<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Spatial grasp technology and its application for management of distributed systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Peter Sapaty</string-name>
          <email>psapaty@hotmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatolii Morozov</string-name>
          <email>amorozov@immsp.kiev.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Klymenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Ievlev</string-name>
          <email>ievlev@i.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>42 Ac. Glushkov ave., 03187 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The word “spatial” fundamentally relates to human existence, evolution and activity in terrestrial and now even celestial spaces. After reviewing the spatial features of many areas, the paper describes basics of high level model and technology called Spatial Grasp for dealing with large distributed systems, which can provide spatial vision, awareness, management, control, and even consciousness. The technology description includes its key Spatial Grasp Language (SGL), self-evolution of recursive SGL scenarios, and implementation of SGL interpreter converting distributed networked systems into powerful spatial engines. Examples of typical spatial scenarios in SGL include finding shortest path tree and shortest path between network nodes, collecting proper information throughout the whole world, and elimination of multiple targets by intelligent teams of chasers. The paper also describes the new technology applications in such areas as energy-saving, water supply, national security, military, autonomous robots, decisionmaking, automatic control, as well as withstanding cyber attacks in distributed networked systems. It also compares Spatial Grasp model with traditional algorithms, confirming universality of the former for any spatial systems, while the latter just being tools for concrete applications. The technology can be effectively implemented on any platform, which was already investigated and prototyped for its previous versions in different countries.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;spatial awareness</kwd>
        <kwd>spatial control</kwd>
        <kwd>spatial consciousness</kwd>
        <kwd>Spatial Grasp Technology</kwd>
        <kwd>Spatial Grasp Language</kwd>
        <kwd>security systems</kwd>
        <kwd>military systems</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cyber attacks</kwd>
        <kwd>autonomous robots</kwd>
        <kwd>distributed algorithms</kwd>
        <kwd>mobile agents</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The humankind exists, operates, and develops in large distributed spaces, where “spatial” may be
considered as the basic and dominant feature philosophically, conceptually, and practically. To
prosper in this spatial continuum, adequate high level methodologies, organizations and tools must
be developed and used.</p>
      <p>The aim of this paper is to describe a universal high-level model and technology for dealing
with spatial systems of different natures and review its new applications (including cebersecurity)
for solving concrete and often very complex problems. The rest of the paper is organized as
follows.</p>
      <p>Section 2 reviews “spatial” as the basic feature of human activity including spatial temporal
analysis, space-time continuum, spatial analysis, spatial vision, spatial feeling, spatial
understanding, spatial awareness, spatial consciousness, spatial ability, spatial intelligence, spatial
knowledge, spatial danger, spatial warfare, spatial management, spatial planning, spatial belief,
spatial faith, spatial hate, spatial crime, spatial diversity, spatial hope, and spatial virus. Section 3
describes basics of the universal model and technology oriented from the very beginning on seeing,
staying, moving and making operations in spaces of any complexity, integrity, and coverage. It
explains the main technology ideas, its basic Spatial Grasp Language (SGL), how SGL scenarios
self-evolve in physical, virtual or imaginable spaces, and main details of the networked technology
implementation allowing the whole world to be converted into a powerful spatial engine.
