JPRS ID: 9340 USSR REPORT CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP82-00850R000300040020-2
Release Decision: 
RIF
Original Classification: 
U
Document Page Count: 
149
Document Creation Date: 
November 1, 2016
Sequence Number: 
20
Case Number: 
Content Type: 
REPORTS
File: 
AttachmentSize
PDF icon CIA-RDP82-00850R000300040020-2.pdf7.64 MB
Body: 
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 3 ~ ~t a ~iUT~~~T I TE~H~~~C~~4' ~ ~~T~~E~ i~~~ ~~~U~ C~~ ~ APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 - FOR OFFICIAL USE ONLY JPRS L/9340 8 October 1980 IJSSR Re ort ~ p CYBERNETICS, COMPUTERS AND AUTOM~4TIUN TECHNOLOGY - CFOUO 16~80) FBIS FOREIGN BROADCAST INFORMATION SEF~VICE - FOR OFr [f_'IAL USE ON~,Y APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 NOTE JPRS publications contain information primarily from foreign newspapers, periodicais and books, but also from news agency transmissions and broadcasts. Materials from foreign-language _ sources are translated; those from English-language sources are transcribed or reprinted, with the original phrasing and other characteristics retained. " Headlines, editorial reports, and material enclosed in brackets are supplied by JPRS. Processing indicators such as [Text] or [Excerpt] in the first line of each item, or following the last line of a brief, indicate how t}~ original information was - processed. Where no processing indicator is given, the infor- mation was summarized or extracted. Unfamiliar names rendered phonetically or transliterated are - enclosed in parentheses. Words or names preceded by a ques- , tion mark and enclosed in parentheses were not clear in the _ original but have been supplied as appropriate in context. Other unattributed parenthetical notes with in the body of an item originate with the source. Times within items are as given by source. The contents of this publication in no way represent the poli- cies, views or attitudes of the U.S. Government. - For fsrther information on report content call (703) 351-2938 (economic); 3468 (political, sociological, military); 2726 ` (life s~ier.ces); 2725 (physical sciences). COPYRIGHT LAWS AND REGULATIONS GOVERNING OWNERSHIP OF _ MATERIALS REPRODUCED HEREIN ftEQUIRE THAT DISSEMINATION OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAL USE ONLY. APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR Ol'FIC:LAL USE ONLY JPRS L/9340 8 actober 1980 - USSR REPORT CYBERNETICS, COMPUTERS ANO AUTOMATION TECHNOLOGY - ~ (FOUO ~.6/80) CONTENTS HARDWARE - ~'TO T_zotimpeks Advertises Disk Packs 1 Expansion of the Capabilities of a T~letype Version of the Elektronika-SS Microcompuzer Switching Syatem 2 ' SOFTWARE Program Testing Using Symbolic E~:ecution 6 APPLICATIONS Automated and Aistomatic Control Systems 19 Collective-lise Computer Centers 67 - Designing Collective-Uae Computer Centers 72 Standardization of the Planning and Design Solutions for Various Categories of Computer Centers 85 Analysis of the VTsKP SLbscribera and Their Problems 86 Problems of Determining the Cost Benefit of the V'TsKP 95 Creation of the Collective-Use Main Computer Center of National Economic Plan;ning and Control of the Latvian SSR 96 Multicomputer Complexes Based on Older Models of the YeS EVM [Unified Computer Syetem) 104 Data Transmission in Co1lECtive-Use Computer Centers 109 ! . - a- [III - US5R - 21C S&T FOUO] n/1T nT1'.'IT n+ - APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 ' Organization of Remote Subscriber Access to the Data Procesaing Syatems at the VTsKP 111 - Library of Algorithms and Programs ~or the VTsKP _ [Collective-Use Computer Centers] 115 Means of Formalized Description of the VTaKP Data 132 Automation of the Preparation of Production Based on - Machine Tools With Digital Program Control at the VTsKP 135 PtJBLZCATIONS Artificial Intelligence 137 1 ' - b - - FOR OFFICIAL USF O~II,Y APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 - FOR OFFZCIAL USE ONLY Haxdware VTO IZOTIMPEKS ADVr;RTISES DISK PACKS R3ga AVTOMATIKA I VYCHISLITEI,~NAYA TEKHIJIKA in Russian No 1~, 1980 p 100 ~Text] VTU IZOTIMPEKS DISK PACKS Technical P~ameter Ye5 5053 YeS 526~. YeS 5269-type YeS 5266 YeS 5267 Capacity (Mbits) 7.25 29/58 2.?~5/5 lo0 200 Number of disks 6 11 1 12 12 Nvmber of recording ~ - surfaces 10 20 2 20 20 , Track density (tpi) 100 100/20Q 100/200 200 1~00 - Recording density (bpi) 1100 2200 2200 1a1~00 1t1~00 Compatible with IBM disk pack 1316 2316 541~0 3336 3300.11 Specification # 2864 3564 3562 4337 5653 Exporter: VTO IZOTIl~IPEKS Sofiya, ul. Chapayeva, 51. Telephone: 73-61. Telex: 022731, 022732 COPYRIGHT: Izdatel'stvo "Zinatne", "Avtomatika i vychislitel'na~a tekhnika", 1980 - L412-PJ , CSO: 1863 1 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY EXPANSION OF THE CAPABILITIES OF A TELE~YPE VERSION OF THE ELEKTRONIKA-S5 . MICROCOMPUTER SWITCI~CNG SYSTEM ~ Riga AVTOMATIKA I VYCHISLITEL~NAYA TEKFINIKA in Russian No 3, ?980 PI? 5~-51 [Article by A. G. Novik, manuscript received 26 Jul 79] f [Text] The Elektronika-S5 family of microcomputers has a multilevel - interrupt system. The microcomputer is provided with the standard softwaxe and ~iardwaxe necessary to register and service interrupts in real time. For this purpose a higher level 4~bit interrupt register (RPVLJ) is provided in which one bit is reserved to d.isplay program interrupts. Although the RPW processes a generalized interrupt named by the program interrupt, its initiation ma~r also be hardware-generated. At the ftPW level, inte~rupts are processed by microprogram. The general- ized signal of the program interrupt is shaped on an AND-gate between the 8-bit program interrupt register (RPR) and its mask. Interrupts _ at the R,PR level are serviced by programs of the teletype version of the switching system (TVDS). For TVDS, the job is the program unit. A software or hardware initiated job program is equivalent to the appearance of the signal "log 1" in~one of the RPR digits. Up to Fight jobs can be handled simultaneously, two of which are assigned to TVDS. Jobs have absolute priorities. When a lower priority job is interrupted by a higher priority job, execution of the first one ceases and the problem having the higher _ priority is triggered. Because the general registers are doubly addressed memory cells, the basic information on the interrupted program is automatically retained. The systems table containing the origin of in- - cluded jobs is generated with the I}ispatcher. To develop very flexible, structured program software for a control system for technological processes, it is inadequate to have the six jobs ' standaxdly implemented on TVDS. To expand TVDS, each RPR bit is linked by _ hardware to ~he program interrupt preregister (PftPR) from the S/0 channel field of the microcomputer (digital inputs and outputs TsW). S~ai.tching by external computer coupling makes it possible to produce such a connection and also process pulsed initiation signals coming from the ~ control object. Each bit of any of the six PR.PRs identifies tY~e = independent sub-task initiated by the program or by the hardware (hardware , connection of jobs is realized by extA~^r.;.l connections). At the pre- register level, sub-tasks have a re 2ative priority in sequence. The FOR OFFICIAL USE ONLY , APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY c~~. ,~~..,eo.,~. ~ 1 ~ . (2) a,sv (3) _ct,.