JPRS ID: 9340 USSR REPORT CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP82-00850R000300040020-2
Release Decision:
RIF
Original Classification:
U
Document Page Count:
149
Document Creation Date:
November 1, 2016
Sequence Number:
20
Case Number:
Content Type:
REPORTS
File:
Attachment | Size |
---|---|
![]() | 7.64 MB |
Body:
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
3 ~ ~t a
~iUT~~~T I TE~H~~~C~~4'
~ ~~T~~E~ i~~~ ~~~U~ C~~ ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
- FOR OFFICIAL USE ONLY
JPRS L/9340
8 October 1980
IJSSR Re ort ~
p
CYBERNETICS, COMPUTERS AND
AUTOM~4TIUN TECHNOLOGY
- CFOUO 16~80)
FBIS FOREIGN BROADCAST INFORMATION SEF~VICE -
FOR OFr [f_'IAL USE ON~,Y
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
NOTE
JPRS publications contain information primarily from foreign
newspapers, periodicais and books, but also from news agency
transmissions and broadcasts. Materials from foreign-language
_ sources are translated; those from English-language sources
are transcribed or reprinted, with the original phrasing and
other characteristics retained.
" Headlines, editorial reports, and material enclosed in brackets
are supplied by JPRS. Processing indicators such as [Text]
or [Excerpt] in the first line of each item, or following the
last line of a brief, indicate how t}~ original information was
- processed. Where no processing indicator is given, the infor-
mation was summarized or extracted.
Unfamiliar names rendered phonetically or transliterated are -
enclosed in parentheses. Words or names preceded by a ques-
, tion mark and enclosed in parentheses were not clear in the _
original but have been supplied as appropriate in context.
Other unattributed parenthetical notes with in the body of an
item originate with the source. Times within items are as
given by source.
The contents of this publication in no way represent the poli-
cies, views or attitudes of the U.S. Government. -
For fsrther information on report content
call (703) 351-2938 (economic); 3468
(political, sociological, military); 2726 `
(life s~ier.ces); 2725 (physical sciences).
COPYRIGHT LAWS AND REGULATIONS GOVERNING OWNERSHIP OF
_ MATERIALS REPRODUCED HEREIN ftEQUIRE THAT DISSEMINATION
OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAL USE ONLY.
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR Ol'FIC:LAL USE ONLY
JPRS L/9340
8 actober 1980
- USSR REPORT
CYBERNETICS, COMPUTERS ANO AUTOMATION TECHNOLOGY -
~ (FOUO ~.6/80)
CONTENTS
HARDWARE -
~'TO T_zotimpeks Advertises Disk Packs 1
Expansion of the Capabilities of a T~letype Version of
the Elektronika-SS Microcompuzer Switching Syatem 2
' SOFTWARE
Program Testing Using Symbolic E~:ecution 6
APPLICATIONS
Automated and Aistomatic Control Systems 19
Collective-lise Computer Centers 67 -
Designing Collective-Uae Computer Centers 72
Standardization of the Planning and Design Solutions for
Various Categories of Computer Centers 85
Analysis of the VTsKP SLbscribera and Their Problems 86
Problems of Determining the Cost Benefit of the V'TsKP 95
Creation of the Collective-Use Main Computer Center
of National Economic Plan;ning and Control of the
Latvian SSR 96
Multicomputer Complexes Based on Older Models of the YeS EVM
[Unified Computer Syetem) 104
Data Transmission in Co1lECtive-Use Computer Centers 109
! .
- a- [III - US5R - 21C S&T FOUO]
n/1T nT1'.'IT n+ -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
' Organization of Remote Subscriber Access to the Data
Procesaing Syatems at the VTsKP 111
- Library of Algorithms and Programs ~or the VTsKP _
[Collective-Use Computer Centers] 115
Means of Formalized Description of the VTaKP Data 132
Automation of the Preparation of Production Based on -
Machine Tools With Digital Program Control at the VTsKP 135
PtJBLZCATIONS
Artificial Intelligence 137
1
' - b - -
FOR OFFICIAL USF O~II,Y
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
- FOR OFFZCIAL USE ONLY
Haxdware
VTO IZOTIMPEKS ADVr;RTISES DISK PACKS
R3ga AVTOMATIKA I VYCHISLITEI,~NAYA TEKHIJIKA in Russian No 1~, 1980 p 100
~Text] VTU IZOTIMPEKS DISK PACKS
Technical P~ameter Ye5 5053 YeS 526~. YeS 5269-type YeS 5266 YeS 5267
Capacity (Mbits) 7.25 29/58 2.?~5/5 lo0 200
Number of disks 6 11 1 12 12
Nvmber of recording ~ -
surfaces 10 20 2 20 20 ,
Track density (tpi) 100 100/20Q 100/200 200 1~00 -
Recording density
(bpi) 1100 2200 2200 1a1~00 1t1~00
Compatible with
IBM disk pack 1316 2316 541~0 3336 3300.11
Specification # 2864 3564 3562 4337 5653
Exporter: VTO IZOTIl~IPEKS
Sofiya, ul. Chapayeva, 51. Telephone: 73-61. Telex: 022731, 022732
COPYRIGHT: Izdatel'stvo "Zinatne", "Avtomatika i vychislitel'na~a tekhnika",
1980
- L412-PJ ,
CSO: 1863
1
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
EXPANSION OF THE CAPABILITIES OF A TELE~YPE VERSION OF THE ELEKTRONIKA-S5 .
MICROCOMPUTER SWITCI~CNG SYSTEM
~ Riga AVTOMATIKA I VYCHISLITEL~NAYA TEKFINIKA in Russian No 3, ?980 PI? 5~-51
[Article by A. G. Novik, manuscript received 26 Jul 79] f
[Text] The Elektronika-S5 family of microcomputers has a multilevel -
interrupt system. The microcomputer is provided with the standard softwaxe
and ~iardwaxe necessary to register and service interrupts in real
time. For this purpose a higher level 4~bit interrupt register (RPVLJ) is
provided in which one bit is reserved to d.isplay program interrupts.
Although the RPW processes a generalized interrupt named by the
program interrupt, its initiation ma~r also be hardware-generated. At
the ftPW level, inte~rupts are processed by microprogram. The general-
ized signal of the program interrupt is shaped on an AND-gate between
the 8-bit program interrupt register (RPR) and its mask. Interrupts _
at the R,PR level are serviced by programs of the teletype version of the
switching system (TVDS). For TVDS, the job is the program unit. A software
or hardware initiated job program is equivalent to the appearance of the
signal "log 1" in~one of the RPR digits. Up to Fight jobs can be handled
simultaneously, two of which are assigned to TVDS. Jobs have absolute
priorities. When a lower priority job is interrupted by a higher priority
job, execution of the first one ceases and the problem having the higher _
priority is triggered. Because the general registers are doubly addressed
memory cells, the basic information on the interrupted program is
automatically retained. The systems table containing the origin of in-
- cluded jobs is generated with the I}ispatcher.
To develop very flexible, structured program software for a control system
for technological processes, it is inadequate to have the six jobs '
standaxdly implemented on TVDS. To expand TVDS, each RPR bit is linked by
_ hardware to ~he program interrupt preregister (PftPR) from the S/0 channel
field of the microcomputer (digital inputs and outputs TsW). S~ai.tching
by external computer coupling makes it possible to produce such a
connection and also process pulsed initiation signals coming from the
~ control object. Each bit of any of the six PR.PRs identifies tY~e =
independent sub-task initiated by the program or by the hardware (hardware
, connection of jobs is realized by extA~^r.;.l connections). At the pre-
register level, sub-tasks have a re 2ative priority in sequence. The
FOR OFFICIAL USE ONLY ,
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
c~~. ,~~..,eo.,~. ~ 1 ~ .
(2) a,sv (3)
_ct,.~ rte _ ( 4 )
`r~� ( 5 )
, n�~ ~ ~r mn, ~aw ~ars ~rsa
~6 ~8) ~g) ~1~) ~11)
I
A~~^~ 2
_ ; P,r(13)
nmt (1 ~om~a t 1 ~ ~
~p~e (16 )
- naunqo
~ 18 So~a 370 �
Figure 1. Structural diagram of two-rank interrupt system and its control
system. [Key: 1. generalized interrupt; 2. reserve; 3. RPW, WV; q,
_ console; 5. RPR; 6. PRPRl; 7. PRPR2; 8. PRPR3; 9. PRPR4; 10. PRPR~; 11.
PRPR8; 12. controller; 13. PRP; 14. PRPRi; 15. job i; 16. interruption; 17.
monitor; 18. job ZPRi~].
system can contain up to 48 jobs in all (with a TsW register 8 bits in
length). Sub-tasks of a single group do not interrupt one another, but are -
executed in sequence, because to retain current information in interrupted
programs it would take about 1.5 kbytes of main memory_ Interruptions at
the level of the preregister are serviced by a re-enterable "r[onitor"
subroutine which accarding to the number of the initiating control job,
information in the preregister and data in the systems table of preregister
jobs transmits control to the corr.esopnding sub-task (Figure 1). This
_ approach was used i~n [1] .
The process of elaborating program software boils down to specification of -
program modules which realize independent functions and their connection
into the system. In some cases aith logically complex and branched
technological and computer algorithms it may turn out *h.at 48 jobs are not
enough. In that situation, program and hardware supp~rt of interruption
processing may be supplemented by yet another level ~of processing. Each
PRPR bit is ~onnected to the lower level interrupt preregister (PPNU) from -
among the remaining free digital input/outputs. For a different ap-
plication it may not be mandatory to connect all digits of all PRPR to the
corresponding low level registers. The maximum number of sub-tasks for the
Elektronika .S5-G1 micre;,omputer with all possible connections to the PPNU
3
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
- --~~r+ \JVU Vl\L�
~u~Fyr.ear ~rpddow,e ~ 1,
~2~ ~x ~''~ae~3 (4)
~ (6) ~ ~(5)
~xrm, r ~ ~
- O /17NM ~
I/iMIR /YM/JJ' - - - - � /17hNJ/ N7/Ndit
l~l
/uer~rnrarp
i F"p ~ 9 3a~a i 1~
~i
/'~7rrumr~o
/YNNir l,
~ 1 abva !/1P i~
_ ` C~~,~ ;
(14 ~ loci~w S~Io 1.
Figure 2. Structural diagram of three-rank interrupt system and its
controi system. [Key: l. generalized interrupt; 2. reserve; 3. RPW, UW;
4. console; 5. PRP; 6. PRPR1....; 7. PpNU 10.....; 8. controller; 9. RpR,
- PRPRi, PPNUik; 10. job i; 11, monitor; 12. job ZPR ij; 13. supervisor; 14. '
job ZPR ijk).
_ !
is 384, while for the Elektronika SS-02 modification it is 1,536. These ~
computers have different TsW capacity: S5-Ol has 8 bits, SS-02 has 16 ~
bits.