Section 4 describes examples of typical solutions in SGL for distributed dynamic systems which
include: Finding shortest path tree (SPT) from a node to all other nodes, also shortest path between
two nodes, finding and collecting information on certain individuals worldwide indentified by
specific features, and how the team of chasers is fighting multiple targets under dynamically
supported global awareness in the team. Section 5 reviews the investigation of extended Spatial
Grasp technology applications for the current works at the Institute of Mathematical Machines and
Systems which cover energy-saving tools, water supply control, equipment control, situational
control, national security, decision-making support and concept, multi-agent pursuit, control and
automation systems, autonomous robots, automatic control, optimization and automation. A
review of existing cybersecurity publications and practical scenario examples in SGL for
withstanding of cyber attacks are provided too. Section 6 compares the Spatial Grasp model with
traditional algorithms usually considered as a sequence of instructions, procedure for solving a
problem, set of rules to be followed, step-by-step procedure, etc. it also mentions some existing
algorithmic extensions such as distributed algorithms, mobile agents, and spatial analysis
algorithms. Section 7 concludes the paper. References contain numerous sources on which the
paper is based, and APPENDIX provides the Spatial Grasp Language summary.</p>
    </sec>
    <sec id="sec-2">
      <title>2. “Spatial” as the basic feature of human activity</title>
      <p>
        We are starting here with spatial temporal analysis describing the ontological status of something
that exists in both space and time [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It also relates to space-time continuum that fuses the three
dimensions of space and one of time. Spatial analysis relates to knowledge, skills, and habits of
mind to use concepts of space (such as distance, orientation, etc.); used as an umbrella term
covering spatial perception, spatial ability, visual perception or spatial intelligence [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Spatial
vision refers to the ability of an eye to capture and process fine details of a visual scene [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Spatial
feeling uses rich illustrations and examinations of art, technology, and philosophy to explain this
phenomenon [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Spatial understanding contains historical background and a discussion of space
missions, space environment, orbits, etc. Also provides fundamentals of space missions and
systems, a complete picture of the space industry [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. Spatial awareness is the ability to be aware
of your surroundings and where you are in relation to the surrounding objects, as well as the
ability to understand your body’s position in relation to your surroundings [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. Spatial
consciousness may refer to individual or collective awareness about real-world spatial phenomena
and processes; it relates to the mental process that allows us to perceive, organize, and navigate the
space around us [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. Spatial ability is the capacity to understand, reason, and remember the
visual and spatial relations among objects or space. Spatial intelligence is the concept of being able
to successfully perceive and derive insight from visual data [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Spatial knowledge refers to
chunks of knowledge that are focused on the spatial component like coordinates and place names
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Spatial danger originates from the risk that an infection in this space can spread easily to
either side. Spatial warfare includes ground-to-space warfare, space-to-space warfare, and
space-toground warfare. Spatial management highlights the need for more interdisciplinary, strategic, and
collaborative methods to achieve broad goals [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Spatial planning mediates between the
respective claims on space of the state, market, and community. Spatial belief is a central and
researched social category, as an educational category in the school context; it also extends the
cognitive research on human belief to the area of spatial reasoning [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. Spatial faith has a long
history from its roots in the ancient drafting of religious cosmologies; also, astronauts observed
their religions while in space, sometimes publicly, sometimes privately [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Spatial hate is
examined in different perspectives and variety of spatial and temporal contexts. Examining hate
crime from a spatial and temporal perspective allows us to understand it better [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ]. Spatial
crime explains that many crime incidents may happen at particular spatial locations and points in
time [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Spatial diversity is widely used in mobile-radio base stations, taking advantage of
random nature of waves propagation [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Spatial hope may center on geostationary orbit, its
management, and challenges associated with its scarcity [22]. Spatial virus is based on exploitation
of multiple scales in space and time, whereas many investigations describing dynamics of
infectious are based on spatially structured models [23, 24].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Spatial grasp model and technology</title>
      <p></p>
      <sec id="sec-3-1">
        <title>Key ideas</title>
        <p>Within Spatial Grasp Technology (SGT) (see the related patent [25], published books [26–35],
early history [36–39]), a high-level operational scenario in recursive Spatial Grasp Language (SGL),
starting in any world points, propagates, covers and matches the distributed environment in
parallel wavelike mode, as symbolically shown in Figure 1. Such propagation can result in
returning and analyzing the reached states and data as well as in further waves from the initial and
new nodes, which may be arbitrarily remote and in any numbers.</p>
        <p>This concept is based on quite different philosophy and practice of traditional dealing with large
distributed and parallel systems. Instead of representing systems and solutions in them in the form