~ rte _ ( 4 ) `r~� ( 5 ) , n�~ ~ ~r mn, ~aw ~ars ~rsa ~6 ~8) ~g) ~1~) ~11) I A~~^~ 2 _ ; P,r(13) nmt (1 ~om~a t 1 ~ ~ ~p~e (16 ) - naunqo ~ 18 So~a 370 � Figure 1. Structural diagram of two-rank interrupt system and its control system. [Key: 1. generalized interrupt; 2. reserve; 3. RPW, WV; q, _ console; 5. RPR; 6. PRPRl; 7. PRPR2; 8. PRPR3; 9. PRPR4; 10. PRPR~; 11. PRPR8; 12. controller; 13. PRP; 14. PRPRi; 15. job i; 16. interruption; 17. monitor; 18. job ZPRi~]. system can contain up to 48 jobs in all (with a TsW register 8 bits in length). Sub-tasks of a single group do not interrupt one another, but are - executed in sequence, because to retain current information in interrupted programs it would take about 1.5 kbytes of main memory_ Interruptions at the level of the preregister are serviced by a re-enterable "r[onitor" subroutine which accarding to the number of the initiating control job, information in the preregister and data in the systems table of preregister jobs transmits control to the corr.esopnding sub-task (Figure 1). This _ approach was used i~n [1] . The process of elaborating program software boils down to specification of - program modules which realize independent functions and their connection into the system. In some cases aith logically complex and branched technological and computer algorithms it may turn out *h.at 48 jobs are not enough. In that situation, program and hardware supp~rt of interruption processing may be supplemented by yet another level ~of processing. Each PRPR bit is ~onnected to the lower level interrupt preregister (PPNU) from - among the remaining free digital input/outputs. For a different ap- plication it may not be mandatory to connect all digits of all PRPR to the corresponding low level registers. The maximum number of sub-tasks for the Elektronika .S5-G1 micre;,omputer with all possible connections to the PPNU 3 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 - --~~r+ \JVU Vl\L� ~u~Fyr.ear ~rpddow,e ~ 1, ~2~ ~x ~''~ae~3 (4) ~ (6) ~ ~(5) ~xrm, r ~ ~ - O /17NM ~ I/iMIR /YM/JJ' - - - - � /17hNJ/ N7/Ndit l~l /uer~rnrarp i F"p ~ 9 3a~a i 1~ ~i /'~7rrumr~o /YNNir l, ~ 1 abva !/1P i~ _ ` C~~,~ ; (14 ~ loci~w S~Io 1. Figure 2. Structural diagram of three-rank interrupt system and its controi system. [Key: l. generalized interrupt; 2. reserve; 3. RPW, UW; 4. console; 5. PRP; 6. PRPR1....; 7. PpNU 10.....; 8. controller; 9. RpR, - PRPRi, PPNUik; 10. job i; 11, monitor; 12. job ZPR ij; 13. supervisor; 14. ' job ZPR ijk). _ ! is 384, while for the Elektronika SS-02 modification it is 1,536. These ~ computers have different TsW capacity: S5-Ol has 8 bits, SS-02 has 16 ~ bits. For distributed computing systems based on mi.croprocessors and multi- ' processor complexes with many initiating signals, the three-rank structure ~ of the interrupt system is most acceptable (Fig. 2). The systems table for i low level jobs may be only partially filled, because the presence of all sub-tasks is not mandatory and is defined by the user in the development of program modules. If some jobs are not fitted in the system, the initial ~ address of the program trap which ~vill return control to the Supervisor should be put in the a~propriate line of the job tab?e to increase i re'.iability of program support. _ - From the standpoint of a standard TVDS Controller, the two systems described do not generate new problems at the control level, but specific subroutines from one of six high level problems. This difference is hidden ~ from the user in the internal organization and structure of programs of ; interrupt processing. He is given the opportunity to operate with jcbs having preset priorities and established service discipline. ~ The principle of modular programing for the Elektronika-S5 family of ~ ~ ~ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY microcomputers is realized by expansion of TVDS with re-enterable programs which may be masked in peripheral memory and be entered into the interrupt processing system by assigning the proper addressses in the control job origin table. = References 1. Izakson-Demidov, Yu. A., Kallistratov, V. A., Novik, A.G.: Design of an automated control system for large electrothermal installations based on the use of microcomputers. Mat. seminara "Kiberneticheskiye - problemy ASU tekhnologicheskimi protsessami", Moscow, 1978 pp 58-64. COPYRIGHT: Izdatel'stvo "Zinatne", "Avtomatika i vychislitel'naya tekh- nika", 1980 [ 399-8617' ] 8617 - CSO: 1863 ~ 5 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2 FOR OFFICIAL USE ONLY Software UDC 681.3.06 PROGRAM TESTING USING SYMBOLIC EXECUTIO+~ Moscow PROGRAMMMIROVANIYE in Russian No 1, 1980 pp 51-59 ~Article by Yu. V. Borzov] [Text] Program testing using symbclic execution is discussed. Efficient automatic systems for testing programs are surveyed. Problems in developing them are d~scussed. From t?^e iiistory of Automation of Testing The first s teps in automating testing were attempts on machine generation of tests us ing descriptions of the structure of the input data. This was _ done as ear ly as in 1962 by R. L. Sauder [1], and then developed later by H. T. Hicks [2], K. V. Hanford [3] and others. However, in these cases the tests only externally resembled (in their f~rmat) the data that the program was compiled to process. Specific test values were usually gene- rated randomly, and therefore, there was no guarantee that the generated tests would pass through all the branches of the program. Practice showed that this approach fo;,nd effective application in debugging translators. This is also indicated by the use of this approach in the USSR in RTK [ex- ~ pansion unknown] technology [4]. This approach was not used extensively in programming other types of problems. From another aspect, development focused on systems automating individual functions of testing. Systems were developed to gather statistics on the program tes ted (number of executed statements, maximum and rniniteum values - of variables, execution of defined � relations between variables, etc.) [5-12]. Some systems could automatically determine the conditions that the input d ata had to satisfy for the program to execute a given path - [5, 13]. Systems [14, 15] produced a set of paths of the program, that _ contained all branches of the program in the aggregate. ~ ; ~ All this information could be usefully exploited when compiling tests, i which, however, had to be conducted manually. ' ~ I 6 ~ FOR OFFICIAL USE ONLY i- i I APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2 'r'OR nFcICl'~1L [iSF. ONL~' Finally, in the mid seventies, several groups independently and practical- ly at the same time developed experimental testing systems using symbolic execution of programs. Some of them had the primary goal of full automa- tion of generating tests [13, 16-24] (in the process, the tests had to pur- posefully and adequately check out the program, in contrast to randomly generated tests). Others tried to look at the operation of a program -,ot in a specific test~ but in a whole clas s of them. The ultimate goal of this execution is to define the corres p ondence between classes of input and output data [18, 25-27]. Every programming language has its execution semantics describing: a) the range of definition of program variables (usually these are numbers); b) permissible operations on values of the variables (addition, subtraction, etc. of numbers); c) and rules for transferring contrel during execution of the program. It is also expedient to define the so- c alled semantics of symbolic execu- tion, under which formulas on symbolic values are produced ~s the results (one can say that ~ve are thus replacing arithmetic with algebraic calcula- ' tions). Symbolic Execution, Type I. Let us cal 1 a path the finite sequence of pru- ' gram statements a~, a2i a~, ak+l, if for every i(1 5 L/~ k) , - transfer of control from-Q;~ to a+l, is formally possible. The goal of the first type of symbolic program execution is to determine for a given progr~m path what conditions the input data has to satisfy su that control is transferred precisely along this path when the program is executed with this data. Example. Let us assume the program ~ POWER: YROCEDL'RE(X,Y); i Z = i; 2 J = i; 3 LAB: IF Y~= J THEN 4 - DO;Z=Z. X; 5 J ==7+1; 6 GU TO LAB; FND; 7 RETURN(Z); 8 END POWER; 9 Let us examine what conditions the inpu t data must meet for the path 1, 2, 3, 4, 5, 6, 7, 4, 8 to be executed. Th is can be tracked if after execu- tion of each statement we record the va lues of the program variables and the relationships between them (let us call this the status). Then the initial status will appear to us like this: - a) values: X^ al~--y ~ a~~ ~ and J are not initialized; - b) relationships: none. 7 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300040020-2 FOIt OFFICIAI. USE ONLY Here ai and a~ are symbolic designations of the input data. Given below are the statuses after execution of statements 2, 3, 4, 5, 6, 7, 4, 8: 2- a) X= a1, Y= a=, Z=!, J is not intialized, b) none - 3- a) X= al, Y= a~~ Z= i, J= i b) none 4-a) X=al, Y=aY, Z=1, J=1 b) aa]1 5-a) X=al, Y=a=, Z=1~ac.