<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">RUDN Journal of Engineering Research</journal-id><journal-title-group><journal-title xml:lang="en">RUDN Journal of Engineering Research</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Инженерные исследования</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2312-8143</issn><issn publication-format="electronic">2312-8151</issn><publisher><publisher-name xml:lang="en">Peoples’ Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">45011</article-id><article-id pub-id-type="doi">10.22363/2312-8143-2025-26-2-155-167</article-id><article-id pub-id-type="edn">LZEWFU</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>Articles</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Статьи</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Ensuring the Survivability of a Complex Technical System Under Special Conditions</article-title><trans-title-group xml:lang="ru"><trans-title>Обеспечение живучести сложной технической системы в специальных условиях</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0398-4426</contrib-id><contrib-id contrib-id-type="spin">9320-9713</contrib-id><name-alternatives><name xml:lang="en"><surname>Alekseev</surname><given-names>Vladimir V.</given-names></name><name xml:lang="ru"><surname>Алексеев</surname><given-names>Владимир Витальевич</given-names></name></name-alternatives><bio xml:lang="en"><p>Doctor of Sciences (Techn.), Professor of the Department of the Department of Mechanics and Control Processes, Academy of Engineering</p></bio><bio xml:lang="ru"><p>доктор технических наук, профессор кафедры механики и процессов управления, инженерная академия</p></bio><email>vvalex1961@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0004-0182-5095</contrib-id><contrib-id contrib-id-type="spin">4761-2024</contrib-id><name-alternatives><name xml:lang="en"><surname>Ivanov</surname><given-names>Dmitry A.</given-names></name><name xml:lang="ru"><surname>Иванов</surname><given-names>Дмитрий Александрович</given-names></name></name-alternatives><bio xml:lang="en"><p>Postgraduate student of the Department of Mechanics and Control Processes, Academy of Engineering</p></bio><bio xml:lang="ru"><p>аспирант кафедры механики и процессов управления, инженерная академия</p></bio><email>1142230113@pfur.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6014-6982</contrib-id><contrib-id contrib-id-type="spin">1818-9990</contrib-id><name-alternatives><name xml:lang="en"><surname>Ryzhov</surname><given-names>Ilya G.</given-names></name><name xml:lang="ru"><surname>Рыжов</surname><given-names>Илья Геннадьевич</given-names></name></name-alternatives><bio xml:lang="en"><p>Postgraduate student of the Department of Mechanics and Control Processes, Academy of Engineering</p></bio><bio xml:lang="ru"><p>аспирант кафедры механики и процессов управления, инженерная академия</p></bio><email>ryzhov.ilgen@gmail.com</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">RUDN University</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2025-07-03" publication-format="electronic"><day>03</day><month>07</month><year>2025</year></pub-date><volume>26</volume><issue>2</issue><issue-title xml:lang="en"/><issue-title xml:lang="ru"/><fpage>155</fpage><lpage>167</lpage><history><date date-type="received" iso-8601-date="2025-07-14"><day>14</day><month>07</month><year>2025</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2025, Alekseev V.V., Ivanov D.A., Ryzhov I.G.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2025, Алексеев В.В., Иванов Д.А., Рыжов И.Г.</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="en">Alekseev V.V., Ivanov D.A., Ryzhov I.G.</copyright-holder><copyright-holder xml:lang="ru">Алексеев В.В., Иванов Д.А., Рыжов И.Г.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/engineering-researches/article/view/45011">https://journals.rudn.ru/engineering-researches/article/view/45011</self-uri><abstract xml:lang="en"><p>The objective of the research presented in this article was to develop an algorithm for ensuring the survivability of a complex technical system under special conditions. The principles and methods of system analysis, formal verification and mathematical apparatus of temporal logic of actions were applied in the research. As a result of the study, an algorithm for searching logical errors in the design solution and software of a complex technical system based on temporal logic was developed. The distinguishing features of the algorithm include the capacity for formal verification of the design solution within the system and the incorporation of a mechanism to ensure the consistency of the design solution and implementation. The application of this algorithm is recommended for the assurance of survivability, encompassing both newly developed systems during the design and commissioning stages, and existing systems during the maintenance stage.