of communicating parts or agents the developed Spatial Grasp paradigm is organizing everything
by integral, holistic, and parallel substance self-propagating thru and covering-matching distributed
worlds of different natures. The latter may include: physical world, virtual world, executive
world, also their combinations.</p>
        <p></p>
      </sec>
      <sec id="sec-3-2">
        <title>Spatial Grasp Language</title>
        <p>The recursive language top level organization can be expressed just in a single string-formula
mode:
grasp</p>
        <p>à constant | variable | rule ({ grasp, })
which can be further extended as follows:
constant
variable
rule



information | matter | special
global | heritable | frontal | nodal | environmental
movement | creation | advancement | branching | cycling |
echoing | verification | assignment | transference |
exchange | timing | qualifying | type | usage
Some details on its components, as follows.</p>
        <p>Constant can be self-identifiable by the way written or defined by special rules embracing them
with arbitrary textual representations, being of information, matter, and special.</p>
        <p>Variable types can be defined by how their names are written, but in general, variables may
have any names if their types are declared by special rules, being of global, heritable, frontal,
nodal, and environmental.</p>
        <p>Rule may be further detailed as follows. Movement may result in virtual hopping to the
existing nodes (the ones having virtual or/and executive dimensions) or in real movement to new
physical locations, subsequently starting the remaining scenario in the nodes reached. Creation
creates or removes nodes and/or links leading to them during distributed world navigation; after
termination, the resultant values correspond to the names of reached nodes, and the next scenario
steps may start from all these nodes. Advancement can organize forward advancement in space
and time of the embraced scenarios; they can evolve within their sequence in synchronous or
asynchronous manner. Branching rules allow the embraced set of scenario operands to develop
“in breadth”, each from the same starting position, with the resultant set of positions and order of
their appearance depending on the logic of a concrete branching rule. Cycling repeatedly invokes
the embraced scenario; the resultant set of positions on the rule will be integration of all positions
from successful scenario invocations from the same point, or those obtained on its last invocation
in a sequence. Echoing oriented on various aspects of data and knowledge processing containing
rules which may use local or remote values for different operations be processed in the starting
points. Verification rules verify the result of concrete procedure while remaining after their
completion in the same world positions where they started. Assignment rules assign the result of
the right scenario operand, which may be arbitrarily remote, to the variable or set of variables
named or reached by the left scenario operand, which may be remote too. Transference rules
organize transference of control in distributed scenarios to the code treated either as SGL
procedure or an external system; they can also trigger broadcasting of the data obtained to
different destinations. Exchange rules provide input of external information or physical matter by
the initiative of SGL scenario, also output of the resultant value obtained by the embraced scenario
outside or to other nodes. Timing rules are dealing with conditions related to a time allowed for
the scenarios they embrace, or provide the needed time delays between different scenario parts.
Qualifying rules are providing or supporting certain qualities or abilities, also setting constraints
or restrictions to the scenarios they embrace. Type rules explicitly assign types to different
constructs, using their existing repertoire. Usage rules explain how to use the information units
they embrace.</p>
        <p>For more SGL details please see the APPENDIX.
</p>
      </sec>
      <sec id="sec-3-3">
        <title>Self-evolving SGL scenarios</title>
        <p>The following are some hints on how SGL scenarios self-evolve in distributed environments.
They are developing in steps, potentially parallel, with new steps produced on the results of
previous steps. Any step is associated with a certain point or points of the world. Each step provides
a resultant value (single or multiple) and resultant control state. Different scenario parts may evolve
from the same points in ordered, unordered, or parallel manner, as independent or interdependent
branches. Different scenario parts can spatially succeed each other, with new parts evolving from
positions reached by the previous parts. This potentially parallel and distributed scenario can
proceed in synchronous or asynchronous modes, also any combinations. SGL operations and
decisions can use control states and values returned from subsequent scenario parts, effectively
combining controlled forward and backward scenario evolution. Different steps from the same or
different scenarios may happen to be temporarily associated with the same world points, while
sharing persistent or provisional information in them. Staying with different world points, the
scenarios can analyze and impact the navigated worlds via these locations. Scenarios navigating
distributed spaces can form active distributed infrastructures in them, which can be shared with
other scenarios. Overall organization of the world creation, coverage, modification, analysis and
processing provided by SGL rules can be arbitrarily nested. The evolving SGL scenarios can
abandon utilized parts if not needed any more, also self-modify and self-replicate during space
navigation. The special control states (including thru, done, fail, fatal) appear after completion of
different scenario steps, indicating their progress or failure. They can be used for effective control
of multiple distributed processes with proper decisions at different levels.</p>
        <p></p>
      </sec>
      <sec id="sec-3-4">
        <title>Networked SGL implementation</title>
        <p>Each SGL interpreter copy can handle and process multiple active scenario code propagating in
space and time. Communicating interpreters can be of arbitrary number of copies (up to thousands
and millions if needed) effectively integrated with other existing systems and communications,
altogether representing powerful spatial engines operating without central resources or control.
