited volume of its random access memory. In this regard it is expedient to carry out classification of input variables and to construct on its basis so-called tree of a conclusion which will represent system of hierarchically con- nected contours of mini-bases of smaller dimension. Derivation tree for the entered input variables it is shown in fig. 1. Fig. 1. Derivation tree. Functional dependence P=P (x1, x2, x3,…, x14) which connected x1…x14 inputs and P output, are replaced with the sequence of substitutions: ( ) ( ) ( ) ( ) P P p1, p2, p3 , y1 y1 x3, x4, x5, x6 , z z x1, x2, x14 , y2 y2 x7,x8, x9 , = = = = where y1, y2, y3, z, p1, p2 and p3-the intermediate outputs considered as linguistic variables. Due to the principle of hierarchy it is possible to consider almost unlimited number of the input variables influencing assessment of an output variable. At creation of a derivation tree it is necessary to aspire to that the number of arguments (en-trance arrows) in each knot of a tree satisfied to the rule 7±2. Expediency of stepwise representation of expert know- ledge is caused not only by natural hierarchy of objects of identification, but also need of the accounting of new variables in process of object knowledge accumulation. 5. Principle of two-stage setting up of fuzzy knowledge bases. According to this principle, creation of model of the know- ledge base is carried out step by step (fig. 2) which by analogy with classical methods can be considered stages structural and parametrical identification. The configured settings are the weight of fuzzy rules IF-THEN and a membership functions form. At the first stage creation of a matrix of rules is carried out according to available information. In the chosen subject area there is no possibility of involvement of the expert who would simulate this or that object (process) that is connected with its complexity and a certain novelty and as a result that is con- nected its insufficient development.
  • 5. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 5 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 In this regard process of creation of fuzzy knowledge bases is organized on the basis of the available experimental data obtained as a result of a research. For extraction rules it is used of the known mechanism of data mining realized in genetic algorithms of optimization. As a result of creation of set of rules matrixes is formed the initial knowledge base. For ensuring reliability of the received estimates the second stage is provided at which training of a neural and fuzzy network formalism in examples, formed of experimental data. Fig. 2. Stages of setting up the fuzzy knowledge base. The essence of KB fine tuning stage consists in selection of such weights of fuzzy rules IF-THEN and such parameters of membership functions which minimize distinction between desirable (experimental) and model (theoretical) behavior of an object. The stage of the KB fine tuning is formulated as a problem of nonlinear optimiza-tion which can be solved by various methods among which the most universal method is method of steepest descent. However, at a large number of input varia-bles and fuzzy terms in the knowledge base application of a method of steep- est descent demands search of a minimum from the different initial points that significantly increases machine timetable. In work it is offered fine tuning of the fuzzy knowledge base with application of a method of neural networks training known as backpropagation [14]. 6. The principle of multiloop setting up the fuzzy know- ledge base for the objects having hierarchical structure. It is necessary to allocate the contours solving independent problems of assessment during modeling the difficult systems having hierarchical structure. Each contour has to learn independently. For this, it is ne- cessary to form the training selections purposefully on each subtask. In the knowledge base constructed for area of high-speed impact of SC and SG it is possible to allocate three contours: • the first contour allowing to estimate materials re- sistance of a design of SC to influence of SG. Da- ta for rules extraction and matrixes creation can include all volume of results of the carried-out bench, polygon tests, at the same time the firing angle of targets is chosen 90 °. Input data are cha- racteristics of a particle of SG (drummer): the weight, density, the size and speed of a particle, and also property of wall material of S: thickness, density and hardness of material ac-cording to Brinell. Output contour parameter is the received UDP value for wall material of S at interaction from SG on corners θ close to 90 ° (Normal). Such approach considers limited opportunities of the test bench on impact speeds (to 5 m/s), but al- lows to use these results for carrying out training of the second contour; • the second contour of interaction results assess- ment of SG with a single-layer wall of S. Data for extraction of rules include the known data on a picture of real collisions in space, results of ground bench tests and the analysis of defeat function graphs for single-layer constructive ma- terials S. Input data are characteristics of a par- ticle of SG (drummer) - the weight, density, the size and speed of a particle, interaction condition between S and SG: a corner between a particle speed vector and a normal to a surface of S and the interaction speed between SG and S in a meet- ing point, and also characteristics of a wall of S: thickness, density and hardness of material ac- cording to Brinell. Output contour parameter is UDP value assessment for a single-layer wall of SC which can be interpreted as result for a two- layer wall (protection with a bumper) provided that S distance between a wall and a bumper is close to 0 cm (Small). Such approach allows to use the received results for training of the third contour; • the third contour of interaction results assessment between SG and a two-layer wall of S. Data for rules extraction include the same data as in the second contour, but in relation to a wall with a protective bumper. Input data are characteristics of a particle of SG (drummer) - the weight, densi- ty, the size and speed of a particle, interaction condition between SC and SG: a corner between a vector of speed of a particle and a normal to a sur- face of S and the interaction speed between SG and S in a point of a meeting, the characteristic of