For distributed computing systems based on mi.croprocessors and multi- '
processor complexes with many initiating signals, the three-rank structure ~
of the interrupt system is most acceptable (Fig. 2). The systems table for i
low level jobs may be only partially filled, because the presence of all
sub-tasks is not mandatory and is defined by the user in the development of
program modules. If some jobs are not fitted in the system, the initial ~
address of the program trap which ~vill return control to the Supervisor
should be put in the a~propriate line of the job tab?e to increase i
re'.iability of program support.
_
- From the standpoint of a standard TVDS Controller, the two systems
described do not generate new problems at the control level, but specific
subroutines from one of six high level problems. This difference is hidden ~
from the user in the internal organization and structure of programs of ;
interrupt processing. He is given the opportunity to operate with jcbs
having preset priorities and established service discipline. ~
The principle of modular programing for the Elektronika-S5 family of ~
~ ~
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
microcomputers is realized by expansion of TVDS with re-enterable programs
which may be masked in peripheral memory and be entered into the interrupt
processing system by assigning the proper addressses in the control job
origin table.
= References
1. Izakson-Demidov, Yu. A., Kallistratov, V. A., Novik, A.G.: Design of
an automated control system for large electrothermal installations
based on the use of microcomputers. Mat. seminara "Kiberneticheskiye
- problemy ASU tekhnologicheskimi protsessami", Moscow, 1978 pp 58-64.
COPYRIGHT: Izdatel'stvo "Zinatne", "Avtomatika i vychislitel'naya tekh-
nika", 1980
[ 399-8617' ]
8617 -
CSO: 1863
~
5
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2
FOR OFFICIAL USE ONLY
Software
UDC 681.3.06
PROGRAM TESTING USING SYMBOLIC EXECUTIO+~
Moscow PROGRAMMMIROVANIYE in Russian No 1, 1980 pp 51-59
~Article by Yu. V. Borzov]
[Text] Program testing using symbclic execution is
discussed. Efficient automatic systems for testing
programs are surveyed. Problems in developing them
are d~scussed.
From t?^e iiistory of Automation of Testing
The first s teps in automating testing were attempts on machine generation
of tests us ing descriptions of the structure of the input data. This was
_ done as ear ly as in 1962 by R. L. Sauder [1], and then developed later by
H. T. Hicks [2], K. V. Hanford [3] and others. However, in these cases
the tests only externally resembled (in their f~rmat) the data that the
program was compiled to process. Specific test values were usually gene-
rated randomly, and therefore, there was no guarantee that the generated
tests would pass through all the branches of the program. Practice showed
that this approach fo;,nd effective application in debugging translators.
This is also indicated by the use of this approach in the USSR in RTK [ex-
~ pansion unknown] technology [4]. This approach was not used extensively
in programming other types of problems.
From another aspect, development focused on systems automating individual
functions of testing. Systems were developed to gather statistics on the
program tes ted (number of executed statements, maximum and rniniteum values
- of variables, execution of defined � relations between variables, etc.)
[5-12]. Some systems could automatically determine the conditions that
the input d ata had to satisfy for the program to execute a given path
- [5, 13]. Systems [14, 15] produced a set of paths of the program, that
_ contained all branches of the program in the aggregate. ~
;
~
All this information could be usefully exploited when compiling tests, i
which, however, had to be conducted manually.
'
~
I
6 ~
FOR OFFICIAL USE ONLY i-
i
I
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2
'r'OR nFcICl'~1L [iSF. ONL~'
Finally, in the mid seventies, several groups independently and practical-
ly at the same time developed experimental testing systems using symbolic
execution of programs. Some of them had the primary goal of full automa-
tion of generating tests [13, 16-24] (in the process, the tests had to pur-
posefully and adequately check out the program, in contrast to randomly
generated tests). Others tried to look at the operation of a program -,ot
in a specific test~ but in a whole clas s of them. The ultimate goal of
this execution is to define the corres p ondence between classes of input
and output data [18, 25-27].
Every programming language has its execution semantics describing:
a) the range of definition of program variables (usually these are numbers);
b) permissible operations on values of the variables (addition, subtraction,
etc. of numbers); c) and rules for transferring contrel during execution
of the program.
It is also expedient to define the so- c alled semantics of symbolic execu-
tion, under which formulas on symbolic values are produced ~s the results
(one can say that ~ve are thus replacing arithmetic with algebraic calcula-
' tions).
Symbolic Execution, Type I. Let us cal 1 a path the finite sequence of pru-
' gram statements a~, a2i a~, ak+l, if for every i(1 5 L/~ k) ,
- transfer of control from-Q;~ to a+l, is formally possible.
The goal of the first type of symbolic program execution is to determine
for a given progr~m path what conditions the input data has to satisfy su
that control is transferred precisely along this path when the program is
executed with this data.
Example. Let us assume the program ~
POWER: YROCEDL'RE(X,Y); i
Z = i; 2
J = i; 3
LAB: IF Y~= J THEN 4 -
DO;Z=Z. X; 5
J ==7+1; 6
GU TO LAB; FND; 7
RETURN(Z); 8
END POWER; 9
Let us examine what conditions the inpu t data must meet for the path 1, 2,
3, 4, 5, 6, 7, 4, 8 to be executed. Th is can be tracked if after execu-
tion of each statement we record the va lues of the program variables and
the relationships between them (let us call this the status). Then the
initial status will appear to us like this:
- a) values: X^ al~--y ~ a~~ ~ and J are not initialized;
- b) relationships: none.
7
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300040020-2
FOIt OFFICIAI. USE ONLY
Here ai and a~ are symbolic designations of the input data. Given below
are the statuses after execution of statements 2, 3, 4, 5, 6, 7, 4, 8:
2- a) X= a1, Y= a=, Z=!, J is not intialized, b) none -
3- a) X= al, Y= a~~ Z= i, J= i b) none
4-a) X=al, Y=aY, Z=1, J=1 b) aa]1
5-a) X=al, Y=a=, Z=1~ac.~, J=1 b) a~]1
~G-a) X=al, Y=a~, Z=1+al, J=i-}-i b) az~i .
7-a) X=al, Y=a=, Z=1�a1,J=1-}-i b) as~l
~ 4-a)X=a1iY=aa,Z=1.a1,J=i-}-i b)az~i,aZ
b 3 a~ o a o o~ a a~ v o q 3 0~ cd
a~ v+~ G s~ ro v a~+ v, 3 0 c~
u o w.n m a~ oo ~ a~ ~d a~ o a ~n ~
0 0 ,~u~~n v~q~ ~~u.-~
1+ a.i tn a tn w Rf ~i G G~ cd cd �~i co ~ o ~-1 Cl �~I
a G ~ o,~ u~ a~ 6 w~~+ ~ ~ a~ m
u~ c~ u~ s~ o v o o s~ a a~ ~n .n .n ~ cd
a~ q i a~ u a~ ~ ~ a~ v.c u o,~ a~
a a+~ a~ a.~ 3 u~ cd ~ ~ v ~ r..+ ~n ~ m~+
o o�~, u~ ~ ~d ~n ~d cd ~d b ~n a w G
N ~ GJ t!~ 'Lf t~.i E3 Ci Ol L+ t3 ~ O O O cd _
~d ~ v ~ ~ v a~ o~+ a a~
> ~ G o o .o a-+ q a .c oo w
v v~ 3 y o~,~ ca 3 � c~a o010 w ~ a~ p o
N~ ~d ~ S~i ~ 1J O Ql 'b (3~ W�I"~ f~ O O J-~ Cl
a s+ ~n a~ cn u,~ v a~ a~ o~ u > cs
o a~ ~ q.C a~ ~ a a~ a~ v~ ~o
~.c i a~ ~a o~~o on s~ ~n v, a~ ~ o~+ a~
v,.~ ca a~ i,., m a c~ ~ b~ ~n ~ a ~n oo q
a~i~~>,o i m a~oo~�+`n a`~iu-~a~ip u~i~+~c"d wos.�+~,
A w ~n v~ ~ o~ a,-~ a~ A o~�~ ~ oo a~ o+-~ a.c
00 ~ ai ~N ~ i v~
i v ~ i ~ v a .u
ca v~ a~ o�~ a~ m ~ v, ~ oo a+
~ cd ~ ~ ~ a~ o ~ q w o
.n ~n a ~ cv ~ ~ .q a ~I ~n D a
o o~ o o~d c~ 3 a~ o a ~n aa
w p cn b u~ o w s~ a.+ ~ u s~ ~ o~ w ~ ~n G a '
G' 4J Gl ~r~l O~�J `r~ 'U Gl 1.~ 1 N P4 cd "d ~d W
H 1.~ 00 �rl S-+ ~�J P+ 'U C'+ 'U Ci W G1 r-i S-~
_ t1~ ~ r-I O u O W~.~ R1 Rf O W tY, pa H=g ~
t~A ~U pa, U a ct1 GU) U~ P+ O~ N P~a Gl H
~-I ~ ~ ~ u~ w r-i ~7 q ~-I ~ ~ N I ~ b I ~-I I -
s .n a~ � o aa~ ~n ~n~n �+~a a �.na
- ~ o~+ a ~o v o~+ v a r-+ ~ ~n c~ ~ a � r~ a ~ o a
- r-I ~.7 tA p.i N b0 ~ CL ~ N~d ~0 U1 fA C1: 1.1 `-i N U~ N W`~ N p. ~
� � �
r-I r-I r-1 r--I r-I r-I
119
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
a Vl\ VL L' iVt[~L~ V VL~ VL\IJL
~
~ 1"~ ~ w^'
^
~ r'i ~ JW
~
^1 ~ ~ ~ rl ^ W
V/ ~ ~ ~
~ ~ ~ ~ Y1 W ~
~ 1~ M
~7 I I I ~ ~ ~
~ N ~ ~ ~ ~
~ p+ ,7+ 'J+ ~ _
~ ~ N ~ ~ ~
M A A A A A A
b0 tn _
~ y~ ~ ~ ~ r~l .C 0~0 1~.~
p U1 N 4a O G) 'd t~ t~ q.~"'.