Hardware or software SGL interpreters, shown in Figure 2 as universal control and processing
units (working with complex spatial graph and network data) can be installed, runtime created too,
in proper physical or virtual world positions.</p>
        <p>The SGL interpreter main components and its general organization are shown in Figure 3.</p>
        <p>The interpreter consists of a number of specialized functional processors (shown by rectangles)
working with and sharing specific data structures.These include: Communication Processor (CP),
Control Processor (COP), Navigation Processor (NP), Parser (P), different Operation Processors
(OP), and special (external &amp; internal) World Access Unit (WAU) directly manageable from SGL.
Main data structures (also referred to as stores) with which these processors operate (shown by
ovals) comprise: Grasps Queue (GQ), Suspended Grasps (SG), Track Forest (TF), Activated Rules
(AR), Knowledge Network (NN), Grasps Identities (GI), Heritable Variables (HV), Fontal Variables
(FV), Nodal Variables (NV), Environmental Variables (EV), Global Variables (GV), Incoming Queue
(IQ), and Outgoing Queue (OQ).</p>
        <p>As both backbone and nerve system of the distributed interpreter, its self-optimizing Spatial
Track System provides hierarchical command and control as well as remote data and code access. It
also supports spatial variables and merges distributed control states for decisions at higher
organizational levels. The track infrastructure is automatically distributed between active
components (humans, robots, computers, smart-phones, satellites, etc.) during scenario
selfspreading in distributed environments. It integrates the following operational stages: forward
grasping, echoing, and further forward development.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Examples of typical solutions in SGL</title>
      <p></p>
      <sec id="sec-4-1">
        <title>Finding shortest path tree (SPT) from a node to all other nodes</title>
        <p>Imagine we have a distributed physical or virtual network, as of Figure 4 (which can be
effectively built in SGL).</p>
        <p>To create on this network a tree structure starting from some node d and providing shorted
paths from it to all other nodes (as in Figure 4 too) we may write in SGL the following scenario (the
found SPT will be embedded into the network structure with variables Up in all nodes):
nodal(Dist, Up); hop_node(d); Distance = 0; frontal(Far);</p>
        <p>This scenario is based on virus-like parallel propagation of the self-modified SGL code
starting in certain node like d and then self-covering-conquering the whole network structure.
After its completion, we may start in any node, say c, and follow contents of nodal variables Up
leading to the above nodes of the obtained tree, finally receiving the shortest path to this node from
the starting node d as follows:
hop_node(c); frontal(Spath) = NAME;
repeat(hop(Up); append(NAME, Spath); output(Spath)
The output result will be(d,b,c).
</p>
      </sec>
      <sec id="sec-4-2">
        <title>Finding certain individuals worldwide</title>
        <p>Imagine we have to find detailed information about individuals belonging to some Group
indentified by specific features, and originating in START position represented by physical or
virtual address. Staying in it, the group members can be found by their features in local_databases.