~, J=1 b) a~]1 ~G-a) X=al, Y=a~, Z=1+al, J=i-}-i b) az~i . 7-a) X=al, Y=a=, Z=1�a1,J=1-}-i b) as~l ~ 4-a)X=a1iY=aa,Z=1.a1,J=i-}-i b)az~i,aZ b 3 a~ o a o o~ a a~ v o q 3 0~ cd a~ v+~ G s~ ro v a~+ v, 3 0 c~ u o w.n m a~ oo ~ a~ ~d a~ o a ~n ~ 0 0 ,~u~~n v~q~ ~~u.-~ 1+ a.i tn a tn w Rf ~i G G~ cd cd �~i co ~ o ~-1 Cl �~I a G ~ o,~ u~ a~ 6 w~~+ ~ ~ a~ m u~ c~ u~ s~ o v o o s~ a a~ ~n .n .n ~ cd a~ q i a~ u a~ ~ ~ a~ v.c u o,~ a~ a a+~ a~ a.~ 3 u~ cd ~ ~ v ~ r..+ ~n ~ m~+ o o�~, u~ ~ ~d ~n ~d cd ~d b ~n a w G N ~ GJ t!~ 'Lf t~.i E3 Ci Ol L+ t3 ~ O O O cd _ ~d ~ v ~ ~ v a~ o~+ a a~ > ~ G o o .o a-+ q a .c oo w v v~ 3 y o~,~ ca 3 � c~a o010 w ~ a~ p o N~ ~d ~ S~i ~ 1J O Ql 'b (3~ W�I"~ f~ O O J-~ Cl a s+ ~n a~ cn u,~ v a~ a~ o~ u > cs o a~ ~ q.C a~ ~ a a~ a~ v~ ~o ~.c i a~ ~a o~~o on s~ ~n v, a~ ~ o~+ a~ v,.~ ca a~ i,., m a c~ ~ b~ ~n ~ a ~n oo q a~i~~>,o i m a~oo~�+`n a`~iu-~a~ip u~i~+~c"d wos.�+~, A w ~n v~ ~ o~ a,-~ a~ A o~�~ ~ oo a~ o+-~ a.c 00 ~ ai ~N ~ i v~ i v ~ i ~ v a .u ca v~ a~ o�~ a~ m ~ v, ~ oo a+ ~ cd ~ ~ ~ a~ o ~ q w o .n ~n a ~ cv ~ ~ .q a ~I ~n D a o o~ o o~d c~ 3 a~ o a ~n aa w p cn b u~ o w s~ a.+ ~ u s~ ~ o~ w ~ ~n G a ' G' 4J Gl ~r~l O~�J `r~ 'U Gl 1.~ 1 N P4 cd "d ~d W H 1.~ 00 �rl S-+ ~�J P+ 'U C'+ 'U Ci W G1 r-i S-~ _ t1~ ~ r-I O u O W~.~ R1 Rf O W tY, pa H=g ~ t~A ~U pa, U a ct1 GU) U~ P+ O~ N P~a Gl H ~-I ~ ~ ~ u~ w r-i ~7 q ~-I ~ ~ N I ~ b I ~-I I - s .n a~ � o aa~ ~n ~n~n �+~a a �.na - ~ o~+ a ~o v o~+ v a r-+ ~ ~n c~ ~ a � r~ a ~ o a - r-I ~.7 tA p.i N b0 ~ CL ~ N~d ~0 U1 fA C1: 1.1 `-i N U~ N W`~ N p. ~ � � � r-I r-I r-1 r--I r-I r-I 119 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 a Vl\ VL L' iVt[~L~ V VL~ VL\IJL ~ ~ 1"~ ~ w^' ^ ~ r'i ~ JW ~ ^1 ~ ~ ~ rl ^ W V/ ~ ~ ~ ~ ~ ~ ~ Y1 W ~ ~ 1~ M ~7 I I I ~ ~ ~ ~ N ~ ~ ~ ~ ~ p+ ,7+ 'J+ ~ _ ~ ~ N ~ ~ ~ M A A A A A A b0 tn _ ~ y~ ~ ~ ~ r~l .C 0~0 1~.~ p U1 N 4a O G) 'd t~ t~ q.~"'. S.~ �r~ ~ O G U N c0 O Gl rA ~ O~+ a.? '-I �rl O'~7 ~ N~i 3~+ E] q ~ ~ w~, a~ o u~ a a~ ~v o. ~ a~ a o ~v G cn o ~ ~a t-~ 'L7 71 [~r 1~1 ~1 Gl R~ R~ 1J ~ Gl fn f-I U(~+ f-1 w Cd ,n a~ a~ a~ ~ u s~ a a~ o o - o q ~ .n ~s ~ b o s~ ~e ~ m q ~v a o ~ 3 v a~ u v o.c v a~ ~n a6a~ ou ~ ~a~ ~ ~t ~ a-a w a~ v .N o ~ oo b .a a~ ~ ~d a~ o o ~d ~ ~ > s~ a~ v~ .N b ~ ~ s~ ~n ti a.~ a~ on o a ~ ~ ~ a~ o ~ v w ~a .u ~ b ~ ~ w o q~v v a o a~ a o ~d a~ a~ a~ a o ~ .'7 O �1"1 .S: ~U ~1 1J -f++ .L"+ 1J ~I p+ " G~+ U.L" N'd ~-1 1~ r-I r'~ N L+ �r'1 1.1 R~ �r~ 1J ~"~i U~ ~ou,., .~v ~+~no aa~ ~u o a~~ ~n o ~o a~ ~ w ~s p o ~ ~ c~ ~ u a~ o a~~ s~ ~ o o~u a~ ~ o co u a~ b 3�~ ~ a~ ~ G s~ cd o u~ N O,C ~ H O O Sa v~ O O�~ 'd af O cd U r-1 x w~ ~ a a, u~, w s~ u a u u~ a w a~ a m w ~ a~ b m a.+ ~ cv a~ m ~v a~ a �d ~d ~ p a~ w~ b ~n b b ~d o on v ~n u a~ o a+~ ~ o u v~ o v~ o+~+ a~ a~ u-+ ~ a~ ~ a~ ~ w o ~c o ~ b s~ w ~ .c - oo v~~ oo v ~ q~+ ~ v oo ~ a~ u ~n oo ~n b _ o ~ ~ ~i a~ o ~ a~ oo �~t ~ b cd ~ p ~n ~ ~n cn m ~n ~ o ~1 a a y cd 3~ �~1 e) .C Gl 7, a1 w~ U~ al ~ o~ cd N~.C ~j tn cC ~rl N r-I O~ A+~ Sa .a A O tn ~'c7 cC c~ .-i ~-I q cd w ~ u 4-i A CL ua .o ~ I ~ 1.i bD 1~ U ,~'F~' O t~ C O ,-I ~ O �rl 4+ ~n ~n ~ o~+ a o a w ~ a a - a~ ~v w o " ~,a~i ``''oa.�u~~ ;~a ~uar� a _ p� a~ w ~n v,~ a~ a �-a ~ a ~a = v~ w.. u m a~~d v cn s~ x a�~, p, b- o v oo : a ~n a a ~a N H - H _ o ,--i ~ - a ~ a H c~ ~ m ~ ~d m _ - x o o a _ ~ w o r~ a~ i a~+ i ~ ~ � i � w � a o r+ a ~ vic~n~aNi ~ ~c a~ o`~o~ ow ~~a ~ob qa rn cdw ~ oa N~~ 3 N~ Q R) N~~ N~ V~ N a~ N~~ ~ . . - r-I .-1 .-1 ri e-I r-I _ 120 FOR OFFICIAL TTS~ ONLY ~ APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300040020-2 FOR OFFICIAL USE ONLY ~o v ~ ~ _ ~ ~ ~ i ~ i ~ ~ ~ ~ ~ i ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ m cn m O O ~ A A A A ~ w 0 A ~ ~ N cd r'~ ~ N ~'b ~ y~,~ ~ ~ 'u ~ ~ I ~I ~ ~ U ~ O ~ ~.v~ ~ ~ aao~+ a~ o~~wa~iqa w~~n oGa..~ ~+o~ o~c~~v~ o-~~+ w c~o q c~d ~ C1 p a~ b~a. N~ S~-+ a G o p v~ ~ q~�~ o~ q a+~ o v o u~ oo a~ v o~ m ~ cn o a~ ro q o ,n ~ ~ y ~ a 0o a~ a~ u v q a~ w~' a~ o~+ ~ ,c ~ a m o u w~ a oo ~n a~ ~ o v~ o~v p ~ N~ cd o c~ o q a~ u~ n~ 3 N~ N ~ ~ ~a~.C+~~+ o~ob~a~ aa i.~ W 4I .C 1.~ O O U C i GJ i-~ h0 U,L~" Cd N,~ i.~.~ 00 C+ f: t~ .A W r-I ~d ~ p C) ri 1~ ~ a,~ a~ G a~ ~d a~ cd o ro o a~ a~ x as a' ~ w o ~ v~o .o v ~ u�~ ~ u.c c, 3 a~ q a o u G ~ ~ cv cd 00 ~a W q~ td ~ ~ cd ~~-i ~ Gl d 00 .C 4-~ ~ N cd R1 rl ~ O Tl r-I b0 N rl CL W O ~ O[+' . L' 1 r l C~" O N .C 00 �rl O+~ O ~r~ ~ O U r~-I i Q. �rl .C aJ C: ~�1 N ul r-I S-~ N U 0 W ~ ~ ~n ~ ~ U a, ,x ~ ~d ~d ~ c~ N u-~ N o q+~ oo a~ s~ u s~ ~ a~ v a~ o o a~ w a~ ro a ~n o.. a w o~~v ~d ~~dy a~ ~ o u F~ C7 '1"1 �f'~ 4-1 OD 'Lj O 4-1 ."y O Fa 1~ rl ^ IJ R~ ~1 C"+ O fn ~d a~ ~ o o~+ ao a., a..~ w cd u ~n o~+ c~, a~ s~ a b�~ cn b u a a~ ~ u~ ~ N~~ b�~ a a~ �rl ~rl H O 3a 4J 3-~ t3~ �rl N U �r-I cd O 4-1 1~ w R1 rl 1J cU Gl i.~ tA r-i ~ N 4J N f..' O 71 q~d OJ U~' 4-~ O N tA �rl i-I tA �r~ q cd p R1 a v~ ao ~v p, oo ~ s~ u~ x~ cc ~ oo ~ o..C a a~ a~ v G ~ a~ ~ ~ a~ �v a~ �v m~ u a~ g ~ v o�~ u b a N cn p~C cd cn ~ o cr o~+ 3~ cd y,.., A ~ ~v-~i ~ a ~ o a~ ~ ~ ~ G v`~i ~ A ~ ~ a i ~ u� a~o a ~ 0� q ~ ~ i-~ U R1 'r7~ U ~r-I (r" 1~ ~ 1-+ w a~ a~i a. ~v .c ~ . a~'i ~ ~ o a na a~ a u~ ~ ~ u a o c~ a+~ o a x a a~ a ~d o a o ~ v ~ a ^ a a ~ ~ ~ ~ H ~ o ~ ~ .~n ~ u _ ~ ~ ~ ro o o ~ r-i ~ ~n ~ ~i ~ ri ~ a, aa ?ri ~ a a~.~ ~c a. = a ~ ~ ��~o ~ ~ ~ oaw ~ooaa ~b aa ~a~ aoa N iJ +J U N U N N Pa ~ N~ i pa.i ~ N~ y ~ N~ v *-I r-I ~--I r-I r{ ~ 121 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 r~a ~rri~ieu, ua~; UNLx ~ i- ~ ~ ~ ~ ~r1 1 ~ ~ ~ ~-1 a aa., aa., a a~ o0 N ~1' ~t N ~T N ~t M ~O ~D ~O ~--I ~ ''-I ~ N N N Cl ~ 41 ~ ~ ~ ~ a ~ ch A ~ A A A'd N q A I A A ~ ` a ~ ~ w a~ ~ a~ a~ ~n o a~i o o ~ o - v�~ ~ ~y ~,~~u .c~~v~ a~+~ a ~~a~ N U a.~ O b0 ~ q c0 O c0 ~ O ..C ctl N.C ~ q cd W~ b0 r-I N U�rl O V ~ W~~i-i ~ ~ a~ o o ~ a ~ o0 0 a a~ s~ u~ ~ v~ a~ v b~~ u, o~, a w v cd ~ N ~ u f~ o y~ N�rl q .a O N�r-I 3 4-i O cd N 1~ 4-r O cd cd af W O A ~ .C !n tA O O W �ri 'd O~rl ~ 3 c~ O ~j O~rl O cA a.? .-I u G' r-I 41 U�rl ~ b0 'r~ 1~ a~ E3 ~ ~-1 J~ 1.~ �rl ~C Ci O O~d U1 t".. U b0 ~d q U1 U q U 4-+ Gl O~rl O cA C: U N Cl 3-~ ~ U H~ O R! N E3 .f i N O 4+ O~.' 1~ 4-~ Oi O f~ cd S-+ ~n y o s~ o a o a ~ ~ o ~ ~ ~ ~ ~d ~ ~ a~ ~ G.~ eo a.i ~ u u~ ~ w a.~ c~ q�~ cr v-+ h~4 ~ o~+ G v a~ ~d ~ a~ a~ ~ a~ ~d u a cd u s~ cn ~a ac ~ a~ oo a~ ~a .a ~ oo s~ q on s~ b ~a oa~ .x+.~ ~n o~q u~q o~ a~ou a~ a~ ~ v 3 ~ a~ u a~ o : ~ ~ a~ q ~ ~ ~ ~ � ~ 3 ~ .c u ~ ~ a~ ~n 0 3 ~ ~ ar ~f a .n ~ a~ b o a,~ u.a cd x.~ G a �~I b cd q u cd ~d N o S-+ ~ r-I ~ O �d 3 ~ ~ cJ ~ .a rl cd ~ ~ 3~+ a~~ a~ a~ o~~ s~ w a~ c~ s~ o o ~n o w~ a . c~ o o�~ .C .c o 3+~ o o+~ ~n o u s~ w a~ ~d o u o w v ~n u.n cd w u q a~ a-+ u a o o iE .n a-i u ~+-i w~ u N v~ ~U ~n a~ c0 ao ~d w aJ cC o~ 'b ~.C ~C 3-i i~ 4-i al 41 b~~ N cd b cd "l7 'd �rl a~ ~s ~n a~ o o u a a~ o~ q~+ a~ o~ ~ ~ ~n b~.+ a~ oo a~ oo u q,., o.~ w u o G~ o o ~ G a~ a~ ~ q G cd s~ ~ ~ ~ v, N oo ~ u ~d ~u ~ ~ ~ a~ cd ~7 ~ ~ N a~'i o �d G a,x u a~ ~n a.