  • 6. IT in Industry, vol. 6, no.2, 2018 Published online 17-Apr-2018 Copyright © Paliukh Boris Vasilievich, Kemaykin Valery 6 ISSN (Print): 2204-0595 Konstantinovich, Kozlova Yuliya Gennadyevna 2018 ISSN (Online): 2203-1731 a wall of S: thickness, density and hardness of material according to Brinell, and also characte- ristics and features of placement of a bumper of protection: thickness and density of a bumper, tension of fluidity of material of a back wall and distance between a bumper and a back wall. Out- put parameter of a contour is UDP value assess- ment for a two-layer wall (protection with a bum- per). 7. The principle of control (training) of KB in selections of experimental data which contain both accurate, and fuzzy (in- distinct) values of input and output variables. Fuzzy model control consists in finding of such parameters which minimize deviations between desirable and valid beha- vior of model. At the same time it is sup-posed that the desira- ble model behavior is set by the fuzzy training selection. The illegibility in experimental data is not an obstacle for the KB exact control. In conditions when available experimen- tal data are set by fuzzy numbers the problem of fuzzy KB control is carried out on the training selection with an accurate input and a fuzzy output. In this case modeling accuracy in- creases for fuzzy and accurate selection of data. When experimental data for creation of rules matrix in the "inputs-an output" for-mat are formed on the expert judgments basis, the training selection can include fuzzy values of input and output variables. For ensuring accuracy of the KB tuning fuzzy selection has to be 3-4 times more, than accurate selec- tion [9]. In a solvable task training selections are formed during tuning fuzzy knowledge database. The results of materials stability assessment of S structure for influence of SG is used for tuning of the second contour. The examples were created by results of interaction be- tween SG and a single-layer wall of S is used for tuning of the third contour. So the training selection will include both accurate and fuzzy (indistinct) values of input and output variables. II. CONCLUSIONS The problem of forecasting outcomes of dynamic interac- tion between S and SG is difficult from a position of accurate solutions. Convenience of approach for assessment of high-speed in- teraction between S and SG is defined by simplicity and de- monstrativeness which are inherent in the mechanism of fuzzy logical conclusion. The formulated principles of building a fuzzy knowledge base summarize and they are development of the known pro- visions which define the solution of identification problems of a difficult objects condition by means of expert and experi- mental information. Realization of the specified principles within the projected intellectual information system will allow to solve a problem of detection in real time the SG particles posing a threat of S, to predict results of possible interaction for making timely and informed decisions on operational protection, development and design of active and passive protection measures of SC in orbital flight. The further direction of researches is development of the procedure of training of multicircuit neuro fuzzy network on the basis of realization of "generative competitive neural net- works" mechanisms. REFERENCES [1] Gäde A., Miller A. Project: ESABASE2/ Debris Release 6.0. Technical Description.Ref. [2] Dobritsa D.B. “Theoretical and experimental assessment of firmness of cellular panels of the spaceship at influence of meteoric and technogenic particles” in Bulletin of the Tomsk state university. Mathematics and mechanics. Tomsk. No 1(28). pp. 58–68 (2014). [3] Protection manual. IADC-04-03.Version 5.0.Inter-agency space debris coordination committee.Prepared by the IADC WG3 members. October, 2012. [4] Rotshteyn, A.P. “Intellectual technologies of identification: fuzzy logic, genetic algorithms, neural networks”. Vinnitsa, 1999. [5] Protection manual. IADC-04-03.Version 7.0.Inter-agency space debris coordination committee.Prepared by the IADC WG3 members. 19 September 2014. [6] Shushura A.N., Tarasova I.A “Way of a task of multidimensional functions of accessory of terms of linguistic variables” in Information technologies and computer engineering, No 1. p. 39 (2012). [7] Mironov V.V., Tolkach M.A. “The ballistic limit equations for optimization of system of protection of spacecrafts against mikrometeoroid and space debris” in Space equipment and technologies. No 3(14). p.26 (2016). [8] Novikov L.S. “Impact of firm particles of a natural and artificial origin on spacecrafts”. Moscow. 2009. [9] Meteoroid and debris models / ESA Requirements and Standards Division. ESTEC, P.O. Box 299, 2200. AG Noordwijk, The Netherlands. The ECSS document ECSSE-ST-10-04C (15 November 2008). [10] Mityushkin Yu. I., Mokin B. I., Rotshteyn A. P. “SoftComputing: identification of regularities indistinct knowledge bases” Vinnitsa, 2002. [11] Nazarenko A.I. Modeling of space debris [12] Kurenkov V.I., Lukashev L.G., Yumashev L.P. Assessment of meteoric and technogenic danger of flight of the spacecraft. Samara. 2004 [13] Shtovba S.D. “Control of fuzzy model on the training selection with an fuzzy exit” in Cybernetics and the system analysis. No. 3.pp. 26-32 (2007). [14] Shtovba S.D. Design of fuzzy systems means of MATLAB Moscow. 2007. [15] Ostreykovsky V.A., Bulgakov K.N., Mikshina V.S. “To development of the generalizing model of representation of knowledge in systems of support of decisions of the doctor” in Basic researches. No. 2. pp. 85-86. (2004).