This may fail to find records on some or all individuals sought, but their traces may exist in
local_security systems. If such traces exist and lead to known Other world locations, we may
search both data and security records at other points too, and so on, with the checking potentially
spreading and covering the whole world. The found match from different points can be collected
and returned (with whereabouts of individuals) to the START point with final output there. This
scenario can be expressed in SGL as follows (with its possible spatial coverage shown in Figure 5
where universal SGT interpreters U are supposed existing in all nodes).</p>
        <p>hopfirst(START); nodal(Other);
frontal(Group) = features;
output(‘Records found worldwide:’ &amp;&amp;
repeat(free(match(Group, local_databases)),
Other = traces(Group, local_security);
hopfirst(Other)))</p>
        <p>This scenario first employs forward parallel virus-like world propagation as in previous
example, and then in a feedback propagation brings to the starting node all distributed results,
using for this the spatial track system feature of the networked SGT interpreter.</p>
        <sec id="sec-4-2-1">
          <title>Answer in the START point may be as follows: Records found worldwide: match_1, match_2, …, match_m</title>
          <p></p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>Chasers fighting targets under global situational awareness</title>
        <p>By regularly enriching the distributed swarm of chasers with a sort of global awareness over
the operational area we may essentially improve its performance. This awareness can be effectively
embedded into communicating chasers where the targets seen by individual chasers can be
regularly exchanged with their neighbors, as in Figure 6.</p>
        <p>This makes all chasers gradually aware of all targets in the region despite not all directly
visible individually (D1 as vision threshold), always organizing their movement to be closer to the
targets, and then select,_move, and destroy them. An example of such SGL solution may be as
follows:
hop_chasers(all);
nodal(D1 = distance, Targets); frontal(Exchange);
stay(Exchange = Targets; hop(neighbors);
merge(Targets, Exchange));
sleep(Delay))</p>
        <p>More details and explanations on these and many other applications of the SGT and
programming in SGL can be found in many existing technology related publications, [26–35]
including.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Extended technology applications</title>
      <p>These references are reflecting the potential and practical applicability of the described Spatial
Grasp technology in the ongoing engineering works.
5.1. Currently Investigated Applications of SGT
Energy-saving tools in industry, transport, and construction. Water supply control systems for
modern buildings. Equipment control systems in buildings and facilities. Future of situational
control technologies. Innovative technologies of national security. Decision-making support
systems. Multi-agent pursuit problem in three-dimensional space. Interaction of a human
operator with a control system. Decision-making technologies in military systems . Automation
systems of technological processes. Development of intelligent autonomous robots. Automatic
control for hot rolling mills. Creation of a defense resource management system. Optimization
of rolling modes in a mill. Decision-making concept and definition.Automation for thick-plate
mills.</p>
      <p>The following combined solutions summarized from the cited above papers are currently
considered for their practical support by the SGT.</p>
      <p></p>
      <sec id="sec-5-1">
        <title>Decision support systems.</title>
        <p>It is necessary to use a decision support system (DSS) to plan a military battle. The system
analyzes in real time information received from all sources (drones, reconnaissance, radars) about
the location of troops, meteorological conditions, logistical capabilities, data about the enemy
(reconnaissance, action forecasts) and suggests routes for attacks, defense or retreat. With the help
of forecasting models, the consequences of various scenarios (attack, defense, maneuvers) and the
probability of success of the operation are assessed. A practical example for these decision support
systems may look like the one in Figure 7 and the following SGL scenario [40–42].</p>
        <p>a) Providing battlefield reconnaissance by drones with the returned collection of discovered
targets:
hop(Start);
Targets = repeat(hopfirst(drone(nearby)), free(targets_seen))</p>
        <p>The scenario propagates through the dynamic network of drones using their capabilities to
communicate with each other on a certain distance, while forming spatial tree from them and
collecting and returning via this tree the full list of targets seen on the ground.</p>
        <p>b) Finding optimal routes on the battlefield from Start to the discovered targets:
hop(Start); Distance = 0; frontal(Far);
sequence(
repeat(hop_links(all); Far += 1;
or(Distance == nil, Distance &gt; Far);
Distance = Far; Up = BACK),
(hop(Targets); repeat(hop(Up); Right = 1)))</p>
        <p>The scenario forms shortest path tree (SPT) in the battlefield road network starting from Start
position, and then starting from the targets positions discovered in the previous step a) marks
shortest routes from them to the Start.</p>
        <p>c) Physical movement of military force to the discovered targets by their coordinates and
eliminating them:
move(Start); Force = weapons;
repeat(Next = (hopfirst(links_all); nonempty(Right); COORDINATE));
move(Next); if(belong(NAME, Targets), kill(Force, current)))</p>
        <p>The scenario, originating in Start with sufficient military equipment and power, physically
propagates through the military road network to the targets identified in a) via the shortest routes
to them discovered in b) with eliminating them all.</p>
        <p></p>
      </sec>
      <sec id="sec-5-2">
        <title>Process automation systems for rolling mills.</title>
        <p>Considers the process of automated control of rolling a steel sheet with a given thickness.