~ a~ o �d ~ ~ a b~ - ~n u G a~ N o ~ G v, a o0 5C u, N~ ~ N m ao m v, a m cd a~ u a~ m�~ o cc a~ ~ a~ a~ ~ o o cn G.C v a~ v o 0 A c~ q+~ o p u u.n A~-, w o A..~ 3 q~ ~ N,-~ ~ A.~G A�-I u N I r1 I ~ ~ ~ ~ �r~ ~ ~ Li ~ �rl ~ p~`',,, u~i o o u ~ a u u~d q c u~c a, ~ a u a a c~ = u G o m u,-~ a ~d a u cd cd ~ wa ~,a ~ a ~ ~ ~ ~ v�'i ~ ~ ~ o ~ a+ - a - ' � o ~ c~'d tn N �a � 3~ � ~ r~ ~ a0 U F+ O~ ~ O~ '-1 _ N - c*1 ~ r-1 ~-I ~ rl 00 r-I N W r-I d0 R1 N rl N b0 N'Tql bD N~ N$ N~ U O p~.i N~~ N D N~ N cd r~l N CL . � ~--1 r-I r-I ~--1 r-I ri ~-I 122 FOR OFFICIAL TTSE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2 FOR OFFICIAL USE ONLY ~ ~ ~ w w r..~ 0 ~1 w ~ ~ ~ ~ ~ ~ V .0 - ' ~ N 1~ ~ e-{ ~ UJ ~1 pCh,~ \ V1 D+ Ci F~+ P4 f~ Ci ~ ~ ~ ~ ~ ~ ~ ~ ~ - N ~Ol ~CJ y y ~ - ~ ~ ~ r~'~ ~ iJ+ M c/] t/I (A C/~ fl~ V] A A A A , A A cA I N N O q .rl u W 1~ 'd p~ q cd ~ p c~d ~ i.C ~ ~i~-i Q E3 ~q r~i O b0 F3 G a-+ ~ o ~ ~ a ~u a~ a~ ~ a~ u~ u co a~ m ~ a~ ~-I .u u ~n o~-I 'Ly s~.~ cd cA N D 1~ N~ O GO O D~ N 1~+ ~'C G~l q O~--I r-I �rl U N.C S-~ H JC tA C~' ~ Ul F3 Rf �rl O ri O F+ cd ro.a 3 w~ a a~ a~ a.+ a~ a a~ �v 3~+ .c ~ a ~ ~ o s~ c n ~ n u a ~ ~ a o~ U) 41 d0 N N W r-1 ,C O 4-1 O N N tA ia U Gl fr' ~ ~n ~ a v, ~n ~ s~ w o~ o~+ ~ a~ u-~ a~.~ cd m~ a~+ q~ c~ o ~ cn cd v~ o ~~'~Jc ~ ~ cv ~ ~ a~ ~ ~ oo ~ ~ ~ u v ~ a~ a a ~ o ~ ~o ~ o ~ o o ~ i a~ w oo ~ b ,n ~ o s~ ~n ~ ~ u o a~ a ~ ~ G Ul .f., CO q O R1 V] F+ �rl 1.~ ~ r-I 1~ H P i-~ ~ O hi N U - .L" cd CJ O 3~+ �~-I ~ GJ 1~ 'b r-I i-+ ~'tf ad �rl GJ 1.~ b0 t! 'J .C ~ ~ .n a v ~ o ~ o o ~ a~ ~ ~ c~ ~ ~ �o _ m a~ ~ q u�~ ~ o,~ o ~d G~ ~ a~ o 0 - v~,.+ u a~ ~ o m u m u a~ ~n w~+ xrdG ,~vv~ ~o ~ v ~n oa - ~d ~d c~ ~d q o a~ o o ~n a o~c a a~ a~ o ~ ~ a~ o q.~ cd u~.~ ~r v o.a ~ ~n w v+-i a-~ ~ a s~ v on ~ ~d ~ ~ o .c o 0 u oo a ~ A a~ s~ a-, w cd c~ cd ~ ~ 3~, rl G~ r-I �ri .C OD O O O N O'U 4-+ ~ O J~ tA Mi r-{ i.! p N R1 -ri JC r-I O i~ W ~rl W.~'.~ O.C O 4-I cd I O'i7 C'i O CJ 1.~ id cd fn ~ �r-I tA r-I R! U 1~ r-1 ,L" i-~ C O rl I-I �rl R! 4-I r-I T1 A GJ ~0 'b U) p .7 'd bA '-I a.1 i.l cd U JJ O R1 .C U O~-I O~-I GJ O~ b0 Gl m U cd ~tl ~ p cd O q cl1 1J b0 ta 1.~ a O �rl C: tn u' i-~ rl ~'i A O.~". Gl 3-t - u~ ~ GJ N F+ b0 a~ O O b0 Gl G) .a H b0 ~ N U O.C cd v o �d ~ v,., u m u~ c~ q v a U1 O.L"~ O V! A~ri O N~ N i.~' GJ i-~ ~.Li 1~-~ Gl r-I N.C ~d 4-~ ~ p~u u p~ m u qw acd A a~n~+ o A aM p+-~ N o a - ~ N r~ ~ N Ci N ~ U] U O J-~~ ~ ~ a a~ o ~ G a`~i ~~~.-i u ~ a.01+ ~a o ~ ~ u o ~ a ?�aa a~ �u H ~ w a~ a v~+ o o.~ ~ a ~c ~o x ~n P~ a o a~~ c�~a U d0~w a~ - �a~ � �~uo~.o~v a~ �~G~= .cd , ~ G ~n v ~ ~ o v a~ o0 r-1 N R! N N N W N b0 d0 bA W Gl 1-~ (A N~ N O N 4-I � N C~+ N 1.1 N W N~ r~-I �i-~I �r~l 4~.~ ~ fA N R~ O iJ N~A r-1 r-I r--I '-i r-I i-1 123 FOR OFFICIAL USE ONLY ~ APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 ~ . ~ a~ ~ ~ ~ ~ ~n a~, a~i a~i ~ - - ~n u~ u~ ~ - d ~ d ~ d , on - ~ ~ ~ ~ ~ ~ ~ _ cd ~ : cn Pa ~n u] cn ~ ~ ~ ~ ~ ~ ~ f!~ 11 Cn V~ ~ r'1 A o0 O A (a A ~ G y �,-I �rl tA cd ~'i ~~.1 4-1 ~ r~ GO ~ .C i a~i a~ v~i o~ . i~ o~ a~ ro a~�~ a on o 00 o a~ q�~+ ~ E s~ ~ o ~n o u ~ . ~ m ~ .c ~ v a d~ ~ k~ a~ p~ c~ ~ m o~ u-~ a~ a~ o ~ ~ a~ ~ a~ ~ a~ cd a~ o v P q ~ o o w~+ ~ m a~ m o a~ ~ a,n 4-+ b s~ o.n u o~a u ~n s~ - p w q o p u o o~+ 0 3~ ~ ~ I N CJ o ~ i-i ~ N ~ cd ~ ~ ~ ~ ai a~ G'' u~ ~n a o ~ a.c o~+-~ u ~n : U O ~ ~ O I w , ~ ~ JJ l~ U N ~-I .C~ (A r-I .t+ U ~'i 'b ~ ~ O f~ ~J I rl C~' ~ UI O r-I N U+~ ,a O 4a ~ G' w P. q O,~ 'd L1, b S-i U O �r1 O ~U O O U1 1-i C cn a q o cd a~ u-~ ~ b q w a~ oo i ~ t~ cd O F3 ~�n LL O u � m t+ 00 O O'L7 rl i s~ a~ a~ ~ u cn o ~ ~ ~d ~ ~c oo s~ ~n a~qoa ~~d wa~~+ a~~v a~ ~ �~~+~,oa~ ! o ~+u aoos~a ~oo ~a~~ 'c - v ~n ~ ~ ~ s-~ v~ ~ ~ a~ ~ ~ ~ - ~v q�~ u~ oo .-i b~ o+-~ a o ~n ~3 0 b r-+ ~ a? o a o o ~ o~ bo ~n ~d s~ a~ w~ u ~ ~ w ~I ~I cd b a u a b .c~ ~ o .C o o~ m O cd ~ o ~ o G Cl cd U _ w~, ~ a.~ q v~ G u ~1 a~+ N~+ N u ~ cd ~ u~ w 0 0 o�~ ~v a~ ~ a G a~ ~~d o 'b ~f~ ~ t-1 Cl 4d 'L~ ~I iJ ~ r~i 'C~ b~ ~ 0 v cv ~ a~ o vp v a o ~n a~ v~ oo a~+ ~ oo o H w.~ G cd ~ ~ q tn al u q�~ q a a+~ b0 r-I ~ N ~~--I cd 3~+ 00 .C'+ ~r~l cd �rl a~ v s~ �d ~d a~ ~ cd ~ > a a ~ co ~ ~n ~ o~~ a~ a~ .-i v, u m q v a~ y c~ ~ a~ c~ a~ a~ ~d ~n w u~d a~ u-~ o o a.n a~ ~ a~ a+~ a~n ~ o ~n u ca ~ o~n ~n u o~+ A aq a r+ o0 ~ aN ~ ~a A o0 0 ~c~i o 00 o a oa ~u a~ ~ u~w ~ m a cv ~ q o ~ o a v w ~ oo a o~+ v�~+ ~c a oo w b�~ a ~ p cd ~ a o ~ ~ a o _ ~--i ~n aa ~ w ~ ~ ~n w ~ = a a~ a~ ~n ~ a+ b c a' o 0 o _ v= cn ~n o0 0 � 1~ uNi bC o u o ~ ~v o ~ ui ~i q c~i ri cd ~ cv o~o a~i u~f p. c~i c~d ~ ~�u u . _ N N N N 124 _ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY _ .o . ~ ~.t 3-i H -~1 r4i r~-I A ~ .a �a ~ ~ ~ ~ ~ ~ N ~ ~ d F~+ d ~ ~t N ~t I I ~O M N t/~ ~OJ N ~ ~ ~ ~ ~ ~ A ~ O .O A A 0 c~ ~ w N 4-+ ~ i ~ ~ ~ O LYi O r-I I W a o ~n v ~ ao vo ~ ~ ~ o,u ~~G c"~n s~ c~o ~ ~ ~ ~ a~ o 00 � - v o a ~ .n ~d a ~ �d b ~ a~i ~ u w p' ~i~i ~ ~ m w v~ ~ a cn al w o v+~+ cd a~ ~ q u u p, o ~ a ~ ~ ~ u a~ ~ ~ ~ ~ A ~ ~ A ~ u..~ ~ a u s~ ~ ~d s~ o a~ a 0 0 ~n a~ ~ o ~ o r+ r+ o .c ro w oo a~ ~ 'o ~ ~ ~aa~~+o cuoo Goo o ~n ~ ~ ~n ~ o i - ~.a,~~+a ~ ~~d ,�u�'~ ~a`~i~m ~~w~�cd ~ o~ ~ ~a~q cd~+q~+ R 8.~ o 0o m b oo co .c a~ 0 3 o q o o o~s7 O~ .a.+ v~ o cd w a~ w~+ ~ v q w a o a o w p ~ u p~+ ~s~oo w cn wo�~ aro~~d c~ ~d p m v u b u ~ 3~ ~ v�~+ a~ b bo u a ~ o ~ cd ~d a~ a~ ~ o a~ w w.-i ~ G N ~-t p w a~ p~ o a~ s~ a oo a o0 0 o b v, u a~ a a ~ b~ a,.a - ~ ~ m m ~ ~n o a~ o u ~n~ c~ ~ ~d a~ ~ v~+ u mw u ~v ci~ q p o u a~ ~ A ~n A oo N ~ o N q g u ~ o ~ 4-1 W N tn O Pa U F~ N RS i~ ~ I ~ �r~l '-1 r-, a a~ ~d ~ s~ ~ cn u a~ ~~d cd a w o~+ a o o ~n ~ a~ w ~ - ~a ~v a,~ oo o i~ G~+ .c ~n s~ i-+ e~ - s~ N= a~ ~o o~ oD ca w u a~ u~? a~ a�~+ - a, ~ a s~ ~o a ~ a~ s~ ~n v~ v~ N �d o ~ a~ m a~ a a�~+ a~ a oo a - ~~,m a.`~�~~ G ~ ~n ~ ~ou~eova i v ~~m a~ducu a~a~o~n a~a~ ~+oa~wa~~ a~+ ~o m ~ s~ v~ ~ ~,.C u a~ cn c~ a b~ o., a u o0 0o a.+ u al ~ q n~ w u a G ~ �~s.�+ �s�aos.�+ �wc �u.~~�~oo~~~~w~ ~n m c~. a w a. o~ a~+-~ c~ o+~ a w u~+ ~ o~ _ . . N M ~t ~t ~1' _ 125 - FOR OFFICIAL USE ONLY ~ APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2 ~ ~ ~~.~..u ~~JL V~~1+~ - ~ 1w",~ W JW ~ ^ ^ WI^ ~ Y 1 \ V, ~ w ~ d ~ ~ ~ ~ ~ ~ . ~o ~ ~ ~ ~ ~ N D+ ~ ~ ~ ~ ~ ~ M O A A A A A w ~ ~I ~ O 00 N Gl O~d u ~ 1.1 ~ J~.~ ~ tA 'Ly ~ ~ � w a � G o .c ~ ~ ~ v~ o a~ ~d ~d o ~ o ~ o 4-I ~ V C~' 3-1 r~ 4~ L1 4~ 4~ Li U I O~~~ O O~ 4-1 cd 4-1 O i~ Gl ~�r~ i-~ O r-1 O S-~ O Ul N~rl 'C ~ ~ tA iJ W 1~ 'b cd O fA ~C Cl ,.C Li fy ; o~ ~n u a a~~ a G~+ co ~u ; ~n a~ v~ o,~ ~d a~ o~ q ~ ~n v~ a oo o o G a cd ,~-i s~ ao ~ cn o v G a u~cdb o ~o ~+u~�~ cdu w~o s~ oo u�~ ~ a~ ~d oo ~d q o 00 ~ u a~ G ~n ~ ~ oo ~ o ~ ~ o ~ w�,..~ m cd ~ G N~ cd a~r~l a.+ cd ~ 1~+ �ri N.{". N'~ O N b0 .O 'd ~ U N rl ,.C 1~ ~�i-I O D U F~ cC GJ ~d ~~rl tJ 1-~ - 1.+ N ~--1 �rl O W .r. ~ v .c ~ ~ o o . S-i ~d 1.~ O Ql 00 OD O OJ ~ Q 4-~ ia 4-~ Cl cC CL .C �rl Q 4-1 ~ 1x''.? 4-I ~A ~ ~ 1 I O G'+ O 3-I ~ w p ~ N r-I ~ !A O 4-I 11 tA tA O,-I �ri f-~ R1 C: C+' i-+ 'L7 N~ N - b,., ~ a-~ c~ o �d o c~ o 00 a~ v c o u, a ~ v ~ ua � d v w~ cd i~�~ N 6 c0 1.~ CJ N~ U1 N~d ~.1 ~ Gl ~ 1~ b0 i-~ .O ~ .C ~rl ~ N 'c7 �rl �d c0 ~d 9 ~d o a+~ o~ a~ w q N v, a~ o�~ a~ ~ W w ~~3 1~ 4-I D' F' �rl cd rl R! .t"'. �ri Cl ' i a~ o w a~ ~ a~ oo co s~ cd a. o ra~~+uo ~+~s~ ~u~i~`~o`~o v ~oa`~i~~+� . - ~~v~i o ~ A a c~i q w o ~ w ~ v v~ A v O ',a, ~ ~ c0 G N a~.a ~ a~i c'~i o~''o ? ~ ~ aa`~ � ~ c~'d ~ ~a a~~ .~n~~ ~ ~ oo ~ a oba ~ co 00 v ~ a~ a~ ~n w v�~ ~ a~ a~i v~+ a a ~ a~i a~ ~-~i ou ~ ~ ' a, " cd a ~ ~ ~a a~o " ~ ~ . � ~ a"i � a � a � ~ � ~ o ~ ~ ~n oo ~ o ~ w oo b a rn ~ . . ~ ~ ~ ~ ~ ~ 126 " FOR OFFICIAL U~E ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY ~ ~ ~ ~ ^ ~ ~ ~ G~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ O J.1 G7 G) ~J x~ ~UW UF~aQ,' ~ tn F=+ ~ ~ ~ ~ ~ ~ ~7 ~ ~o ~O ~-~1 ~ ~ ~ ~ ~ ~ ~ ~ Ja ~ ~ ~ O M A A ~ O O A A ~ 3 ^ "L" 41 ~1 - ~ I o o ~n o id ~n ~ C w i P~~ w w w p g t1~ F+ i~ O fa ~A O O rl r-I QO ~A V 9 ~ .u u~ ~ ~ 1.