S.~ �r~ ~ O G U N c0 O Gl
rA ~ O~+ a.? '-I �rl O'~7 ~ N~i 3~+ E] q
~ ~ w~, a~ o u~ a a~ ~v o. ~
a~ a o ~v G cn o ~ ~a
t-~ 'L7 71 [~r 1~1 ~1 Gl R~ R~ 1J ~ Gl fn f-I U(~+ f-1 w Cd
,n a~ a~ a~ ~ u s~ a a~ o o -
o q ~ .n ~s ~ b o s~ ~e ~ m q
~v a o ~ 3 v a~ u v o.c v a~ ~n
a6a~ ou ~ ~a~ ~
~t ~ a-a w a~ v .N o ~ oo b .a
a~ ~ ~d a~ o o ~d ~ ~ > s~ a~ v~ .N b ~
~ s~ ~n ti a.~ a~ on o a
~ ~ ~ a~ o ~ v w ~a .u ~ b ~ ~ w
o q~v v a o a~ a o ~d a~ a~ a~ a o
~ .'7 O �1"1 .S: ~U ~1 1J -f++ .L"+ 1J ~I p+ "
G~+ U.L" N'd ~-1 1~ r-I r'~ N L+ �r'1 1.1 R~ �r~ 1J ~"~i U~
~ou,., .~v ~+~no aa~ ~u o a~~ ~n
o ~o a~ ~ w ~s p o ~ ~ c~ ~ u a~ o
a~~ s~ ~ o o~u a~ ~ o co u a~ b 3�~ ~
a~ ~ G s~ cd o u~
N O,C ~ H O O Sa v~ O O�~ 'd af O cd U r-1
x w~ ~ a a, u~, w s~ u a u u~ a w a~ a
m w ~ a~ b m a.+ ~ cv a~ m
~v a~ a �d ~d ~ p a~ w~ b ~n b b ~d o on
v ~n u a~ o a+~ ~ o u v~ o v~ o+~+ a~ a~ u-+
~ a~ ~ a~ ~ w o ~c o ~ b s~ w ~ .c
- oo v~~ oo v ~ q~+ ~ v oo ~ a~ u ~n oo ~n b _
o ~ ~ ~i a~ o ~ a~ oo �~t ~ b cd ~ p
~n ~ ~n cn m ~n ~ o ~1 a a y cd 3~ �~1
e) .C Gl 7, a1 w~ U~ al ~ o~ cd N~.C ~j tn cC ~rl N r-I O~
A+~ Sa .a A O tn ~'c7 cC c~ .-i ~-I q cd w ~ u 4-i A CL ua .o
~
I
~ 1.i bD 1~ U
,~'F~' O t~ C O ,-I ~ O �rl 4+
~n ~n ~ o~+ a o a w ~ a a -
a~ ~v w o
" ~,a~i ``''oa.�u~~ ;~a ~uar� a _
p� a~ w ~n v,~ a~ a �-a ~ a ~a = v~ w..
u m a~~d v cn s~ x a�~, p, b- o v oo : a ~n
a a ~a N H - H _ o ,--i ~ - a ~ a H
c~ ~ m ~ ~d m _ - x o o a _ ~
w o r~ a~ i a~+ i ~ ~ � i
� w � a o r+ a
~ vic~n~aNi ~ ~c a~ o`~o~ ow ~~a ~ob qa rn cdw ~ oa
N~~ 3 N~ Q R) N~~ N~ V~ N a~ N~~
~ . .
- r-I .-1 .-1 ri e-I r-I _
120
FOR OFFICIAL TTS~ ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300040020-2
FOR OFFICIAL USE ONLY
~o
v
~
~ _
~
~ ~ i ~ i ~
~ ~
~ ~ i ~ ~ ~ ~
~ ~ ~ ~ ~ ~
~ ~ ~ ~ ~ ~
~ ~ ~ m cn
m
O
O
~ A A A A
~ w
0 A
~ ~ N cd r'~ ~ N ~'b
~ y~,~ ~ ~ 'u ~ ~ I ~I
~ ~ U ~ O ~
~.v~ ~ ~ aao~+ a~ o~~wa~iqa w~~n
oGa..~ ~+o~ o~c~~v~ o-~~+
w c~o q c~d ~ C1 p a~ b~a. N~ S~-+ a G o p v~ ~ q~�~
o~ q a+~ o v o u~ oo a~ v o~
m ~ cn o a~ ro q o ,n ~ ~ y ~ a
0o a~ a~ u v q a~ w~' a~ o~+ ~ ,c ~ a
m o u w~ a oo ~n a~ ~ o v~ o~v p
~ N~ cd o c~ o q a~ u~ n~ 3 N~ N
~
~ ~a~.C+~~+ o~ob~a~ aa
i.~ W 4I .C 1.~ O O U C
i GJ i-~ h0 U,L~"
Cd N,~ i.~.~ 00 C+ f: t~ .A W r-I ~d ~ p C) ri 1~
~ a,~ a~ G a~ ~d a~ cd o ro o a~ a~ x as
a' ~ w o ~ v~o .o v ~ u�~ ~ u.c c, 3
a~ q a o u G ~ ~ cv cd
00 ~a W q~ td ~ ~ cd ~~-i ~ Gl d 00
.C 4-~ ~ N cd R1 rl ~ O Tl r-I b0 N rl CL W O
~ O[+' . L' 1 r l C~" O N .C 00 �rl O+~ O ~r~ ~ O U r~-I i
Q. �rl .C aJ C: ~�1 N ul r-I S-~ N U 0 W
~ ~ ~n ~ ~ U a, ,x ~ ~d ~d ~ c~ N u-~ N
o q+~ oo a~ s~ u s~ ~ a~ v a~ o o a~
w a~ ro a ~n o.. a w o~~v ~d ~~dy a~ ~ o u
F~ C7 '1"1 �f'~ 4-1 OD 'Lj O 4-1 ."y O Fa 1~ rl ^ IJ R~ ~1 C"+ O fn
~d a~ ~ o o~+ ao a., a..~ w cd u ~n o~+
c~, a~ s~ a b�~ cn b u a a~ ~ u~ ~ N~~ b�~ a a~
�rl ~rl H O 3a 4J 3-~ t3~ �rl N U �r-I cd O 4-1 1~ w R1 rl 1J cU Gl i.~ tA
r-i ~ N 4J N f..' O 71 q~d OJ U~' 4-~ O N tA �rl i-I tA �r~ q cd p R1
a v~ ao ~v p, oo ~ s~ u~ x~ cc ~ oo ~ o..C
a a~ a~ v G ~ a~ ~ ~ a~ �v a~ �v m~ u a~ g ~ v o�~ u
b a N cn p~C cd cn ~ o cr o~+ 3~ cd y,..,
A ~ ~v-~i ~ a ~ o a~ ~ ~ ~ G v`~i ~ A ~ ~ a
i ~
u� a~o a ~ 0�
q ~ ~
i-~ U R1 'r7~ U ~r-I (r" 1~ ~ 1-+
w a~ a~i a. ~v .c ~ . a~'i ~ ~ o
a na a~ a u~ ~ ~ u a o c~
a+~ o a x a a~ a ~d o a o ~
v ~ a ^
a
a ~ ~ ~ ~ H ~ o ~ ~ .~n ~ u _ ~ ~ ~
ro o o ~
r-i ~ ~n ~ ~i ~ ri ~ a, aa ?ri ~ a a~.~ ~c a. = a
~ ~ ��~o ~ ~ ~ oaw ~ooaa ~b aa ~a~ aoa
N iJ +J U N U N N Pa ~ N~ i pa.i ~ N~ y ~ N~ v
*-I r-I ~--I r-I r{ ~
121
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
r~a ~rri~ieu, ua~; UNLx
~
i-
~ ~ ~ ~
~r1 1 ~ ~ ~ ~-1
a aa., aa., a
a~ o0
N ~1' ~t N ~T N
~t M ~O ~D ~O ~--I ~ ''-I
~ N N N Cl ~ 41 ~
~ ~ ~ a
~
ch A ~ A A A'd N q A I A A ~ `
a
~
~
w a~ ~ a~ a~ ~n o a~i o o ~ o -
v�~ ~ ~y ~,~~u .c~~v~ a~+~ a ~~a~
N U a.~ O b0 ~ q c0 O c0 ~ O
..C ctl N.C ~ q cd W~ b0 r-I N U�rl O V ~ W~~i-i
~ ~ a~ o o ~ a ~ o0 0
a a~ s~ u~ ~ v~ a~ v b~~ u, o~, a
w v cd ~ N ~ u f~ o y~ N�rl q .a
O N�r-I 3 4-i O cd N 1~ 4-r O cd cd af W O A ~
.C !n tA O O W �ri 'd O~rl ~ 3 c~ O ~j O~rl O cA a.?
.-I u G' r-I 41 U�rl ~ b0 'r~ 1~ a~ E3 ~ ~-1 J~ 1.~ �rl ~C Ci
O O~d U1 t".. U b0 ~d q U1 U q U 4-+ Gl O~rl O cA C: U N Cl
3-~ ~ U H~ O R! N E3 .f i N O 4+ O~.' 1~ 4-~ Oi O f~ cd S-+
~n y o s~ o a o a ~ ~ o ~ ~ ~ ~ ~d ~
~ a~ ~ G.~ eo a.i ~ u u~ ~ w a.~ c~ q�~ cr v-+ h~4 ~
o~+ G v a~ ~d ~ a~ a~ ~ a~ ~d
u a cd u s~ cn ~a ac ~ a~ oo a~ ~a .a ~ oo s~ q on s~
b ~a oa~ .x+.~ ~n o~q u~q o~ a~ou
a~ a~ ~ v 3 ~ a~ u a~ o : ~ ~ a~ q ~ ~ ~ ~ � ~ 3 ~
.c u ~ ~ a~ ~n 0 3 ~ ~ ar ~f a .n ~ a~ b
o a,~ u.a cd x.~ G a �~I b cd q u cd ~d N o
S-+ ~ r-I ~ O �d 3 ~ ~ cJ ~ .a rl cd ~ ~ 3~+
a~~ a~ a~ o~~ s~ w a~ c~ s~ o o ~n o w~ a .