</p></abstract><trans-abstract xml:lang="ru"><p>Цель исследования - разработка алгоритма обеспечения живучести сложной технической системы в специальных условиях. При проведении исследования были применены принципы и методы системного анализа, формальной верификации и математический аппарат темпоральной логики действий. В результате исследования был разработан алгоритм поиска логических ошибок в проектном решении и программном обеспечении сложной технической системы, базирующийся на темпоральной логике. Отличительными особенностями алгоритма являются возможность формальной верификации проектного решения по системе и наличие механизма обеспечения согласованности проектного решения и реализации. Алгоритм целесообразно применять для обеспечения живучести как вновь разрабатываемых систем на этапах проектирования и ввода в действие, так и уже существующих систем на этапе сопровождения.</p></trans-abstract><kwd-group xml:lang="en"><kwd>algorithm</kwd><kwd>verification</kwd><kwd>survivability</kwd><kwd>information flow</kwd><kwd>temporal logic</kwd><kwd>compliance with the design solution</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>алгоритм</kwd><kwd>верификация</kwd><kwd>информационный поток</kwd><kwd>темпоральная логика</kwd><kwd>соответствие проектному решению</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Shubinsky IB. Functional reliability of information systems. Methods of analysis. Ulyanovsk: Pechatny Dvor Publ.; 2012. (In Russ.) ISBN: 978-5-7572-0327-0 EDN: QMXPUD</mixed-citation><mixed-citation xml:lang="ru">Шубинский И.Б. Функциональная надежность информационных систем : методы анализа. Ульяновск : Печатный двор, 2012. 296 с. ISBN: 978-5-7572-0327-0 EDN: QMXPUD</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Gutgarts RD. Features of design and programm-ing when creating information systems. Software products and systems. 2020;33(3):385–395. (In Russ.) https://doi.org/10.15827/0236-235x.131.385-395 EDN: MQLBTZ</mixed-citation><mixed-citation xml:lang="ru">Гутгарц Р.Д. Особенности проектирования и программирования при создании информационных систем // Программные продукты и системы. 2020. Т. 33. № 3. С. 385-395. https://doi.org/10.15827/0236-235x.131.385-395 EDN: MQLBTZ</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Belov AS. et al. Proposal for determining the operational reliability of software of complex technical systems. Bulletin of Tula State University. Technical sciences. 2022;(9):143–148. (In Russ.) https://doi.org/10.24412/2071-6168-2022-9-143-148 EDN: LUVYDO</mixed-citation><mixed-citation xml:lang="ru">Белов А.С., Добрышин М.М., Горшков А.Н., Шугуров Д.Е. Предложение по определению эксплуатационной надежности программного обеспечения сложных технических систем // Известия Тульского государственного университета. Технические науки. 2022. № 9. С. 143-148. https://doi.org/10.24412/2071-6168-2022-9-143-148 EDN: LUVYDO</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Vorotnikova TYu. Reliable code: static analysis of program code as a means of increasing the reliability of software for information systems. Information techno-logies in the UIS. 2020;(2):22–27. (In Russ.) EDN: YYTHON</mixed-citation><mixed-citation xml:lang="ru">Воротникова Т.Ю. Надежный код : статический анализ программного кода как средство повышения надежности программного обеспечения информационных систем // Информационные технологии в УИС. 2020. № 2. С. 22-27. EDN: YYTHON</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Avetisyan AI, Belevantsev AA, Chuklyaev II. The technologies of static and dynamic analyses of detecting software vulnerabilities. Cybersecurity Issues. 2014;3(4):20–28. (In Russ.) EDN: SSYPXV</mixed-citation><mixed-citation xml:lang="ru">Аветисян А.И., Белеванцев А.А., Чукляев И.И. Технологии статического и динамического анализа уязвимостей программного обеспечения // Вопросы кибербезопасности. 2014. № 3 (4). С. 20-28. EDN: SSYPXV</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Timakov AA. Control of information flows in soft-ware blocks of databases based on formal verification. Programming and Computer Software. 2022;48(4):265–285. https://doi.org/10.1134/s0361768822040053 EDN: BATUIZ</mixed-citation><mixed-citation xml:lang="ru">Тимаков А.А. Контроль информационных потоков в программных блоках баз данных на основе формальной верификации // Программирование. 2022. № 4. С. 27-49. https://doi.org/10.31857/S0132347422040057 EDN: WEMCXC</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Seifermann S, Heinrich R, Werle D, Reussner R. Detecting violations of access control and information flow policies in data flow diagrams. Journal of Systems and Software. 