~ b0 Rf ~ ~ 1~ cb C ~ ~ 0o N~o.~ w�~,�-i~ s�.~~ c'' cv~~ a`~i,�-i~�~ ~ ~n ~ v ~ u ~ a o a v, o a~ ~ ~ c~ q ~ o+~ ~ a.a ~c w~ c~ a~ oo a o o~~v c~ a. c~ ~+~~+~3 ~o s~ ooa~u ~oa~ +~wa a oo~+~q o w� a' ~v a ~ �d ~ o v~ ~ ~ cd o o - ~~n ~aoocd ~ ~ a~a wma~v ~av~~ ~ o a~ ~n ~ v~ o ~ u b c~ .C ~a o a~ ~ v a~ ~ ~ u~ u o u ~n o v w ~ ~ ~ ~ a~ ~ ~ ~ a~ ~d co ~ G rl �~1 v t-~ ~.ca i-+ q c~ co a..i a-~ N co a.[ cd Cl ~ d u O N O al W U o O'd 00 y~ a~ w~d x a a~ .c ~n u a~ a a~,~ o~ a~ a a o~ ~ oo a~ u ~ o0 5+' g o 0 o iC ~ ~ u,~ o q o o,n o~ o CJ o Cl id N ~1 ,-I u�~1 N a~ cd cd O u rl rl i-~ ~ a~ F+ .C 1~ O 1.~ 3~+ W~.C ~ N d~ ~ Q O }3 N,-~ 1.~ a F+ ~ a+~ ~ a o,~ ~ v~ ~ o adw o a> cd o co wba cv w~++ s~ .N w o d ~ a~ w v~ .o ~ a~ o~+ a~ a a~ v~~~ o w ~.~o~~~+N a r~p~ ~ o~n ocd.~p ca.G~noao a~o ~ u ,~C a~ ~o ~ a a~ u u w a~ m y a~ ~-I ,a ,.i ~ ~ ~-i H ~ ~ o ~ v ~ ~ ~ a"i r~l ~ N N W v1 1~+ ~ H tA ~rl O~1. ~~rl O Gl W O 4-i ti-I r1 tA ~ O 01 N rl O~ W ,'a~ 1~ O O Gl p+ $ 1~ R 00 W 4-1 rl W O R) ~ i~+ N.C p N p+ T7 h-~1 'Ci 'L7 ~ tJJ i~~+ 'L~ 00 d0 U~ 9 ~ O J~ v! oq o~n~~v~ o�~~~+ va~~+a~ vaoqc~ v~G~a,~ ~~`~o 4-~ 8 O l+ U W~.+ I td .C O tA L'+ C.' GJ H C+ `r~ �ri N ~ ri ~ (n a a~ a~ a ~ ~ oo ~ o 00 ~ ~ ~ oo ~ ~ ~d ~ s~ a - v a ~d ~ ~ ~ ~ .n ,a ~ co a~ ~n oo ~ - a~a~a~m~a~~n a~a~s~~ m~+~~' cn~oa ~n a~w~a~ ~vov o - ~ cn �u ~ v w u a w ~ u q v�i a c~'d A o~'o u~ w o [-~i ~ a+~-~ i ~ O O 'G ~ ~ N Q ~ ~ ~ ~ ~ ~ ~ ~ - a - a o v~'i u a a o aai o A, .,-~i a a. ~ ~ ~ N '~7 3-i O y ~ ~ ~ !"a ~ ~ GJ 1.J G! 1.J ~"i ~rl �ri a o~ o a~i ~-i c~i a~i ri ~ a o a ui o a ~q ~eo ~~n ~oo ~ooa ~~qa ~~a ~ ~ ~ ~ ~ ~ 127 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300044420-2 ~ r�. .i~ ~ rv~~~r~ ~I~/L! a ~ ~I ~ r`~ r'1 ~ ~ ~ ~ ~ a v ~ ~ ~ ~ ~ d ~ d - ~ ~ ~ ~ ~ ~ ~ `o - ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~ ~ ~ m � cn o A A ~ A ~ O ~ A N ~ S~+ o ~~--I W u~ w I c~C r-I ~ O t+ �rl o O ~ ~'S7 p ~ ~ ~ W a~ ~ O ~ i-i W O v I b0 N~ b0 ~ I tA 'CJ tA ~�rl ~ W O rl rl O' C+' ~-1 t~ .f. o~ o o a~ a+~ cd ~ v ~ w u~,n ~ o ~ ~ 1.~ cd ri O~ ~~O O rl ~ N O rl rl O a~~ 3~ o~ oo~ ~ au.c G D~ u cd ~ s+ o+~ a+~ ~v ~a v G o ~a a~ ~ a~ a a u cd ~ ~ a~ a~ q~+ a~ a~ o a~ �c q~+ c~ a w~ o m ~n .n u~+ a~ a N~+ ~o w .c a~ ~ o v~ o 00 ~ a~ gc~ ~ ~ w ~ ~ ~ ,"~-i r~-I c~d ~ ~ ~ ~ w ~ w a: o ~ w w ~ w a ~ ~v a~ o cd ~ w ~ ~n ~v ~ o ~ ~ o a~ on o ~ s~ > a~ ~ oo u o o v a~ ~ ~d a~ ~n o b oo a~ ~ ~ q ~ ~ w ~d ~ ~n o a~ ~n a~ u o b ~ u~.c o 00 u-~ g w a~ a. o~d s~ ~ a o cv a~ w a~ w o,.a ~n ~ b~ a a~ oo ~a ~ a~ ~d v~ o+~ o a~ u v a~ o0 ,~ao .c G.~ ~v~+o~a~ a~ v~~am q.c~ ~ ~ fr Q~ bd 'P'~ ~ w ~ ~ ~ W+ '1"~ b ~ ~ ~ ~ b ~ '1"~ p,~ o.~ oo a~ o q cd a! ~n a~ ~ T1 ~n o ~n u,~ oo ~d ~ a~ a~ ~d o ~n ~n ~ ~c a~ w v~ - y p ~ u G w w E m co D, o o d ~ N v~ �r~ F+ N 3~+ cd Gl o~ ~d tn a cn cd m q u N.c'. OD ~.y. U i.+ d ~~H 00 L"+ m~+ Ol d 1~ i-~ Fa a1 3 ~ +-i p'~ c~ m.,~ 00 ~ Gl i~+ b0 U N ~~-I cd 00 N ~ O 3~+ . .,a c~ ~~v a~ o 0o a~ o o..C ~ o u o+~ r+ a O W t~ O tA R) rl u" .C ~rl F+ iJ 4J ~rl N O W N W O Ul O tJ W 00 ~. owa~a ~ m ~na ~N ~n N o ua . � � � ~ ~ ~ ~ ~ 128 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY ~ ~ ~ va ~ ~ ~ ~ N ~ H i-~ N 3.~ c~0 ~ o c~d ,~o ~ c0 ~N ~ G .a cd vl ~U 1~.i ~ O 00 U y~ cn.a c~d f~~ W~ v~i 1 I ~ ~t ~ ~ ~ .N-1 ~ 1 I ' V~ ^ CI~ CJ~ D'' ~ 7+ ~ ~ ~ ~ ~ O A O A O A O I I m ~ '1 a! ~ ~i w o~v~i v c~ ~ u s�a a ~ p a o ..a a~ a a ~ w m a a~-! .u c~ x a~ v o o,~ FI P+ f11 f0 'd 1~ .C Gl ~ Cl f: 1~ ~J b0 ~ b0 r-I 4a H ~,.C 00 ,C rl O 6 4! ~ cd c0 O 4-i ~ 1~ p t~ r-I O m 4-i 3-~ Cl r-I �rl 3-~ O 4-I 'd �r~ �rl tA O a ~.a ~ a~ b ~ ~ o~ w w u a~ tn o q q o q 3~ ~d o o c0 q m 'U ~ cC rl O o U r-I ~ p' o~'o �D oo b ~ ~ ~ ~ o~'o o ~ ~ ~ ~ bo a~ o a~ ~ a~ p~ b o�~ o~+ a~ a oo a a ~ .c ..a ~ a~ ~ oo ~ ~ a a~ ~a ~ a o v ~n i o�~ a a .n c~ ~d ~~~a ~cd o o ~o 0o a~ oo ~u ~ a~ a ro~+ ~ u s~ a~ a~-+ G s~ ao a~ oo a~ a ~~~o a.r N H rl �rl OD O .L: .O R1 CI U GJ 1.7 W 0 00 ~ ~d ~ o a~ a~ a�~ a~ o a~ . a o ~ ~ ~n ,.C ~ v ~ ,c o ~d o a ~ ~ ~ ~ ~d ~ ~ ~ .n ~ a~na m o o ~ ~~+p~, �~~o w N ~�~-I sa 3 G co a~ m a~ 3 a~ 3a i ~ ~n ~d ~ o ~v x b > q a co 0 o a~ ~ G w.~ o q ~ oo a~ t i ~ ~w ~ w ~ o u ~ ~ o ~ ~ c�n~ Cl T1 ~0 "C~ r-I u7 U MI 'b W q i.~ N G c4 ~ O! O W G1 O p t7' N i-i ~ 4-i Ol t~ a-? U~ p O O~ ~ cd GI 4a C7 00 ~d b0 O~ S.+ V1 GJ b0 rl cd 1-+ F+ O ,C �rl N �rl i.~ 'd O N U rl V! fA 't7 00 +~~n~ ~n~ aa~o ms~~a~ a~oa~a~ ~ ~b~ Ar-~i o ~~w a A>~ o ~ ay ~ o ~a�+~ o ~ q o a~ m s~ a a~ a a~ i m~ u a a o w a a~ ~ i w a cd .n ~ a .u o.-a ~n .c ~ ~n ~ o a.~ ~n a N ~ o+~ on a m ~s o x,~ ~u cv a�. ~ a o~+~~ ~s ~mu~n~ u~n ~a a a~ q w a~~ a~ = a~ t s~ w�~ - N _ a a~ ao a~ o~+ oo s~ ~ on t~ ~n a~ a ~ a a~ p~ ~ G a a~ o~d a w ~a ~d a ~s ~a G.~ s~ a a w~~~ i~'~a c~~~~a; ~o~~ a~�~~ ~n3 0- - .-i oo ~ o a ~ a i a uNi ~u a w o �Gw~+a �~+w �w~d~+a �a~c~s~ �~~+w �o o a~ ~v ao ~ r~ o q on a ~ u~ oo ~n oo ~ ~o ~n . ~n ~ri ~ri ui ~n ~ri Ui 129 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 ~vi\ vl'ilvilW vJL Vl\LL ~ w w H H ~ ~ GJ ^ ~ ~ ~ N ~ ~ ' ~ f r.�~~ w wa ~a w ~ ~ ~ ~ N N N N ~t ~t .t ~-i r-I r-I I ~O ~O ~ ~ fJ~ ~ D+ ~ 41 N N ~ ~ V] cn 'L1 J+ ~ - ~''1 A A~ O O ~ O O A A ~ ~ ~ N S+ ~d I c~d ~ ~ ~ 1J C^ 'L1 C'+ N u! 41 O~rI S~+ Ul ~ 00 tA O~ ~ v o ~ a ~ .C ~ ~ ~ ~ ~ a~ ~ a~ o ~ �rl ~ri N a~ d q+~ q cd cd ~,~1 r-I r-I 3 ~ i~,-~ a~ g q o c~ cd a~ ~ D o a a~ oo ~ u c~ id 3~ p q w a~ ~ q - a~ o ~ o ~ ~ .u o o ~n ~ w o ~d tJ U1 S-~ C ~d tA 00 ~C ~d 'b ~rl ,-I O N L+ ~ ~-1 Gl ~ Ol W CL 6 N U N~ F.' '-1 S~+ ~ O ~1 c~wo bw~n~ o vu ~~cd ~vva o ~a-~u ~ u � ~ a~ � ~ ~ ai ~ ~ c~a ~ G o a~i ~ � v c~d ~a~i q ~ ~n ~ on w o~ o ~ a~ ~ o~,~ w a~ a~ ~o u ~d 0o a~ o cn ~d p.c ~d ~ a~+ a~ a a~ ~ ~ o ~a u,~ a~ ~ q cn u a~ v a~ a~ a.-i o~+ ~ a~ q~ c~ v a.~ a. ~ ~n u u~�~ G v .u a~ cd cd m o v~.~ w y~ cd .n 3~ cd o+-~ c~ cn w N u u �~t ~..i ~ o~+ a? ~ri m u a�~-, a o ~ o a v, a~ q~ w ~n m ~ a+-~ a~ a~ o ao .n s~ oo ~ ~n a~ ~ r+ o~ a+~ ~ ~d a~ ~ oo a~ ~ u s~ o a~ a~ o m~o a u�~ ~v cc a~ o ~ a~ v~ ~~r o a m ~n ~ a a~ p oo .c G co b a~ ~'L~ 0 f1~ tb ~1 ~1 JJ ~ ~ .C'r' G~ C) ~1 a a~ b ~ w ~ G u ~ y o o u ~ cu H ,.C .C ~ o ~ ~ ~ o ca ~d a ~ a~ a a~ b o u c~ o'~ G 4-+ a on o~+o ~ o G o0 o a~ oi o.~ ~ v'~i o c~d o~+-~ w a? w oo co o i~ o ~ w o~, ~ u 4..~ o o a~ c~ p ~ o ~ y N ~d ~n ~ ~ ~v u b~ oo G cd a a w v ~ ~n ~v �v ~ b oot a~ w Gl G O i~ r-I ~ w .-1 tn O~ r-I N w c~ ~-~I N al q p .f. U~rl ~rl ~ O S-~ G) C: O~d ~d td N GJ O F+' O p O Gi �rl ~ 6 O O 00 ~ C: 1.+ C.~' tA cb .C b0 H�rl ~-I S~1 bA }a i-~ ~ d0 .f. ~-I O 4+ ~ ~ ~ cd v a~ ~ ~ v, oo ~ ~i ~ a ~ ~ a~+ o ~ ~ ~ .c u a ~ ~n~,~d~ eo~~ m~o~+ ara~oG ~n~wG v~~+ ~ncoo 0 a~ v~~+ o�~ a a~ ~d ~n .C o a~ a~ ~ o a~ v~~+ ~ o~~ q~+ au ~w~�~ A~ aa ~ 3 au A~~ ~ A~ A aao~++ bo G a s.�+ a~ a~.~ oo ~a - ~ o - - ~n a a a.~ i a G v i~ ca s~ cd cd q cd �ri o N ~ N a N rl N~ 1-i O` E3 i~+ ~ rl a ~ oo ca ~ u q a~ ~ i~a ~ ~ a~ G ~ C N�rl ~ ..C y 3 'Cf cd .C o ,3 H r-I �r~ G'+ T1 a~ ~t H ia i~ cd DO ~ vi P4 1 ~ p~ r � 7 ~ r i O f 1 N c ~ c d 0 0 ~ d 4 a ~ i-~ ~ P~ oaca"n ~ ~ a G ~ s'~ ~ ~�n ~ ~ � o ~a' ~ ~ ~p= ~ p~ o o �~a �v~ v~i �a � o q'uNi .a~cn o~+~~+ ~~da c~,w~, r~a ~�~oa~ ~ - ~ ao ~ rn a ~ oo c~ u a ~?-a ~n ~ a, ~ a.? u u ~ ~ . . . ~n ~ri ~n vi vi ~n ~n 130 ~ FOR OFFICIAL L1SE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 - - FOR OFFICIAL USE ONLY ~ ~ ^ v a~ G~ ~n u a~i a~.~ a~i ~ w w� c�~� ~ ~ U1 N ~7 N r-~ ~ ~ ~ ~ D-~ ~ ~ c,~ 0 O A N ~ ~ r-I iv.~ y.~ ~r~l @ G1 U 00 ~rl ~J v~l ~ ~ o ~ u awa`~i - a~ ~ � ~w~ a~a~i~ ~ ~ ~ ~ ~ v a'~~~-~i ~ 3 0 a' .a .o ~ a1 ~ > a~~ 3 oroa`~ 0000 ~ ii ~pp~ a~'i b ~ "p�~~ N J.1 ~-1 ~D ~ O FN 0~ ~ cti 00 ~ l+ v u p ~m ~ O ~ a~ A ~�n a ~ ~,c _ 3.