c~ o o�~ .C .c o 3+~ o o+~ ~n o u s~ w a~ ~d o u o
w v ~n u.n cd w u q a~ a-+ u a o o iE .n a-i u ~+-i w~
u N v~ ~U ~n a~ c0 ao ~d w aJ cC o~
'b ~.C ~C 3-i i~ 4-i al 41 b~~ N cd b cd "l7 'd �rl
a~ ~s ~n a~ o o u a a~ o~ q~+ a~ o~ ~ ~ ~n b~.+ a~ oo a~ oo u
q,., o.~ w u o G~ o o ~ G a~ a~ ~ q G cd s~
~ ~ ~ v, N oo ~ u ~d ~u ~ ~ ~ a~ cd ~7 ~ ~ N
a~'i o �d G a,x u a~ ~n a.~ a~ o �d ~ ~ a b~
- ~n u G a~ N o ~ G v, a o0 5C u, N~ ~ N m ao m v, a m cd
a~ u a~ m�~ o cc a~ ~ a~ a~ ~ o o cn G.C v a~ v o 0
A c~ q+~ o p u u.n A~-, w o A..~ 3 q~ ~ N,-~ ~ A.~G A�-I u
N I r1 I ~ ~ ~ ~
�r~ ~ ~ Li ~ �rl
~ p~`',,, u~i o o u ~ a
u u~d q c u~c a, ~ a u a a
c~ = u G o m u,-~ a ~d a u cd cd ~
wa ~,a ~ a ~ ~ ~
~ v�'i ~ ~ ~ o ~ a+ - a - '
� o ~ c~'d tn N �a � 3~ � ~
r~ ~ a0 U F+ O~ ~ O~ '-1 _ N - c*1 ~
r-1 ~-I ~ rl 00 r-I N W r-I d0 R1 N rl N b0 N'Tql bD N~
N$ N~ U O p~.i N~~ N D N~ N cd r~l N CL
. �
~--1 r-I r-I ~--1 r-I ri ~-I
122
FOR OFFICIAL TTSE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2
FOR OFFICIAL USE ONLY
~ ~
~
w
w r..~
0 ~1
w
~ ~ ~ ~
~ ~ V .0 -
' ~ N 1~ ~ e-{
~ UJ ~1 pCh,~ \ V1
D+ Ci F~+ P4 f~ Ci
~
~
~ ~ ~ ~ ~ ~ ~ -
N ~Ol ~CJ y y ~ -
~ ~ ~ r~'~ ~ iJ+
M c/] t/I (A C/~ fl~ V]
A A A A , A A
cA I N N O q .rl
u W 1~ 'd p~ q cd ~ p
c~d ~
i.C ~ ~i~-i Q E3 ~q r~i O b0 F3
G a-+ ~ o ~ ~ a ~u a~ a~ ~ a~
u~ u co a~ m ~ a~ ~-I .u u ~n o~-I
'Ly s~.~ cd cA N D 1~ N~ O GO O D~ N 1~+ ~'C G~l q O~--I
r-I �rl U N.C S-~ H JC tA C~' ~ Ul F3 Rf �rl O ri O F+ cd
ro.a 3 w~ a a~ a~ a.+ a~ a a~ �v 3~+ .c ~ a ~
~ o s~ c
n ~
n u a ~ ~ a o~
U) 41 d0 N N W r-1 ,C O 4-1 O N N tA ia U Gl fr'
~ ~n ~ a v, ~n ~ s~ w o~ o~+ ~ a~ u-~ a~.~
cd m~ a~+ q~ c~ o ~ cn cd v~ o ~~'~Jc ~
~ cv ~ ~ a~ ~ ~ oo ~ ~ ~ u v ~ a~ a
a ~ o ~ ~o ~ o ~ o o ~ i a~ w oo ~
b ,n ~ o s~ ~n ~ ~ u o a~ a ~ ~ G
Ul .f., CO q O R1 V] F+ �rl 1.~ ~ r-I 1~ H P i-~ ~ O hi N U
- .L" cd CJ O 3~+ �~-I ~ GJ 1~ 'b r-I i-+ ~'tf ad �rl GJ 1.~ b0 t! 'J .C ~
~ .n a v ~ o ~ o o ~ a~ ~ ~ c~ ~ ~ �o
_ m a~ ~ q u�~ ~ o,~ o ~d G~ ~ a~ o 0
- v~,.+ u a~ ~ o m u m u a~ ~n w~+
xrdG ,~vv~ ~o ~ v ~n oa
- ~d ~d c~ ~d q o a~ o o ~n a o~c a a~ a~ o ~
~ a~ o q.~ cd u~.~ ~r v o.a ~ ~n w v+-i a-~
~ a s~ v on ~ ~d ~ ~ o .c o 0
u oo a ~ A a~ s~ a-, w cd c~ cd ~ ~ 3~,
rl G~ r-I �ri .C OD O O O N O'U 4-+ ~ O J~ tA Mi r-{ i.! p
N R1 -ri JC r-I O i~ W ~rl W.~'.~ O.C O 4-I cd I O'i7 C'i O
CJ 1.~ id cd fn ~ �r-I tA r-I R! U 1~ r-1 ,L" i-~ C O rl
I-I �rl R! 4-I r-I T1 A GJ ~0 'b U) p .7 'd bA '-I a.1 i.l cd U JJ
O R1 .C U O~-I O~-I GJ O~ b0 Gl m U cd ~tl ~ p cd O q cl1
1J b0 ta 1.~ a O �rl C: tn u' i-~ rl ~'i A O.~". Gl 3-t
- u~ ~ GJ N F+ b0 a~ O O b0 Gl G) .a H b0 ~ N U O.C cd
v o �d ~ v,., u m u~ c~ q v a
U1 O.L"~ O V! A~ri O N~ N i.~' GJ i-~ ~.Li 1~-~ Gl r-I N.C ~d 4-~ ~
p~u u p~ m u qw acd A a~n~+ o A aM p+-~ N o a
- ~ N r~
~ N Ci N ~ U] U O J-~~
~
~ a a~ o ~ G a`~i ~~~.-i u ~ a.01+
~a o ~ ~ u o ~ a ?�aa a~ �u H
~ w a~ a v~+ o o.~ ~ a ~c ~o x ~n
P~ a o a~~ c�~a U d0~w a~
-
�a~ � �~uo~.o~v a~ �~G~= .cd
, ~ G ~n v ~ ~ o v a~ o0
r-1 N R! N N N W N b0 d0 bA W Gl 1-~ (A N~ N O N 4-I
�
N C~+ N 1.1 N W N~ r~-I �i-~I �r~l 4~.~ ~ fA N R~ O iJ N~A
r-1 r-I r--I '-i r-I i-1
123
FOR OFFICIAL USE ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
~
. ~
a~
~ ~ ~ ~
~n a~, a~i a~i ~ -
- ~n u~ u~ ~ -
d ~ d ~ d ,
on -
~ ~ ~ ~ ~ ~
~ _
cd
~ :
cn Pa ~n u] cn
~ ~ ~ ~ ~ ~ ~
f!~ 11 Cn V~ ~
r'1 A o0 O A (a A ~
G y
�,-I
�rl tA
cd ~'i ~~.1 4-1 ~ r~ GO ~ .C
i a~i a~ v~i o~ . i~ o~ a~
ro a~�~ a on o 00 o a~ q�~+ ~
E s~ ~ o ~n o u ~ . ~ m ~ .c ~
v a d~ ~ k~ a~ p~ c~ ~ m
o~ u-~ a~ a~ o ~ ~ a~ ~ a~ ~ a~ cd
a~ o v P q ~ o o w~+ ~ m a~
m o a~ ~ a,n 4-+ b s~ o.n u o~a u ~n s~
- p w q o p u o o~+ 0 3~ ~ ~ I
N CJ o ~ i-i ~ N ~ cd ~ ~ ~
~ ai a~ G'' u~ ~n a o ~ a.c o~+-~ u ~n :
U O ~ ~ O I
w
, ~ ~ JJ l~ U N ~-I .C~ (A r-I .t+ U ~'i 'b ~ ~ O f~ ~J I
rl C~' ~ UI O r-I N U+~ ,a O 4a ~ G' w P.
q O,~ 'd L1, b S-i U O �r1 O ~U O O U1 1-i C
cn a q o cd a~ u-~ ~ b q w a~ oo i
~ t~ cd O F3 ~�n LL O u � m t+ 00 O O'L7 rl i
s~ a~ a~ ~ u cn o ~ ~ ~d ~ ~c oo s~ ~n
a~qoa ~~d wa~~+ a~~v a~ ~ �~~+~,oa~ !
o ~+u aoos~a ~oo ~a~~ 'c
- v ~n ~ ~ ~ s-~ v~ ~ ~ a~ ~ ~ ~ -
~v q�~ u~ oo .-i b~ o+-~ a o ~n ~3 0 b r-+ ~ a?
o a o o ~ o~ bo ~n ~d s~ a~ w~
u ~ ~ w ~I ~I cd b a u a b .c~ ~
o .C o o~ m O cd ~ o ~ o G Cl cd U _
w~, ~ a.~ q v~ G u ~1 a~+ N~+ N u ~ cd ~ u~ w
0 0 o�~ ~v a~ ~ a G a~ ~~d o
'b ~f~ ~ t-1 Cl 4d 'L~ ~I iJ ~ r~i 'C~ b~ ~ 0
v cv ~ a~ o vp v a o ~n a~ v~ oo a~+ ~
oo o H w.~ G cd ~ ~ q tn al u q�~ q a a+~
b0 r-I ~ N ~~--I cd 3~+ 00 .C'+ ~r~l cd �rl
a~ v s~ �d ~d a~ ~ cd ~ > a a ~ co ~
~n ~ o~~ a~ a~ .-i v, u m q v a~ y c~ ~ a~ c~
a~ a~ ~d ~n w u~d a~ u-~ o o a.n a~ ~ a~
a+~ a~n ~ o ~n u ca ~ o~n ~n u o~+ A aq a
r+ o0
~
aN ~
~a A o0 0 ~c~i o 00 o a
oa ~u a~ ~ u~w
~ m a cv ~ q o ~ o a
v w ~ oo a o~+ v�~+ ~c a oo w b�~ a
~ p cd ~ a o ~ ~ a o
_ ~--i ~n aa ~ w ~ ~ ~n w ~ =
a a~ a~ ~n ~ a+ b c a' o 0
o _ v= cn ~n o0 0
� 1~ uNi bC o u o ~ ~v o ~ ui
~i q c~i ri cd ~ cv o~o a~i u~f p. c~i c~d ~ ~�u u
.
_ N N N N
124
_ FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
_ .o
. ~
~.t 3-i H
-~1 r4i r~-I
A ~ .a �a
~ ~ ~ ~
~ ~ N ~ ~
d F~+ d ~
~t N
~t I I ~O M
N t/~ ~OJ N ~
~ ~ ~ ~ ~
A ~ O .O A A 0
c~ ~
w N 4-+ ~ i ~ ~
~ O LYi O r-I I W
a o ~n v ~
ao vo ~ ~ ~ o,u ~~G
c"~n s~ c~o ~ ~ ~ ~ a~ o 00 � -
v o a ~ .n ~d a ~ �d
b ~ a~i ~ u w p' ~i~i ~
~ m w v~ ~ a cn al w o v+~+ cd
a~ ~ q u u p, o ~ a
~ ~ ~ u a~ ~ ~ ~ ~ A ~ ~ A ~
u..~ ~ a u s~ ~ ~d s~ o a~ a
0 0 ~n a~ ~ o ~ o r+ r+ o
.c ro w oo a~ ~ 'o ~ ~
~aa~~+o cuoo Goo
o ~n ~ ~ ~n ~ o i
- ~.a,~~+a ~ ~~d ,�u�'~ ~a`~i~m
~~w~�cd ~ o~ ~ ~a~q cd~+q~+ R
8.~ o 0o m b oo co .c a~
0 3 o q o o o~s7 O~
.a.+ v~ o cd w a~ w~+
~ v q w a o a o w p ~ u p~+
~s~oo w cn wo�~ aro~~d
c~ ~d p m v u b u
~ 3~ ~ v�~+ a~ b bo u a ~
o ~ cd ~d a~ a~ ~ o a~
w w.-i ~ G N ~-t p w a~ p~
o a~ s~ a oo a o0 0 o
b v, u a~ a a ~ b~ a,.a -
~ ~ m m ~ ~n o a~ o u
~n~ c~ ~ ~d a~ ~ v~+ u mw u ~v ci~ q
p o u a~ ~ A ~n A oo N ~ o N q g u
~ o
~ 4-1 W N
tn O Pa U F~ N RS i~ ~ I ~ �r~l '-1
r-, a a~ ~d ~ s~ ~ cn u a~ ~~d
cd a w o~+ a o o ~n ~ a~ w ~ -
~a ~v a,~ oo o i~ G~+ .c ~n s~ i-+ e~ -
s~ N= a~ ~o o~ oD ca w u a~ u~? a~ a�~+ -
a, ~ a s~ ~o a ~ a~ s~ ~n v~ v~ N
�d o ~ a~ m a~ a a�~+ a~ a oo a
- ~~,m a.`~�~~ G ~ ~n ~ ~ou~eova i v
~~m a~ducu a~a~o~n a~a~ ~+oa~wa~~ a~+
~o m ~ s~ v~ ~ ~,.C u a~ cn c~ a b~ o., a
u o0 0o a.+ u al ~ q n~ w u a G
~ �~s.�+ �s�aos.�+ �wc �u.~~�~oo~~~~w~
~n m c~. a w a. o~ a~+-~ c~ o+~ a w u~+ ~ o~
_ . .