2022;184:111138. https://doi.org/10.1016/j.jss.2021.111138 EDN: QLGGWA</mixed-citation><mixed-citation xml:lang="ru">Seifermann S., Heinrich R., Werle D., Reussner R. Detecting violations of access control and information flow policies in data flow diagrams // Journal of Systems and Software. 2022. Vol. 184. P. 111138. https://doi.org/10.1016/j.jss.2021.111138 EDN: QLGGWA</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">DeMarco T. Structured analysis and system spe-cification. In: Broy, M., Denert, E. (eds.) Pioneers and Their Contributions to Software Engineering. Springer Berlin Heidelberg; 1979. P. 255–288. https://doi.org/10.1007/978-3-642-48354-7_9</mixed-citation><mixed-citation xml:lang="ru">DeMarco T. Structured analysis and system specification // Pioneers and Their Contributions to Software Engineering / M. Broy, E. Denert (eds.). Springer Berlin Heidelberg, 1979. P. 255-288. https://doi.org/10.1007/978-3-642-48354-7_9</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Warren DS. Introduction to prolog. Prolog: The Next 50 Years. Cham: Springer Nature Switzerland; 2023. P. 3–19. https://doi.org/10.1007/978-3-031-35254-6_1</mixed-citation><mixed-citation xml:lang="ru">Warren D.S. Introduction to prolog. Prolog: The Next 50 Years. Cham : Springer Nature Switzerland, 2023. P. 3-19. https://doi.org/10.1007/978-3-031-35254-6_1</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Tuma K, Scandariato R, Balliu M. Flaws in flows: Unveiling design flaws via information flow analysis. 2019 IEEE International Conference on Software Architecture (ICSA). 2019. p. 191–200. https://doi.org/10.1109/ICSA.2019.00028</mixed-citation><mixed-citation xml:lang="ru">Tuma K., Scandariato R., Balliu M. Flaws in flows: Unveiling design flaws via information flow analysis // 2019 IEEE International Conference on Software Architecture (ICSA). IEEE, 2019. P. 191-200. https://doi.org/10.1109/ICSA.2019.00028</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Kanner AM. Application of TLA+ notation to describe the model of an isolated software environment of access subjects and its further verification. Information Security Issues. 2021;(3):8–11. https://doi.org/10.52190/2073-2600_2021_3_8 EDN: KXLLGD</mixed-citation><mixed-citation xml:lang="ru">Каннер А.М. Применение TLA+ нотации для описания модели изолированной программной среды субъектов доступа и ее дальнейшей верификации // Вопросы защиты информации. 2021. № 3. С. 8-11. https://doi.org/10.52190/2073-2600_2021_3_8 EDN: KXLLGD</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Lamport L. Specifying systems: the TLA+ language and tools for hardware and software engineers. Boston: Addison–Wesley Publ.; 2002. ISBN 032114306X, 978-0-32114-306-8</mixed-citation><mixed-citation xml:lang="ru">Lamport L. Specifying systems: The TLA+ language and tools for hardware and software engineers. Boston : Addison-Wesley Publ.; 2002. 364 c. ISBN: 032114306X, 9780321143068</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Karpov YuG. Model checking. Verification of parallel and distributed software systems. SPb.: BHV-Petersburg; 2010. (In Russ.) ISBN 978-9775-0404-1</mixed-citation><mixed-citation xml:lang="ru">Карпов Ю.Г. Model checking. Верификация па-раллельных и распределенных программных систем. СПб. : БХВ-Петербург, 2010. 560 с. ISBN: 978-9775-0404-1</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Tuma K, Peldszus S, Strüber D, Scandariato R, Jürjens Ja. Checking security compliance between models and code. Software and systems modeling. 2023;22(1):273–296. https://doi.org/10.1007/s10270-022-00991-5 EDN: QYOWHY</mixed-citation><mixed-citation xml:lang="ru">Tuma K., Peldszus S., Strüber D., Scandariato R., Jürjens Ja. Checking security compliance between models and code // Software and systems modeling. 2023. Vol. 22. No. 1. P. 273-296. https://doi.org/10.1007/s10270-022-00991-5 EDN: QYOWHY</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Peldszus S. Security Compliance in Model-Driven Software Development. Ernst Denert Award for Software Engineering 2022: Practice Meets Foundations. Cham: Springer Nature Switzerland; 2024. p. 73–104. https://doi.org/10.1007/978-3-031-44412-8_4</mixed-citation><mixed-citation xml:lang="ru">Peldszus S. Security Compliance in Model-Driven Software Development // Ernst Denert Award for Software Engineering 2022: Practice Meets Foundations. Cham: Springer Nature Switzerland, 2024. P. 73-104. https://doi.org/10.1007/978-3-031-44412-8_4</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Kolenchenko YuV, Petrov KA, Yemelyanov DM, Ismagilov IR. Development of an agent application to prevent leaks of sensitive information. Tinchurin readings-2020. Energy and digital transformation. 2020:64–67. (In Russ.) EDN: GKLNCM</mixed-citation><mixed-citation xml:lang="ru">Коленченко Ю.В., Петров К.А., Емельянов Д.М., Исмагилов И.