+= U va vb0c~v H ~ H ~ N ' ~ - cd p b0 b~p b � o a � o q a ~ aa a~a ~ � ~n ~ri COPYRIGHT: Izdatel'stvo "Statistika", 1979 [389-10845] 10845 131 - CSO: 1863 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY MEANS OF FO~MALIZED DESCRIPTION OF THE VTsKP~ DATA Moscow VYCHISLITEL'NYYE TSENTRY KOLLEKTIVNOGO POL'ZOVANIYA in Russian 1979 signed to press 4 Apr 79 pp 227-240 [Article by G. M. Belash, 0. M. Veynerov, M. S. Kazarov] [Excerpts] Let us proceed with the analysis of the SFOD [means of formalized description of data]. Let us briefly consider the SFOD oriented toward the data administrator and the applied programmer, dis- . cussing only the events illustrating the arguments and conclusions pre- sented below. Let us remember that the data administrator develops the structures of the data in the base, constructs the data base system, achieving efficient _ functioning of the base for the entire complex of problem~ ~programs using it. The administrator is responsible for the physical organization of the data. The layout of the data b ase reflects the general structural laws character- istic of the entire set of snecific data fixed in the base. These laws - basically are determined by the logic of the sub~ect region depicted in the data base. The layout of the data base is described by the language means of definition of the data (YaOD) which must provide for tt~e follow- ing: The description of various types of structures generating the structure of the data base (that is, the description of the parameters of these structures names, formats, types of data, indication of keys, and so on); Description of the relations between the generating structures and the layout of the data base. In addition, the YaI~ID [data manipulation language] can be used to describe the layout of the protection of the data base from unsanctioned access and the attributes of the protection layout. _ *Collective-use computer center _ 132 FOR OFFICIAL USE ONLY - APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY The applied programmer (the problem-oriented user) communicates with the data base using the data manipulation language (Ya1~ID), the operators of which either are included directly in the procedural (the procedure- ortented) language or they are formed as refer ences to the procedure. The functions of the YaOD [data definition language] are as follows: The specification of the reference to the data base (search, reading, _ replacement, removal, and so on); - Definition (by indicating the types of structures and the corresponding names) of the attributes of the base layout us ed to localize the data with which the manipulations are performed; Indication of the specific values of these att ributes (and also tne . logical functions of the values, the ranges of values, and so on). The Ya1~ID can be used also to indicate the values of the protection keys. The system s committee KODASIL has performed a~etailed analysis of the structural principles of the YaOD and the YarID, the results of which are _ reflected in [1]. On the basis of the performed analysis and generaliza- tion of th~e KODASIL, proposals have also been developed with respect to standardizing the YaOD and Ya1~ID. These proposals have been described in detail, for example, in [2]. When creating the first stages of the VTsKP, obviously the "Oka" SUBD - became widespread, which at the present time is the most powerful among the systems of this type available for applica tion. The structural princlples of the means of definition and manipulation of data "Oka" have differences from the principles of the KODASIL. Accord- _ ingly, let us remember the basic principles of the organization of the YaIrID of the "Oka" system (YaNID is not a system term) . This is needed *_o compare the YaNID and other means of formalizing the de~cription of data which will be considered below. - "Oka" supports the following types of structures: field, segment, entry, data base. ~ The entry is the set of segments among which the hierarchical relations are established. The da~a base is an ordered set of entries. The system provides for the following types of references tu the data base. GET UNIQUE (GU). GET NEXT (GN). _ 133 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 L~va\ vC[tVLC1L 6i.~ti vi~a~? GET NEXT WITHIN PARENT (GNTP) . ~ GET HOLD UNIQUE, GET HOLD NEXT, GET HOLD NEXT WITH PARENT. REPLACE. INSERT. The analysis of the means of formalized description of data performed in the article has made it possible to determine the relation of the SFOD oriented for people of different categories, interacting with the auto- mated data bank of the VTsKP and to draw the following basic conclusions . 1. The data definition language with respect to the SFOD of the applied programmer performs the functions of a metalanguage of the description of the grammar. 2. The organization of modern SFOD of tYle applied programmer SUBD with the base language insures potential possibility of constructing the simp le translation algorithms from the IPYa [information retrieval language ] o f the f inal us er . I - 3. The requirements which must be satisfied by the IPYa of the final ~ user of the automated data base agree well with the principles of the organization of the modern SFOD of the automated control system. , - 4. The orientation to the mentioned requirements permits the construction of a simple inte~face of the SUBD with the file user adj usted to the - specific application. BIBLIOGRAPIiY 1. INFORt~IATSIONNYYE SISTEMY OBSHCHEGO NAZNACHENIYA [General-Purpose Information Systems], translated from the English, edi~ed by Ye. L. Yushchenko, Moscow, Statistika, 1975. 2. Stolyarov, G. K. Survey of the Proposals of the Working Group of the KODASIL with Respect to the Data Bases," ALGORITMY I ORGANIZATSIYA RESHENIYA EKONOMICHESKIKH ZADACH [A1goNot~mSMoscow - Organiz3tion of the Solution of Economic Problems], , ~ Statistika, 1974. COPYRIGHT; Izdatel'stvo "Statistika", 1979 [389-10845] 10845 CSO : 1863 ~.34 ~ FOR OFFICIAL ~TSE JNLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2 FOR OFFICIAL USE ONLY AUTOMATION OF Ti~E PREPARATION OF PRODUCTION BASED ON MACHINE TUOLS WITH DIGITAL PROGRAM CONTROL AT THE VTsKP Moscow VYCHISLITEL'NYYE TSENTRY KOLLEKTI.VNOGO POL'ZOVANIYA in Russian 1979 signed to press 4 Apr 79 pp 256-267 [Article by P. L. Stepanov, V. Z. Yampol'skiy] [Excerpt] Summing up the results of what has b een stated, let us consider two problems of the operating efficiency of the "Stop-2" system. 1. The analysis of the operating exper ience of the machine tools with digital program control indicates that for effective utilization of them - in small-series production it is necessary to rep air about 200 UP [control programs] per year per machine tool. At the same time for the preparation of one control program of wedium complexity (on the order of 150 frames) using the existing SAP [automated preparation systems] the following are required: About 10 to 15 hours to design the technological process; About 40 hours for the preparation and checkout (including on the machine tool) of the contral program. Here the required machine time will be 0.5 to 0.6 hours, and the calendar preparation time and checkout time for one control program will reach 20 days, ~ The analysis of the possibilities of the "Stop-2" system indicates that as a result of using the standard elements of control programs the labor con- sumption of the technological process design is lowered by 2 or 3 times, and the time for checkout of the control program is reduced by 30 to 40%, for the necessity of debugging uork is excluded in the sections of the cantrolling programs where standard solutions were used. The calendar time for the preparation of one controlling program decreases as a result of the dialog mode of operation of the remote user from 20 to 4-5 days, that is, it is redt~ced by 4-5 times by comparison