N M ~t ~t ~1'
_ 125 -
FOR OFFICIAL USE ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2
~ ~ ~~.~..u ~~JL V~~1+~
- ~
1w",~
W JW
~ ^
^ WI^ ~
Y 1 \ V, ~
w ~ d
~
~ ~ ~ ~
~ . ~o
~ ~ ~ ~ ~
N D+
~ ~ ~ ~ ~ ~
M O A A A A A
w ~ ~I ~
O 00 N Gl O~d u
~ 1.1 ~ J~.~ ~ tA 'Ly ~
~ � w a � G o .c ~ ~ ~
v~ o a~ ~d ~d o ~ o ~ o
4-I ~ V C~' 3-1 r~ 4~ L1 4~ 4~ Li U I
O~~~ O O~ 4-1 cd 4-1 O
i~ Gl ~�r~ i-~ O r-1 O S-~ O Ul N~rl 'C ~
~ tA iJ W 1~ 'b cd O fA ~C Cl ,.C Li fy ;
o~ ~n u a a~~ a G~+ co ~u ;
~n a~ v~ o,~ ~d a~ o~ q ~
~n v~ a oo o o G a
cd ,~-i s~ ao ~ cn o v G a
u~cdb o ~o ~+u~�~ cdu w~o
s~ oo u�~ ~ a~ ~d oo ~d q o 00 ~
u a~ G ~n ~ ~ oo ~ o ~ ~ o ~
w�,..~ m cd ~ G N~ cd a~r~l a.+ cd
~ 1~+ �ri N.{". N'~ O N b0 .O 'd ~ U N rl
,.C 1~ ~�i-I O D U F~ cC GJ ~d ~~rl tJ 1-~
- 1.+ N ~--1 �rl O W .r. ~ v .c ~ ~ o o .
S-i ~d 1.~ O Ql 00 OD O OJ ~ Q 4-~
ia 4-~ Cl cC CL .C �rl Q 4-1 ~ 1x''.? 4-I ~A ~ ~
1 I O G'+ O 3-I ~ w p ~ N r-I ~ !A O 4-I 11
tA tA O,-I �ri f-~ R1 C: C+' i-+ 'L7 N~ N -
b,., ~ a-~ c~ o �d o c~ o 00 a~
v c
o u, a ~ v ~ ua � d v w~ cd i~�~
N 6 c0 1.~ CJ N~ U1 N~d ~.1 ~ Gl ~ 1~
b0 i-~ .O ~ .C ~rl ~ N 'c7 �rl �d c0 ~d 9 ~d
o a+~ o~ a~ w q N v, a~ o�~ a~ ~
W w ~~3 1~ 4-I D' F' �rl cd rl R! .t"'. �ri Cl '
i a~ o w a~ ~ a~ oo co s~ cd a.
o ra~~+uo ~+~s~ ~u~i~`~o`~o v ~oa`~i~~+� .
-
~~v~i o ~ A a c~i q w o
~ w ~ v v~ A
v
O ',a, ~ ~ c0
G N a~.a ~ a~i c'~i o~''o
? ~ ~ aa`~ � ~ c~'d ~ ~a
a~~ .~n~~ ~ ~ oo ~ a oba
~ co 00 v ~ a~ a~ ~n w
v�~ ~ a~ a~i v~+ a a ~ a~i a~ ~-~i ou
~ ~ ' a, " cd a ~ ~ ~a a~o " ~ ~
. � ~ a"i � a � a � ~ � ~ o
~ ~ ~n oo ~ o ~ w oo b a rn
~ . .
~ ~ ~ ~ ~ ~
126 "
FOR OFFICIAL U~E ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
~
~
~
~ ^ ~ ~ ~
G~~ ~
~
~ ~ ~ ~ ~ ~ ~ ~ ~
O J.1 G7 G) ~J x~
~UW UF~aQ,' ~ tn
F=+ ~ ~ ~
~ ~ ~
~7 ~ ~o ~O ~-~1 ~
~
~ ~ ~ ~ ~ ~
Ja
~ ~ ~
O
M A A ~ O O A A
~ 3 ^ "L" 41 ~1
- ~ I o o ~n o id ~n ~ C w i P~~ w w w p
g t1~ F+ i~ O fa ~A O O rl r-I QO ~A V
9 ~ .u u~ ~ ~ 1.~ b0 Rf ~ ~ 1~ cb C ~ ~
0o N~o.~ w�~,�-i~ s�.~~ c'' cv~~ a`~i,�-i~�~
~ ~n ~ v ~ u ~ a o a v, o a~ ~ ~ c~ q
~ o+~ ~ a.a ~c w~ c~ a~ oo a o o~~v c~ a. c~
~+~~+~3 ~o s~ ooa~u ~oa~ +~wa a oo~+~q
o w� a' ~v a ~ �d ~ o v~ ~ ~ cd o o -
~~n ~aoocd ~ ~ a~a wma~v ~av~~
~ o a~ ~n ~ v~ o ~ u b c~ .C ~a o a~ ~ v a~ ~
~ u~ u o u ~n o v w ~ ~ ~ ~ a~ ~ ~ ~ a~ ~d
co ~ G rl �~1 v t-~ ~.ca i-+ q c~ co a..i a-~ N co a.[
cd Cl ~ d u O N O al W U o O'd 00 y~
a~ w~d x a a~ .c ~n u a~ a a~,~ o~ a~ a a o~ ~ oo a~ u
~ o0 5+' g o 0 o iC ~ ~ u,~ o q o o,n o~
o CJ o Cl id N ~1 ,-I u�~1 N a~ cd cd O u rl rl i-~ ~ a~
F+ .C 1~ O 1.~ 3~+ W~.C ~ N d~ ~ Q O }3 N,-~ 1.~ a F+
~ a+~ ~ a o,~ ~ v~ ~ o adw o a> cd o co wba
cv w~++ s~ .N w o d
~ a~ w v~ .o ~ a~ o~+ a~ a a~ v~~~ o w
~.~o~~~+N a r~p~ ~ o~n ocd.~p ca.G~noao a~o
~ u ,~C a~ ~o ~ a a~ u u w a~
m y a~ ~-I ,a ,.i ~ ~ ~-i H ~ ~ o ~ v ~ ~ ~ a"i r~l ~ N
N W v1 1~+ ~ H tA ~rl O~1. ~~rl O Gl W O 4-i ti-I r1 tA ~ O 01 N
rl O~ W ,'a~ 1~ O O Gl p+ $ 1~ R 00 W 4-1 rl W O R) ~
i~+ N.C p N p+ T7 h-~1 'Ci 'L7 ~ tJJ i~~+ 'L~ 00 d0 U~ 9 ~ O J~ v!
oq o~n~~v~ o�~~~+ va~~+a~ vaoqc~ v~G~a,~ ~~`~o
4-~ 8 O l+ U W~.+ I td .C O tA L'+ C.' GJ H C+ `r~ �ri N ~ ri ~ (n
a a~ a~ a ~ ~ oo ~ o 00 ~ ~ ~ oo ~ ~ ~d ~ s~ a
- v a ~d ~ ~ ~ ~ .n ,a ~ co a~ ~n oo ~ -
a~a~a~m~a~~n a~a~s~~ m~+~~' cn~oa ~n a~w~a~ ~vov o
- ~ cn �u ~ v w u a w ~ u q v�i a c~'d A o~'o u~ w o [-~i ~ a+~-~
i ~
O O
'G
~ ~ N
Q ~ ~ ~ ~ ~ ~ ~ ~
- a -
a o v~'i u a a o aai o A, .,-~i
a a. ~ ~ ~ N
'~7 3-i O y ~ ~ ~ !"a ~ ~
GJ 1.J G! 1.J ~"i ~rl �ri
a
o~ o a~i ~-i c~i a~i ri ~ a o a ui o a
~q ~eo ~~n ~oo ~ooa ~~qa ~~a
~ ~ ~ ~ ~ ~
127
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2
~ r�. .i~ ~ rv~~~r~ ~I~/L!
a ~
~I
~ r`~ r'1
~
~ ~ ~
~
a v
~ ~ ~ ~ ~
d ~ d
- ~ ~
~ ~
~ ~ ~ `o -
~ ~ ~ ~
~ ~ ~ ~ ~ -
~ ~ ~ ~
m � cn o
A A ~ A ~ O ~ A
N ~ S~+ o ~~--I W u~ w I c~C
r-I ~ O t+ �rl o O ~ ~'S7 p ~
~ ~ W a~ ~ O ~ i-i W O v I b0 N~ b0 ~
I tA 'CJ tA ~�rl ~ W O rl rl O' C+' ~-1 t~ .f.
o~ o o a~ a+~ cd ~ v ~ w u~,n ~ o ~
~ 1.~ cd ri O~ ~~O O rl ~ N O rl rl O
a~~ 3~ o~ oo~ ~ au.c G D~ u cd ~ s+ o+~ a+~
~v ~a v G o ~a a~ ~ a~ a a u cd ~
~ a~ a~ q~+ a~ a~ o a~ �c q~+ c~ a w~ o m ~n
.n u~+ a~ a N~+ ~o w .c a~ ~ o v~ o 00 ~ a~ gc~
~ ~ w ~ ~ ~ ,"~-i r~-I c~d ~ ~ ~ ~ w ~ w a: o ~ w w ~
w a ~ ~v a~ o cd ~ w ~ ~n ~v ~ o ~ ~ o a~ on
o ~ s~ > a~ ~ oo u o o v a~ ~ ~d a~ ~n o
b oo a~ ~ ~ q ~ ~ w ~d ~ ~n o a~ ~n a~
u o b ~ u~.c o 00 u-~ g w a~ a.