Р. Разработка приложения-агента для пре-дотвращения утечек чувствительной информации // Тинчуринские чтения-2020. Энергетика и цифровая трансформация. 2020. С. 64-67. EDN: GKLNCM</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Wąsowski A, Berger T. Domain-Specific Languages. Springer International Publ.; 2023. https://doi.org/10.1007/978-3-031-23669-3</mixed-citation><mixed-citation xml:lang="ru">Wąsowski A., Berger T. Domain-Specific Languages. Springer International Publ.; 2023. 486 p. https://doi.org/10.1007/978-3-031-23669-3</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Krausz M, Peldszus S, Regazzoni F, Berger T, Güneysu T. 120 Domain-Specific Languages for Security. 2024. Available from: https://arxiv.org/abs/2408.06219 (accessed: 12.09.2024)</mixed-citation><mixed-citation xml:lang="ru">Krausz M., Peldszus S., Regazzoni F., Berger T., Güneysu T. 120 Domain-Specific Languages for Security. 2024. URL: https://arxiv.org/abs/2408.06219 (accessed: 12.09.2024)</mixed-citation></citation-alternatives></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Timakov AA, Ryzhov IG, Lysikov AV. Certificate of state registration of computer program No. 2023612260 Russian Federation. Generation of TLA+ specifications based on program blocks of databases: No. 2022686671: declared 30.12.2022: published 01.02.2023.</mixed-citation><mixed-citation xml:lang="ru">Тимаков А.А., Рыжов И.Г., Лысиков А.В. Генерация TLA+ спецификаций на основе программных блоков баз данных / Свидетельство о регистрации программы для ЭВМ RU 2023612260, 01.02.2023. Заявка № 2022686671 от 30.12.2022. EDN: JPAFHW</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Yakovlev AV, Alekseev VV, Volchikhina MV, Petrenko SV. A Combinatorial Model for Determining Information Loss in Organizational and Technical Systems. Mathematics. 2022;10(19):3448. https://doi.org/10.3390/math10193448 EDN: ZFYIJS</mixed-citation><mixed-citation xml:lang="ru">Yakovlev A.V., Alekseev V.V., Volchikhina M.V., Petrenko S.V. A Combinatorial Model for Determining Information Loss in Organizational and Technical Systems // Mathematics. 2022. Vol. 10. No. 19. P. 3448. https://doi.org/10.3390/math10193448 EDN: ZFYIJS</mixed-citation></citation-alternatives></ref><ref id="B21"><label>21.</label><citation-alternatives><mixed-citation xml:lang="en">Makhutov NA, Petrov VP, Reznikov DO. Assess-ment of survivability of complex technical systems. Problems of safety and emergency situations. 2009;(3):47–66. (In Russ.) EDN: MEGOYJ</mixed-citation><mixed-citation xml:lang="ru">Махутов Н.А., Петров В.П., Резников Д.О. Оценка живучести сложных технических систем // Проблемы безопасности и чрезвычайных ситуаций. 2009. № 3. С. 47-66. EDN: MEGOYJ</mixed-citation></citation-alternatives></ref><ref id="B22"><label>22.</label><citation-alternatives><mixed-citation xml:lang="en">Cherkesov GN, Nedosekin AO, Vinogradov VV. Analysis of the functional survivability of structurally complex technical systems. Reliability. 2018;18(2):17–24. (In Russ.) https://doi.org/10.21683/1729-2646-2018-18-2-17-24 EDN: USQARX</mixed-citation><mixed-citation xml:lang="ru">Черкесов Г.Н., Недосекин А.О., Виноградов В.В. Анализ функциональной живучести структурно-сложных технических систем // Надежность. 2018. Т. 18. № 2. С. 17-24. https://doi.org/10.21683/1729-2646-2018-18-2-17-24 EDN: USQARX</mixed-citation></citation-alternatives></ref><ref id="B23"><label>23.</label><citation-alternatives><mixed-citation xml:lang="en">Alymov N. Some issues of assessing the surviv-ability of technical systems. Infocommunication techno-logies: current issues of the digital economy. Collection of scientific papers of the I International Scientific and Practical Conference. Ekaterinburg: Reliability; 2021. p. 188–192. (In Russ.) EDN: VEKBVC</mixed-citation><mixed-citation xml:lang="ru">Алымов Н. Некоторые вопросы оценки живучести технических систем // Инфокоммуникационные технологии: актуальные вопросы цифровой экономики : сборник научных трудов I Международной научно-практической конференции. Екатеринбург, 2021. С. 188-192. EDN: VEKBVC</mixed-citation></citation-alternatives></ref><ref id="B24"><label>24.</label><citation-alternatives><mixed-citation xml:lang="en">Zhao S, Yang Y, Wang Z, He Zh, Qiu LK, Qiu L. Retrieval augmented generation (rag) and beyond: A com-prehensive survey on how to make your llms use external data more wisely. 2024. Available from: https://arxiv.org/html/2409.14924v1 (accessed: 12.09.2024)</mixed-citation><mixed-citation xml:lang="ru">Zhao S., Yang Y., Wang Z., He Zh., Qiu L.K., Qiu L. Retrieval augmented generation (RAG) and beyond: A comprehensive survey on how to make your llms use external data more wisely. URL: https://arxiv.org/html/2409.14924v1 (accessed: 12.09.2024).</mixed-citation></citation-alternatives></ref></ref-list></back></article>