with the existing systems. - 2. The operation of systems similar to the "Stop-2" system is a fruitful and economically expedient basis for the interrelation among the industrial enterprises and the VTsKP. On the one hand, the enterprises avoid the necessity for bearing the expenditures on the acquisition and the operation 135 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300040020-2 _ _ of the expensive all-purpose computers, the operation and the development of the labor-consuming and complex software for the automated systems to prepare the control programs, including the developed libraries of standard elements of the control programs. On the other hand, the collective-use computer centers obtain a reliable partner with a stable demand for machine time in the person of the industrial enterprises. Actually, at the present time the flaet of machine tools with digital program control in the country is on the order of 30,000 which determines the demand for the preparation of 6 million controlling programs per year and, consequently, the requirement along the order of 2-3 million hours of: machine time. With respect to the VTsKP of the industrial region it is possible to make the following calculation. Servicing 10 or 15 large industrial enterprises with a f leet of machine tools with digital program control on the order of 50 units in each, the VTsKP can realize 50,000 to 75,000 hours of commercial ~ machine time per year for operations with respect to automation of the - technical preparation of production on machine tools with digital program control alone. Considering that the system permits simultaneous servicing - - of up to 10 subscribers, the demand for the calendar machine time wi11 be about 6,000 hours per year, that is, a daily load of one of the YeS-1033 ~ computerG will be reached. The planned increase in the fleet of equipment with d~gital program control by 20 to 25% by 1980 insures further stable growth of the machine time demand. Here it must be noted that when pre- paring the control programs the operating time of the processor will be 50 to 60%. This is a great prerequisite for increasing the profitableness of - the collective-use computer centers as a result of solving the background problems and to reduce the expenditures of the enterprises to lease machine time as a result of lowering the price of one ho~,~r of machine time in the time-sharing mode of the computer. COPYRIGHT: Izdatel'stvo "Statistika", 1979 [389-10845] 10845 ~ CSO: 1863 136 FOR OFFICIAL TtSE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY Publications ARTIFICIAL INTELLIGF~ICE _ Kiev ALGORITMY RAZUMA in Russian pp 10-13, 221-223 ~Book by Nikolay Mikhaylovich Amosovi "Intelligence Algorithms." Printed by the order of the D33torial Boaxd on Popular Scientific Literature of the Ukrainian SSR Acaaeiqy of S~iences. Number of copies printe~ 37,000. ~Additional selections from this source appeaxed in a previous issue of this : report see JPRS L~9204, 23 Jnly 1980, pages 148-149] _ ~Text~ Introduction Intelligence mechanisms interest scientists of various specialties. For psychologists and physiologis+,s it is the theory of their sciences; for cyberneticists it is ways to create artificial intelligence (SI). In this book be~.ng of~er.od to -the att~n~ion of the read~r: I x~,l~ attempt to present concepts on this problem as a result. of the develop;uant of work be:.ng done in the Biocybernetics Department of the Cybernetics In- _ stitute of the Ukrainian SSR Academy of Saiences and which started in 1962. New ideas differ considerably from those publishec~ previously [1-3]. = The work "~,lgorithm" was not introduced into the title of the book by chancei . I believe tha,t it is possible to "pigeonahole" the most complex ma.nifesta- tions of intelligence even with prospects of its development t o a higher level than huma.n intelligence. Evidently I will not be able to convince sceptics for this it is necessaxy to reprod.uce intelligence algorithms in programs. Regrettably, there axe great diff.~.culties in this path. Per- haps the cited ideas will h~elp the enthusiasts of this problem? 1 warn tha.t the subject is exceptionally complex to understand inasmuch as it lies at the junction of physiology, psychology, engineering and even phi- losophy. For simplification I will use block diagrams widely. Intelligence is defined as a totality of ineans and methods to control com- plex systems by operating their models,directed by criteria of opt imal control. Modern science and technology ma.ke it possible to reproduce 137 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FUR OFFICIAL USE ONLY ~ models and operate them by technological means and thus sepaxate intelli- , gence from the brain to which it is usually related. The difference be- tween the cited definition and the multitude of others consists in that it stresses this last circumstance. Thus, speaking of intelligence, we will have in mind this totality of means and methods of control independently of whether it is realized in biological systems or by means of artificially created technological means. This use of the term "intelligence" is not generally accepted. However, it is closely related to the basic idea of this book. In those individual cases where we speak only about natural human intelligence, this will be � mentioned specifically. As far as the term "artificial intelligence" (12) is concerned., it, as will be assumed, will be used to designate vaxious kinds of technical implementations of intelligence models. We will dwell on the basic concepts in order to enter the scope of the problems discussed ~adually. First of all~ it is necessaxy to sepaxate out two opposite approaches to simulating intelligence. Conditionally~ they may be called network and algorithmic. Correspondingly, we will dif- ferentiate between two types of models network (SI) and algorithmic (AI) intelligences. . ~t) , (6} 06 ~2~ i sn - nn - --{P]~-I ~ _ ~ l - ~ `J~ ~0 . 3 " _ -M~ I Fig. 1. Block diagram of network intelligence (SI). i. ob control object 6. PP permanent memory 2. Rts receptora 7. RM recognized model 3. E-- effectors 8. Kr cri~eria - 4. VP temporary memory y. P'ID action model 5. PM primaxy model 10. "8rain" The simplest block diagram of a network intelligence repsesents aome complex three-dimensional structure. It is sensed by sensors receptors Rts ~for exa,mple, eyes) and is transmitted by signals to the "brain," where it is converted to the primary model PM. To a first approxima,tion, PM is repre- sented by a flat two-dimensional structure, ma.de~ up of excited, activated 138 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY components of some network conditional "receptor field." The object is recognized by superimposing PM on a multitude of figu res of inactive components, joined by "itineration" ties. These inactive model figures - represent models of already Imown objects and make up permanent memory PP. It~. accordance with the principle of operation, SI components that ma,ke up the permanent and temporary ~or active ) memory are one and the same; they _ differ only in the level of activity. The superimposition of the prima,ry model on the network selects and activates one recognized mod.el of figure RM and from it a controlling effect is connected to the ob~ect. This effect is represented by the action of model Nm~ controlling effectors E. The recognized model of the object is tied to s~everal action models; the selection of the neQded one is determined by criterion Kr. The action madel activated from RM and Kr transmits the activity to the effectors in which the control signals are converted into the mechanical energy of the controlling effect. Thus,in a network intelligence "the actions with the models" axe represented by the change in the activity of the components of the networks in which the models axe built in. (i~ ~2~ ~3)t4) ~5) - D6 Pu na; n, n.