Analyzes data from technological information sensors (temperature, speed, pressure, sheet
thickness, work position), and the system calculates the optimal rolling parameters (speed,
temperature, gap between rolls), calculates control effects and issues tasks to the drives of the mill
mechanisms. The human-machine interface ensures interaction between operators and the system,
response to emergency situations, displays the current state of the system, and adjusts operating
parameters. See also Figure 8 and short SGL example of continuous distributed rolling mill
management below [43, 44].</p>
        <p>b
(hop(ACRP); whirl(frontal(Ex) = ACRP_state; hop(DMS, HMI); use(Ex))),
(hop(GI); whirl(frontal(Ex) = GI_state; hop(ACRP, DMS); use(Ex))),
(hop(HMI); whirl(frontal(Ex) = HMI_state; hop(ACRP, DMS); use(Ex))),
(hop(DMS); whirl(frontal(Ex) = DMS_state; hop(R); use(Ex))),
(hop(R); whirl(anayze_execute(R_state))))</p>
        <p>The following is some explanation of this scenario which directly reflects the management
scheme of Figure 8b. It starts in parallel in all scheme nodes by their abbreviated names, activating
and allowing them to continue their own operation any time and in a cyclic manner by using rule
whirl. During the operation, they supposedly communicate with the external world by updating
properly their own state, and also exchange it with the subordinate destination nodes (as of
Figure 8b) by frontal variables Ex, with the use of them there for updating own states. All this
integral cooperative activity of the whole management scheme allows us to properly coordinate
both software and hardware of the rolling mill (symbolically depicted in Figure 8a).
</p>
      </sec>
      <sec id="sec-5-3">
        <title>Engineering equipment control systems in residential buildings and industrial facilities.</title>
        <p>Subsystems in a distributed smart home control system work with various functions of the
house, for example, lighting, heating, water supply, security systems and household appliances.
When the user returns home in the evening, a motion sensor detects a person approaching the
house, the camera recognizes the user’s face and confirms his identity. Then the outdoor lighting is
turned on, the floor heating is turned on, the temperature is updated to a comfortable level, the
curtains are closed, and so on, see also Figure 9 and SGL code following [45].
frontal(Identity) = ...;
hop(motion_sensor); hop(camera); if(negative(Identity), (stop, ALARM));
hop(outdoor_lighting); switch_on(current); hop(opening_lock); unlock(current);
hop(shutters); raise(current); hop(lights); turn_on(current);
hop(floor_heating); switch_on(current); wait(temperature &gt;= threshold);
hop(curtains); close(current); ...</p>
        <p>This SGL text directly corresponds to the arrival scenario of Figure 9b, where different stages are
performed sequentially, one after the other, with some checking additional conditions or even
providing rejection (like after motion sensor and camera identifying the arrived person), or just
waiting (like after proper heating of the floor), etc.
5.2. New cybersecurity applications of SGT
</p>
      </sec>
      <sec id="sec-5-4">
        <title>Cybersecurity and cyberattacks</title>
        <p>Cybersecurity [46] is the practice of protecting systems, networks, and programs from digital
attacks. Implementing effective cybersecurity measures is particularly challenging today because
there are more devices than people, and attackers are becoming more innovative. Common internet
cyber attacks [40] may be symbolically depicted as in Figure 10.</p>
        <p>A cyber attack usually refers to an action designed to target a computer or any element of a
computerized information system to change, destroy, or steal data, as well as exploit or harm a
network. Cyber attacks have been on the rise, in sync with the digitization of business that has
become more and more popular in recent years. More types of cyber attacks can be found in [ 47]
with their short review following.</p>
        <p>DoS and DDoS attacks. A denial-of-service (DoS) attack is designed to overwhelm the
resources of a system to the point where it is unable to reply to legitimate service requests.</p>
        <p>MITM attacks. Man-in-the-middle (MITM) types of cyber attacks refer to breaches in
cybersecurity that make it.</p>
        <p>Phishing attacks. A phishing attack occurs when a malicious actor sends emails that seem to
be coming from trusted, legitimate sources in an attempt to grab sensitive information from the
target.</p>
        <p>Whale-phishing attacks. A whale-phishing attack is so-named because it goes after the “big
fish” or whales of an organization, which typically include those in the C-suite or others in charge
of the organization.</p>
        <p>Spear-phishing attacks. Spear phishing refers to a specific type of targeted phishing attack.