o~d s~ ~ a o cv a~ w a~ w o,.a ~n
~ b~ a a~ oo ~a ~ a~ ~d v~ o+~ o a~ u v a~ o0
,~ao .c G.~ ~v~+o~a~ a~ v~~am q.c~
~ ~ fr Q~ bd 'P'~ ~ w ~ ~ ~ W+ '1"~ b ~ ~ ~ ~ b ~ '1"~
p,~ o.~ oo a~ o q cd a! ~n a~ ~ T1 ~n
o ~n u,~ oo ~d ~ a~ a~ ~d o ~n ~n ~ ~c a~ w v~
- y p ~ u G w w E m co D, o o d
~ N v~ �r~ F+ N 3~+ cd Gl o~ ~d tn a cn cd m q u
N.c'. OD ~.y. U i.+ d ~~H 00 L"+ m~+ Ol d 1~ i-~ Fa a1 3 ~
+-i p'~ c~ m.,~ 00 ~ Gl i~+ b0 U N ~~-I cd 00 N ~ O 3~+
. .,a c~ ~~v a~ o 0o a~ o o..C ~ o u o+~ r+ a
O W t~ O tA R) rl u" .C ~rl F+ iJ 4J ~rl N O W
N W O Ul O tJ W 00 ~. owa~a
~ m ~na ~N ~n N o ua
. � � �
~ ~ ~ ~ ~
128
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
~
~
~
va ~ ~ ~ ~
N ~ H i-~ N 3.~
c~0 ~ o c~d ,~o ~ c0 ~N ~ G
.a cd
vl ~U 1~.i ~ O 00 U y~
cn.a c~d f~~ W~ v~i 1 I
~
~t ~ ~ ~ .N-1 ~ 1 I
' V~ ^ CI~ CJ~
D'' ~ 7+ ~ ~
~ ~ ~
O A O A O A O I
I m ~ '1 a!
~ ~i w o~v~i v c~ ~ u s�a a ~ p
a o ..a a~ a a ~ w m
a a~-! .u c~ x a~ v o o,~
FI P+ f11 f0 'd 1~ .C Gl ~ Cl f: 1~ ~J
b0 ~ b0 r-I 4a H ~,.C 00 ,C rl
O 6 4! ~ cd c0 O 4-i ~ 1~ p t~ r-I O m 4-i
3-~ Cl r-I �rl 3-~ O 4-I 'd �r~ �rl tA O
a ~.a ~ a~ b ~ ~ o~ w w u a~
tn o q q o q 3~ ~d o o c0 q m
'U ~ cC rl O o U r-I
~ p' o~'o �D oo b ~ ~ ~ ~ o~'o o ~ ~ ~ ~
bo a~ o a~ ~ a~ p~ b o�~ o~+ a~ a oo a
a ~ .c ..a ~ a~ ~ oo ~ ~ a a~
~a ~ a o v ~n i o�~ a a .n c~
~d ~~~a ~cd o o ~o
0o a~ oo ~u ~ a~ a ro~+ ~ u s~
a~ a~-+ G s~ ao a~ oo a~ a ~~~o a.r
N H rl �rl OD O .L: .O R1 CI U GJ 1.7 W
0 00 ~ ~d ~ o a~ a~ a�~ a~ o a~
. a o ~ ~ ~n ,.C ~ v ~ ,c
o ~d o a ~ ~ ~ ~ ~d ~ ~ ~ .n
~ a~na m o o ~ ~~+p~, �~~o
w N ~�~-I sa 3 G co a~ m a~ 3 a~ 3a
i ~ ~n ~d ~ o ~v x b > q a
co 0 o a~ ~ G w.~ o q ~ oo a~ t i
~ ~w ~ w ~ o u ~ ~ o ~ ~ c�n~
Cl T1 ~0 "C~ r-I u7 U MI 'b W q i.~
N G c4 ~ O! O W G1 O p t7'
N i-i ~ 4-i Ol t~ a-? U~ p O O~ ~ cd GI 4a
C7 00 ~d b0 O~ S.+ V1 GJ b0 rl cd 1-+ F+ O
,C �rl N �rl i.~ 'd O N U rl V! fA 't7 00
+~~n~ ~n~ aa~o ms~~a~ a~oa~a~
~ ~b~ Ar-~i o ~~w a A>~ o ~ ay ~
o ~a�+~ o ~ q
o a~ m s~ a a~ a a~ i
m~ u a a o w a a~ ~ i w a cd
.n ~ a .u o.-a ~n .c ~ ~n ~ o a.~ ~n a N
~ o+~ on a m ~s o x,~ ~u cv a�. ~ a
o~+~~ ~s ~mu~n~ u~n ~a a a~ q
w a~~ a~ = a~ t s~ w�~ - N _ a
a~ ao a~ o~+ oo s~ ~ on t~ ~n a~ a
~ a a~ p~ ~ G a a~ o~d a w ~a ~d a ~s ~a G.~ s~ a a
w~~~ i~'~a c~~~~a; ~o~~ a~�~~ ~n3 0- -
.-i oo ~ o a ~ a i a uNi ~u a w o
�Gw~+a �~+w �w~d~+a �a~c~s~ �~~+w �o
o a~ ~v ao ~ r~ o q on a ~ u~ oo ~n oo ~ ~o ~n
.
~n ~ri ~ri ui ~n ~ri Ui
129
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
~vi\ vl'ilvilW vJL Vl\LL
~
w
w H
H ~ ~
GJ ^
~ ~ ~ N ~ ~ '
~ f r.�~~ w wa ~a w
~ ~ ~ ~
N N N N ~t ~t
.t ~-i r-I r-I I ~O ~O
~ ~ fJ~ ~
D+ ~ 41 N N
~ ~
V] cn 'L1 J+ ~ -
~''1 A A~ O O ~ O O A A ~ ~
~ N S+ ~d
I c~d ~ ~ ~
1J C^ 'L1 C'+
N u! 41 O~rI S~+ Ul ~ 00 tA O~
~ v o ~ a ~ .C ~ ~ ~ ~ ~ a~ ~ a~
o ~ �rl ~ri N a~ d q+~ q cd cd ~,~1 r-I r-I
3 ~ i~,-~ a~ g q o c~ cd a~ ~ D o a
a~ oo ~ u c~ id 3~ p q w a~ ~ q -
a~ o ~ o ~ ~ .u o o ~n ~ w o ~d
tJ U1 S-~ C ~d tA 00 ~C ~d 'b ~rl ,-I O N L+ ~
~-1 Gl ~ Ol W CL 6 N U N~ F.' '-1 S~+ ~ O ~1
c~wo bw~n~ o vu ~~cd ~vva o ~a-~u ~
u � ~ a~ � ~ ~ ai ~ ~ c~a ~ G o a~i ~ � v c~d ~a~i q ~
~n ~ on w o~ o ~ a~ ~ o~,~ w a~ a~ ~o u ~d
0o a~ o cn ~d p.c ~d ~ a~+ a~ a a~ ~ ~ o ~a u,~ a~ ~
q cn u a~ v a~ a~ a.-i o~+ ~ a~ q~ c~ v a.~ a.
~ ~n u u~�~ G v .u a~ cd cd m o v~.~ w
y~ cd .n 3~ cd o+-~ c~ cn w N u u �~t ~..i ~ o~+ a? ~ri
m u a�~-, a o ~ o a v, a~ q~ w ~n m ~ a+-~ a~
a~ o ao .n s~ oo ~ ~n a~ ~ r+ o~ a+~ ~ ~d a~ ~ oo a~ ~
u s~ o a~ a~ o m~o a u�~ ~v cc a~ o ~ a~ v~ ~~r
o a m ~n ~ a a~ p oo .c G co b a~
~'L~ 0 f1~ tb ~1 ~1 JJ ~ ~ .C'r' G~ C) ~1
a a~ b ~ w ~ G u ~ y o o u ~ cu H ,.C .C ~ o
~ ~ ~ o ca ~d a ~ a~ a a~ b o u
c~ o'~ G 4-+ a on o~+o ~ o G o0 o a~ oi o.~ ~ v'~i o c~d o~+-~ w a?
w oo co o i~ o ~ w o~, ~ u 4..~ o o a~ c~
p ~ o ~ y N ~d ~n ~ ~ ~v u
b~ oo G cd a a w v ~ ~n ~v �v ~ b oot a~ w
Gl G O i~ r-I ~ w .-1 tn O~ r-I N w c~ ~-~I N al q p
.f. U~rl ~rl ~ O S-~ G) C: O~d ~d td N GJ O F+' O p O Gi �rl ~ 6 O O
00 ~ C: 1.+ C.~' tA cb .C b0 H�rl ~-I S~1 bA }a i-~ ~ d0 .f. ~-I O 4+
~ ~ ~ cd v a~ ~ ~ v, oo ~ ~i ~ a ~ ~ a~+ o ~ ~ ~ .c u a ~
~n~,~d~ eo~~ m~o~+ ara~oG ~n~wG v~~+ ~ncoo 0
a~ v~~+ o�~ a a~ ~d ~n .C o a~ a~ ~ o a~ v~~+ ~ o~~
q~+ au ~w~�~ A~ aa ~ 3 au A~~ ~ A~ A aao~++
bo
G a s.�+ a~ a~.~ oo ~a - ~ o -
- ~n a a a.~ i a G v i~ ca s~
cd cd q cd �ri o N ~ N a
N rl N~ 1-i O` E3 i~+ ~ rl
a ~ oo ca ~ u q a~ ~ i~a ~ ~ a~ G
~ C N�rl ~ ..C y 3 'Cf cd .C o
,3 H r-I �r~ G'+ T1 a~ ~t H ia i~ cd DO ~ vi P4
1 ~ p~
r �
7 ~ r i O
f
1 N c
~ c
d 0 0 ~
d 4 a ~ i-~ ~ P~
oaca"n ~ ~ a G ~ s'~ ~ ~�n ~ ~ � o ~a'
~ ~ ~p=
~ p~ o o �~a �v~ v~i �a � o q'uNi
.a~cn o~+~~+ ~~da c~,w~, r~a ~�~oa~ ~
- ~ ao ~ rn a ~ oo c~ u a ~?-a ~n ~ a, ~ a.? u u
~ ~ . . .