~ PM ` ( / Ka Ql1 3 q~ uQ t1i~ Cto) 9 Fig. 2. Blocx diagram of an algorithmic intelligence (AI)i 1. ob control object 7. Kr criteria 2. Rts receptors 8. DP long-term memory 3. PMi primary structural model 9. Nm digital action model - 4. P1 converter 10. P2 converter 5. PMZ primary digital model 11. E-- effectors 6. RM recognized model Fig. 2. shows a block diagram of an algorithmic intelligence. It staxts - functioning in the same way as in the SI, as a result of receptor Rts operation priruary structural model PM~ forms a two-dimensional structure in the same plane~. However, it is immed.iately read-out by convarter P1, 139 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 transforming it into a lineax, single-dimensional model consisting of a - set of digits PM . All further actions axe impl~mented by thia model. PM recognition cons~sts of its sequential comparison with standard models recorded by the same code in long-term memory DP, where recognized model _ PM is located. Action model NID is selected in accord.ance with this model. ~ This process is implemented by sorting models in the long-term memory under the control of criterion Kr. The action nodel is transferred to converter P2 where the digital code is converted into effector E controlling signals a,r~d through action controls to object Ob. ; The basic difference between SI and AI is in the structure of the memory , and the resulting vaxious actions with models. However, in both types of ~ intelligences~ the }~'rinciple of controlling the models from the side of ; the control criteria through their activation is preserved. The creation of SI ~nd AI assumes the use of various methodological ap- proaches to simulating one and the same object human intelligence. Each of the approaches has its strong and weak points. Therefore~ in designing actual II s~stems, it may be feasible to represent several in- telligence functions in the form of network models and some others in the form of algorithmic models. The general principle here is as followsi the lower the level of trie function being simulated in the general hierarchy of intelligence functions, the more probable it is tha.t the network method is the most efficient in reproducing the II. The situation is that the implementation of many functions of the lower level (such as, for instance~finding the recognized model in accordance with the primaxy model-- see Fig. 2) means a great amount of sorting in the long-term memory. Such sorting is most efficiently implemented in the At network models that realize paxallel processes of data reprocessing. the same time, network mod.els have other shortcomings that limit the axeas of their application. I will dwell ma,ny times on the compaxative analysis of the advantages and disadvantages of network and algorithmic models. A number of papers axe dedicated to problems of creating SI and investi- gating their properties. Brief reviews of concrete results that have been obtained axe given in the first section ofrinciplesk.nothmaking anyifurther dedicate to the description of AI design p special stipulations that, in its practical implementation, a number of functions may be represented by network structures. BIBLII~RAPHY i. Amosov, N. M. "Modelirovaniye myshleniya i psikhiki" (Thinking and Psychics). Kiev, 1965~ 2. Amosov, N. M. "Modelirovaniye protsessov myshleniya" (Simulating _ Thinking Processes). KIBERNETIKA, 1968, No 2. 140 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY 3. Amosov, N. M. "Iskusstvennyy razum" (Axtificial Intelligence). Kiev, 1969. 4. Amosov, N. M. ; Ka,satkin, A. M. ; Ka,satkina, L. M. ; Talayev, S. A. "Avtomaty i razumnoye povedeniye; Opyt modelirovaniya" (Robots and Intelligent Beha.viori Simulation Experisnce). Kiev, 1973� 5o V~nogra.d, T. "Programma, ponimayushchaya ;~esltestvennyy yazyk" (A pro- gram tha,t Understands Natural La,ngua,ge Moscow,.i976. 6. Kasatkina, L. M.; Ka,satkin~ A. "Heuristic Behavior Model,." In bookt "Nekotoryye problemy biokibernetiki" (Certain Biocybernetic Problems). Kiev, 1966, second edition, pp 21-36. 7� McCullough. Reliability of Biological 5ystems. In bookt Self-Ch~gan- izing Systems. Moscow, 19~, pp 358-378� 8. Minskiy, M.; Peypert, S. "Perceptrons." Moscow~ 1971. 9. Sutro, L.; Kullmer, U. "Totality of Decision Devices for Robot Control." ~n book "Integro xobAty" (Integrating Robots). Moscow, 1973~ PP 112-163. - 10. Nielson, N. Artificial Intelligence, Moscow, i973� il. Sa,muel~ A. "Certain ?nvestigations of the Possibilities of Teaching ' Machines on the bcample of Playing Dominoes." In Booki "Computer Ma.chines and Thinking." Moscow, 1967, pp 71-112. 12. Newell, A.; Simon, G. "GPS Program Simulating the Process of Human Thinking." It~id., pp 283-3~1. 13. Shenk, R.; Abelson~ R. "Scenario, Plans and Knowledge." In book~ ~ Tr.IV. Mezhdunax. obyed,. kong. po II. "(Transactions of the Fourth International Joint Conference on Artificial Intelligence). Moscow, _ 1975s PP 208-220. 14. Faix, R.; Nielson, N. STRIPS System." In Book "Integr. roboty " _ (Integrating Robots). Moscow, 1973~ PP 382-~3� - 15. Hewitt, C. "FIJINNER I~nguage for Provir:g Thearems in Robots." .In Int. joint conf. Ar~. Intel. Wash., 1969, pp 295-301. 16. Hewitt~ C. "Procedural Imbedding of Knowledge in PLANNER." In Second Ing. Joint Conf. Art. Int. Leningrad, 1971, Pp i67-182. 17. Robinson, J. A. "The Generalized Resolution Principle." N.-Y., 1968, 3~ PP 77-94. = 1la.l. FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 , FUR OFFICIAL USE ONLY Table of Contents Page - Foreword 5 .~r?troduction 10 Artificial intelligence today 14 Basic stages and directions of investigations i~ ; Certain results of simulating network intelligence 18 ~ Systems and models 31 Complex systems 33 Models 35 Perception and memory 38 Perception and control 38 , Generaliza.tion of perception . ~ ' Types and mechanisms of inemory ~'3 ~ Hypothesis on ~3nsmory mechanisms ~'6 Recall, generalization, forgetting ~ Ck~ im~+l~mentation of the hypothesi~ 53 _ Model actions 55 ` Activation of models 55 Compaxing models and recognizing images 607 i Finishing the "phrase" recall 60 - Generalizati~n of models ~ Interaction between models 1n intelligence 63 Criteria, requirements, feelings~ ~timuli 66 Cla.ssificativn of feeling-requirements 73 Cycles of activity and tension 78 Time 80 - 82 Reality The funetional act 85 Algorithms of a simplified funetional act 87 - "Areas" of perception 95 Forecasting and determining the dynamica 97 Hierarchy of functional acts 99 - F~inctional act netk~ork i03 "Thoughts" 106 11~2 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2 APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300044420-2 FOR OFFICIAL USE ONLY Table of Contents (Continued) Page Consciousness and Subconsciousness 109 - SUT-system of intensifying-retaxding 109 SUT in algorithmic intelligence 111 ~tT'r and consciousness 114 _ ' ~nctions of subeonsciousness 116 "Coordinates" of consciousness 120 Human intelligence level 122 Speech "~~3 Highest levels of consciousness 3~9 - - F~cperience and imagination i53 Work and creativity ~ 157 Dreams and psychological illnesses 1~ ArtificiaT intelligence in huma.n society 170 ~ Ba,sic "individual" qua,lities of II 170 Society of a,rtificial intelligences 188 - Ch the way to intelligence higher than the human one 195 Human intelligence and complex systems 195 ~ Method of heuristic simulation 199 ~ Heuristic models of some complex systems 2~2 Axtificial intelligence higher than the human one 206 Design of algorithmic model of intelligence 209 Conclusion 216 Bibliography 2~1 CCIPYRIGHT~ IZDATEL�STVO "NAUKOVA DUMKA"~ 1979 [411-2291] 2291 CSO: 1863 ~D 143 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300040020-2