~n ~ri ~n vi vi ~n ~n
130 ~
FOR OFFICIAL L1SE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
- - FOR OFFICIAL USE ONLY
~
~
^ v a~
G~
~n u a~i a~.~ a~i
~ w
w� c�~�
~ ~
U1 N
~7 N r-~
~
~ ~
~ D-~
~
~
c,~ 0 O
A
N
~ ~
r-I iv.~ y.~ ~r~l
@ G1 U
00 ~rl ~J v~l
~ ~ o ~ u
awa`~i
- a~ ~ �
~w~ a~a~i~
~ ~ ~ ~ ~ v
a'~~~-~i ~
3 0 a'
.a .o ~ a1 ~
> a~~ 3
oroa`~ 0000
~ ii ~pp~ a~'i b ~ "p�~~
N J.1 ~-1 ~D ~ O FN
0~ ~ cti 00 ~ l+
v u p ~m ~ O
~ a~ A ~�n a
~ ~,c _
3.+= U
va vb0c~v
H ~ H ~ N
' ~ - cd p
b0 b~p b
� o a � o q a
~ aa a~a
~ �
~n ~ri
COPYRIGHT: Izdatel'stvo "Statistika", 1979
[389-10845]
10845 131 -
CSO: 1863 FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
MEANS OF FO~MALIZED DESCRIPTION OF THE VTsKP~ DATA
Moscow VYCHISLITEL'NYYE TSENTRY KOLLEKTIVNOGO POL'ZOVANIYA in Russian 1979
signed to press 4 Apr 79 pp 227-240
[Article by G. M. Belash, 0. M. Veynerov, M. S. Kazarov]
[Excerpts] Let us proceed with the analysis of the SFOD [means of
formalized description of data]. Let us briefly consider the SFOD
oriented toward the data administrator and the applied programmer, dis- .
cussing only the events illustrating the arguments and conclusions pre-
sented below.
Let us remember that the data administrator develops the structures of the
data in the base, constructs the data base system, achieving efficient _
functioning of the base for the entire complex of problem~ ~programs using
it. The administrator is responsible for the physical organization of the
data.
The layout of the data b ase reflects the general structural laws character-
istic of the entire set of snecific data fixed in the base. These laws
- basically are determined by the logic of the sub~ect region depicted in
the data base. The layout of the data base is described by the language
means of definition of the data (YaOD) which must provide for tt~e follow-
ing:
The description of various types of structures generating the structure
of the data base (that is, the description of the parameters of these
structures names, formats, types of data, indication of keys, and so
on);
Description of the relations between the generating structures and the
layout of the data base.
In addition, the YaI~ID [data manipulation language] can be used to
describe the layout of the protection of the data base from unsanctioned
access and the attributes of the protection layout. _
*Collective-use computer center
_ 132
FOR OFFICIAL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
The applied programmer (the problem-oriented user) communicates with the
data base using the data manipulation language (Ya1~ID), the operators of
which either are included directly in the procedural (the procedure-
ortented) language or they are formed as refer ences to the procedure.
The functions of the YaOD [data definition language] are as follows:
The specification of the reference to the data base (search, reading, _
replacement, removal, and so on); -
Definition (by indicating the types of structures and the corresponding
names) of the attributes of the base layout us ed to localize the data
with which the manipulations are performed;
Indication of the specific values of these att ributes (and also tne .
logical functions of the values, the ranges of values, and so on).
The Ya1~ID can be used also to indicate the values of the protection keys.
The system s committee KODASIL has performed a~etailed analysis of the
structural principles of the YaOD and the YarID, the results of which are
_ reflected in [1]. On the basis of the performed analysis and generaliza-
tion of th~e KODASIL, proposals have also been developed with respect to
standardizing the YaOD and Ya1~ID. These proposals have been described in
detail, for example, in [2].
When creating the first stages of the VTsKP, obviously the "Oka" SUBD
- became widespread, which at the present time is the most powerful among
the systems of this type available for applica tion.
The structural princlples of the means of definition and manipulation of
data "Oka" have differences from the principles of the KODASIL. Accord- _
ingly, let us remember the basic principles of the organization of the
YaIrID of the "Oka" system (YaNID is not a system term) . This is needed *_o
compare the YaNID and other means of formalizing the de~cription of data
which will be considered below. -
"Oka" supports the following types of structures: field, segment, entry,
data base.
~ The entry is the set of segments among which the hierarchical relations
are established. The da~a base is an ordered set of entries.
The system provides for the following types of references tu the data
base.
GET UNIQUE (GU).
GET NEXT (GN). _
133
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
L~va\ vC[tVLC1L 6i.~ti vi~a~?
GET NEXT WITHIN PARENT (GNTP) . ~
GET HOLD UNIQUE, GET HOLD NEXT, GET HOLD NEXT WITH PARENT.
REPLACE.
INSERT.
The analysis of the means of formalized description of data performed in
the article has made it possible to determine the relation of the SFOD
oriented for people of different categories, interacting with the auto-
mated data bank of the VTsKP and to draw the following basic conclusions .
1. The data definition language with respect to the SFOD of the applied
programmer performs the functions of a metalanguage of the description of
the grammar.
2. The organization of modern SFOD of tYle applied programmer SUBD with
the base language insures potential possibility of constructing the
simp le translation algorithms from the IPYa [information retrieval
language ] o f the f inal us er . I
- 3. The requirements which must be satisfied by the IPYa of the final ~
user of the automated data base agree well with the principles of the
organization of the modern SFOD of the automated control system. ,
- 4. The orientation to the mentioned requirements permits the construction
of a simple inte~face of the SUBD with the file user adj usted to the
- specific application.
BIBLIOGRAPIiY
1. INFORt~IATSIONNYYE SISTEMY OBSHCHEGO NAZNACHENIYA [General-Purpose
Information Systems], translated from the English, edi~ed by
Ye. L. Yushchenko, Moscow, Statistika, 1975.
2. Stolyarov, G. K. Survey of the Proposals of the Working Group of
the KODASIL with Respect to the Data Bases," ALGORITMY I
ORGANIZATSIYA RESHENIYA EKONOMICHESKIKH ZADACH [A1goNot~mSMoscow
- Organiz3tion of the Solution of Economic Problems], , ~
Statistika, 1974.
COPYRIGHT; Izdatel'stvo "Statistika", 1979
[389-10845]
10845
CSO : 1863
~.34
~ FOR OFFICIAL ~TSE JNLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2
FOR OFFICIAL USE ONLY
AUTOMATION OF Ti~E PREPARATION OF PRODUCTION BASED ON MACHINE TUOLS WITH
DIGITAL PROGRAM CONTROL AT THE VTsKP
Moscow VYCHISLITEL'NYYE TSENTRY KOLLEKTI.VNOGO POL'ZOVANIYA in Russian 1979
signed to press 4 Apr 79 pp 256-267
[Article by P. L. Stepanov, V. Z. Yampol'skiy]
[Excerpt] Summing up the results of what has b een stated, let us consider
two problems of the operating efficiency of the "Stop-2" system.
1. The analysis of the operating exper ience of the machine tools with
digital program control indicates that for effective utilization of them -
in small-series production it is necessary to rep air about 200 UP [control
programs] per year per machine tool. At the same time for the preparation
of one control program of wedium complexity (on the order of 150 frames)
using the existing SAP [automated preparation systems] the following are
required:
About 10 to 15 hours to design the technological process;
About 40 hours for the preparation and checkout (including on the machine
tool) of the contral program.
Here the required machine time will be 0.5 to 0.6 hours, and the calendar
preparation time and checkout time for one control program will reach
20 days, ~
The analysis of the possibilities of the "Stop-2" system indicates that as
a result of using the standard elements of control programs the labor con-
sumption of the technological process design is lowered by 2 or 3 times,
and the time for checkout of the control program is reduced by 30 to 40%,
for the necessity of debugging uork is excluded in the sections of the
cantrolling programs where standard solutions were used. The calendar
time for the preparation of one controlling program decreases as a result
of the dialog mode of operation of the remote user from 20 to 4-5 days,
that is, it is redt~ced by 4-5 times by comparison with the existing systems. -
2. The operation of systems similar to the "Stop-2" system is a fruitful
and economically expedient basis for the interrelation among the industrial
enterprises and the VTsKP. On the one hand, the enterprises avoid the
necessity for bearing the expenditures on the acquisition and the operation
135
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2
_ _
of the expensive all-purpose computers, the operation and the development
of the labor-consuming and complex software for the automated systems to
prepare the control programs, including the developed libraries of standard
elements of the control programs. On the other hand, the collective-use
computer centers obtain a reliable partner with a stable demand for
machine time in the person of the industrial enterprises.
Actually, at the present time the flaet of machine tools with digital
program control in the country is on the order of 30,000 which determines
the demand for the preparation of 6 million controlling programs per year
and, consequently, the requirement along the order of 2-3 million hours
of: machine time.
With respect to the VTsKP of the industrial region it is possible to make
the following calculation. Servicing 10 or 15 large industrial enterprises
with a f leet of machine tools with digital program control on the order of
50 units in each, the VTsKP can realize 50,000 to 75,000 hours of commercial
~ machine time per year for operations with respect to automation of the -
technical preparation of production on machine tools with digital program
control alone. Considering that the system permits simultaneous servicing -
- of up to 10 subscribers, the demand for the calendar machine time wi11 be
about 6,000 hours per year, that is, a daily load of one of the YeS-1033 ~
computerG will be reached. The planned increase in the fleet of equipment
with d~gital program control by 20 to 25% by 1980 insures further stable
growth of the machine time demand. Here it must be noted that when pre-
paring the control programs the operating time of the processor will be 50
to 60%. This is a great prerequisite for increasing the profitableness of -
the collective-use computer centers as a result of solving the background
problems and to reduce the expenditures of the enterprises to lease machine
time as a result of lowering the price of one ho~,~r of machine time in the
time-sharing mode of the computer.
COPYRIGHT: Izdatel'stvo "Statistika", 1979
[389-10845]
10845 ~
CSO: 1863
136
FOR OFFICIAL TtSE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
Publications
ARTIFICIAL INTELLIGF~ICE
_ Kiev ALGORITMY RAZUMA in Russian pp 10-13, 221-223
~Book by Nikolay Mikhaylovich Amosovi "Intelligence Algorithms." Printed
by the order of the D33torial Boaxd on Popular Scientific Literature of
the Ukrainian SSR Acaaeiqy of S~iences.
Number of copies printe~ 37,000.
~Additional selections from this source appeaxed in a previous issue of this
: report see JPRS L~9204, 23 Jnly 1980, pages 148-149]
_ ~Text~ Introduction
Intelligence mechanisms interest scientists of various specialties. For
psychologists and physiologis+,s it is the theory of their sciences; for
cyberneticists it is ways to create artificial intelligence (SI). In
this book be~.ng of~er.od to -the att~n~ion of the read~r: I x~,l~ attempt to
present concepts on this problem as a result. of the develop;uant of
work be:.ng done in the Biocybernetics Department of the Cybernetics In-
_ stitute of the Ukrainian SSR Academy of Saiences and which started in 1962.
New ideas differ considerably from those publishec~ previously [1-3].
= The work "~,lgorithm" was not introduced into the title of the book by chancei
. I believe tha,t it is possible to "pigeonahole" the most complex ma.nifesta-
tions of intelligence even with prospects of its development t o a higher
level than huma.n intelligence. Evidently I will not be able to convince
sceptics for this it is necessaxy to reprod.uce intelligence algorithms
in programs. Regrettably, there axe great diff.~.culties in this path. Per-
haps the cited ideas will h~elp the enthusiasts of this problem? 1 warn
tha.t the subject is exceptionally complex to understand inasmuch as it
lies at the junction of physiology, psychology, engineering and even phi-
losophy. For simplification I will use block diagrams widely.
Intelligence is defined as a totality of ineans and methods to control com-
plex systems by operating their models,directed by criteria of opt imal
control. Modern science and technology ma.ke it possible to reproduce
137
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FUR OFFICIAL USE ONLY ~
models and operate them by technological means and thus sepaxate intelli-
, gence from the brain to which it is usually related. The difference be-
tween the cited definition and the multitude of others consists in that
it stresses this last circumstance.
Thus, speaking of intelligence, we will have in mind this totality of
means and methods of control independently of whether it is realized in
biological systems or by means of artificially created technological means.
This use of the term "intelligence" is not generally accepted. However, it
is closely related to the basic idea of this book. In those individual
cases where we speak only about natural human intelligence, this will be �
mentioned specifically. As far as the term "artificial intelligence" (12)
is concerned., it, as will be assumed, will be used to designate vaxious
kinds of technical implementations of intelligence models.
We will dwell on the basic concepts in order to enter the scope of the
problems discussed ~adually. First of all~ it is necessaxy to sepaxate
out two opposite approaches to simulating intelligence. Conditionally~
they may be called network and algorithmic. Correspondingly, we will dif-
ferentiate between two types of models network (SI) and algorithmic (AI)
intelligences.
. ~t) , (6}
06 ~2~ i sn - nn
- --{P]~-I ~ _ ~ l -
~ `J~ ~0
.
3 "
_ -M~ I
Fig. 1. Block diagram of network intelligence (SI).
i. ob control object 6. PP permanent memory
2. Rts receptora 7. RM recognized model
3. E-- effectors 8. Kr cri~eria -
4. VP temporary memory y. P'ID action model
5. PM primaxy model 10. "8rain"
The simplest block diagram of a network intelligence repsesents aome complex
three-dimensional structure. It is sensed by sensors receptors Rts ~for
exa,mple, eyes) and is transmitted by signals to the "brain," where it is
converted to the primary model PM. To a first approxima,tion, PM is repre-
sented by a flat two-dimensional structure, ma.de~ up of excited, activated
138
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
components of some network conditional "receptor field." The object
is recognized by superimposing PM on a multitude of figu res of inactive
components, joined by "itineration" ties. These inactive model figures
- represent models of already Imown objects and make up permanent memory PP.
It~. accordance with the principle of operation, SI components that ma,ke up the
permanent and temporary ~or active ) memory are one and the same; they _
differ only in the level of activity. The superimposition of the prima,ry
model on the network selects and activates one recognized mod.el of figure
RM and from it a controlling effect is connected to the ob~ect. This
effect is represented by the action of model Nm~ controlling effectors E.
The recognized model of the object is tied to s~everal action models; the
selection of the neQded one is determined by criterion Kr. The action
madel activated from RM and Kr transmits the activity to the effectors in
which the control signals are converted into the mechanical energy of the
controlling effect. Thus,in a network intelligence "the actions with the
models" axe represented by the change in the activity of the components of
the networks in which the models axe built in.
(i~ ~2~ ~3)t4) ~5) -
D6 Pu na; n, n.~
PM
` ( / Ka Ql1
3 q~ uQ
t1i~ Cto) 9
Fig. 2. Blocx diagram of an algorithmic intelligence (AI)i
1. ob control object 7. Kr criteria
2. Rts receptors 8. DP long-term memory
3. PMi primary structural model 9. Nm digital action
model
- 4. P1 converter 10. P2 converter
5. PMZ primary digital model 11. E-- effectors
6. RM recognized model
Fig. 2. shows a block diagram of an algorithmic intelligence. It staxts
- functioning in the same way as in the SI, as a result of receptor Rts
operation priruary structural model PM~ forms a two-dimensional structure
in the same plane~. However, it is immed.iately read-out by convarter P1,
139
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
transforming it into a lineax, single-dimensional model consisting of a
- set of digits PM . All further actions axe impl~mented by thia model.
PM recognition cons~sts of its sequential comparison with standard models
recorded by the same code in long-term memory DP, where recognized model _
PM is located. Action model NID is selected in accord.ance with this model. ~
This process is implemented by sorting models in the long-term memory under
the control of criterion Kr. The action nodel is transferred to converter
P2 where the digital code is converted into effector E controlling signals
a,r~d through action controls to object Ob. ;
The basic difference between SI and AI is in the structure of the memory ,
and the resulting vaxious actions with models. However, in both types of ~
intelligences~ the }~'rinciple of controlling the models from the side of ;
the control criteria through their activation is preserved.
The creation of SI ~nd AI assumes the use of various methodological ap-
proaches to simulating one and the same object human intelligence.
Each of the approaches has its strong and weak points. Therefore~ in
designing actual II s~stems, it may be feasible to represent several in-
telligence functions in the form of network models and some others in
the form of algorithmic models. The general principle here is as followsi
the lower the level of trie function being simulated in the general hierarchy
of intelligence functions, the more probable it is tha.t the network method
is the most efficient in reproducing the II.
The situation is that the implementation of many functions of the lower
level (such as, for instance~finding the recognized model in accordance
with the primaxy model-- see Fig. 2) means a great amount of sorting in
the long-term memory. Such sorting is most efficiently implemented in the
At
network models that realize paxallel processes of data reprocessing.
the same time, network mod.els have other shortcomings that limit the axeas
of their application. I will dwell ma,ny times on the compaxative analysis
of the advantages and disadvantages of network and algorithmic models.
A number of papers axe dedicated to problems of creating SI and investi-
gating their properties. Brief reviews of concrete results that have been
obtained axe given in the first section ofrinciplesk.nothmaking anyifurther
dedicate to the description of AI design p
special stipulations that, in its practical implementation, a number of
functions may be represented by network structures.
BIBLII~RAPHY
i. Amosov, N. M. "Modelirovaniye myshleniya i psikhiki" (Thinking and
Psychics). Kiev, 1965~
2. Amosov, N. M. "Modelirovaniye protsessov myshleniya" (Simulating _
Thinking Processes). KIBERNETIKA, 1968, No 2.
140
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
3. Amosov, N. M. "Iskusstvennyy razum" (Axtificial Intelligence). Kiev,
1969.
4. Amosov, N. M. ; Ka,satkin, A. M. ; Ka,satkina, L. M. ; Talayev, S. A.
"Avtomaty i razumnoye povedeniye; Opyt modelirovaniya" (Robots
and Intelligent Beha.viori Simulation Experisnce). Kiev, 1973�
5o V~nogra.d, T. "Programma, ponimayushchaya ;~esltestvennyy yazyk" (A pro-
gram tha,t Understands Natural La,ngua,ge Moscow,.i976.
6. Kasatkina, L. M.; Ka,satkin~ A. "Heuristic Behavior Model,." In bookt
"Nekotoryye problemy biokibernetiki" (Certain Biocybernetic Problems).
Kiev, 1966, second edition, pp 21-36.
7� McCullough. Reliability of Biological 5ystems. In bookt Self-Ch~gan-
izing Systems. Moscow, 19~, pp 358-378�
8. Minskiy, M.; Peypert, S. "Perceptrons." Moscow~ 1971.
9. Sutro, L.; Kullmer, U. "Totality of Decision Devices for Robot Control."
~n book "Integro xobAty" (Integrating Robots). Moscow, 1973~ PP 112-163. -
10. Nielson, N. Artificial Intelligence, Moscow, i973�
il. Sa,muel~ A. "Certain ?nvestigations of the Possibilities of Teaching
' Machines on the bcample of Playing Dominoes." In Booki "Computer
Ma.chines and Thinking." Moscow, 1967, pp 71-112.
12. Newell, A.; Simon, G. "GPS Program Simulating the Process of Human
Thinking." It~id., pp 283-3~1.
13. Shenk, R.; Abelson~ R. "Scenario, Plans and Knowledge." In book~
~
Tr.IV. Mezhdunax. obyed,. kong. po II. "(Transactions of the Fourth
International Joint Conference on Artificial Intelligence). Moscow, _
1975s PP 208-220.
14. Faix, R.; Nielson, N. STRIPS System." In Book "Integr. roboty "
_ (Integrating Robots). Moscow, 1973~ PP 382-~3� -
15. Hewitt, C. "FIJINNER I~nguage for Provir:g Thearems in Robots." .In Int.
joint conf. Ar~. Intel. Wash., 1969, pp 295-301.
16. Hewitt~ C. "Procedural Imbedding of Knowledge in PLANNER." In Second
Ing. Joint Conf. Art. Int. Leningrad, 1971, Pp i67-182.
17. Robinson, J. A. "The Generalized Resolution Principle." N.-Y., 1968,
3~ PP 77-94.
= 1la.l.
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
,
FUR OFFICIAL USE ONLY
Table of Contents
Page -
Foreword 5
.~r?troduction 10
Artificial intelligence today 14
Basic stages and directions of investigations i~ ;
Certain results of simulating network intelligence 18 ~
Systems and models 31
Complex systems 33
Models 35
Perception and memory 38
Perception and control 38 ,
Generaliza.tion of perception . ~ '
Types and mechanisms of inemory ~'3 ~
Hypothesis on ~3nsmory mechanisms ~'6
Recall, generalization, forgetting ~
Ck~ im~+l~mentation of the hypothesi~ 53 _
Model actions 55 `
Activation of models 55
Compaxing models and recognizing images 607 i
Finishing the "phrase" recall 60
- Generalizati~n of models ~
Interaction between models 1n intelligence 63
Criteria, requirements, feelings~ ~timuli 66
Cla.ssificativn of feeling-requirements 73
Cycles of activity and tension 78
Time 80 -
82
Reality
The funetional act 85
Algorithms of a simplified funetional act 87 -
"Areas" of perception 95
Forecasting and determining the dynamica 97
Hierarchy of functional acts 99
- F~inctional act netk~ork i03
"Thoughts" 106
11~2
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2
FOR OFFICIAL USE ONLY
Table of Contents (Continued)
Page
Consciousness and Subconsciousness 109 -
SUT-system of intensifying-retaxding 109
SUT in algorithmic intelligence 111
~tT'r and consciousness 114 _
' ~nctions of subeonsciousness 116
"Coordinates" of consciousness 120
Human intelligence level 122
Speech "~~3
Highest levels of consciousness 3~9 -
- F~cperience and imagination i53
Work and creativity ~ 157
Dreams and psychological illnesses 1~
ArtificiaT intelligence in huma.n society 170 ~
Ba,sic "individual" qua,lities of II 170
Society of a,rtificial intelligences 188 -
Ch the way to intelligence higher than the human one 195
Human intelligence and complex systems 195 ~
Method of heuristic simulation 199
~ Heuristic models of some complex systems 2~2
Axtificial intelligence higher than the human one 206
Design of algorithmic model of intelligence 209
Conclusion 216
Bibliography 2~1
CCIPYRIGHT~ IZDATEL�STVO "NAUKOVA DUMKA"~ 1979
[411-2291]
2291
CSO: 1863 ~D
143
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2