The attacker takes the time to research their intended targets and then write messages the target is
likely to find personally relevant.</p>
        <p>Ransomware. With Ransomware, the victim’s system is held hostage until they agree to pay a
ransom to the attacker.</p>
        <p>Password attacks. Passwords are the access verification tool of choice for most people, so
figuring out a target’s password is an attractive proposition for a hacker.</p>
        <p>SQL injection attacks. Structured Query Language (SQL) injection is a common method of
taking advantage of websites that depend on databases to serve their users.</p>
        <p>URL interpretation. With URL interpretation, attackers alter and fabricate certain URL
addresses and use them to gain access to the target’s personal and professional data.</p>
        <p>DNS spoofing. With Domain Name System (DNS) spoofing, a hacker alters DNS records to send
traffic to a fake or “spoofed” website.</p>
        <p>Session hijacking. Session hijacking is one of multiple types of MITM attacks. The attacker
takes over a session between a client and the server.</p>
        <p>Brute force attacks. A brute-force attack gets its name from the “brutish” or simple
methodology employed by the attack. The attacker simply tries to guess the login credentials of
someone with access to the target system.</p>
        <p>Web attacks. Web attacks refer to threats that target vulnerabilities in web-based applications.
Every time you enter information into a web application, you are initiating a command that
generates a response.</p>
        <p>Insider threats. Sometimes, the most dangerous actors come from within an organization.
People within a company’s own doors pose a special danger because they typically have access to a
variety of systems.</p>
        <p>Trojan horses. A Trojan horse attack uses a malicious program that is hidden inside a
seemingly legitimate one. When the user executes the presumably innocent program, the malware
inside the Trojan can be used to open a backdoor into the system.</p>
        <p>Drive-by attacks. In a drive-by attack, a hacker embeds malicious code into an insecure
website. When a user visits the site, the script is automatically executed on their computer,
infecting it.</p>
        <p>XSS attacks. With XSS, or cross-site scripting, the attacker transmits malicious scripts using
clickable content that gets sent to the target’s browser.</p>
        <p>Eavesdropping attacks. Eavesdropping attacks involve the bad actor intercepting traffic as it is
sent through the network.</p>
        <p>Birthday attack. In a birthday attack, an attacker abuses a security feature: hash algorithms,
which are used to verify the authenticity of messages.</p>
        <p>Malware attack. Malware is a general term for malicious software, hence the “mal” at the start
of the word. Malware infects a computer and changes how it functions, destroys data, or spies on
the user or network traffic as it passes through.</p>
        <p></p>
      </sec>
      <sec id="sec-5-5">
        <title>Fighting virus sources in distributed networks under SGT</title>
        <sec id="sec-5-5-1">
          <title>Two simple examples are following.</title>
          <p>a) Nodes contain records of being infected, and also from which neighbors, as in Figure 11.</p>
          <p>The following SGL scenario starting from any infected node (like C) and tracing virus source via
the infected predecessors may be as follows. This spatial cycle terminating in the virus source node
having no registered infection predecessor, and its name is issued outside the network from the
starting node:
hop_direct(C); STATUS == infected;
output(</p>
        </sec>
        <sec id="sec-5-5-2">
          <title>NAME) repeat(nonempty(Infected_from); hop(Infected_from));</title>
          <p>Some explanation may be as follows. Starting from any nodes having infection time registered,
the scenario first finds the neighboring nodes with earlier infection time and then moves to them.
Repeating this networking search until such neighbors exist. This spatial process can potentially
terminate in more than a single node, and the node with the earliest infection time is proclaimed
either as virus source or be closest to it (as the latter may be self-protected from discovery):
hop_direct(any reachable nodes);
STATUS == infected; frontal(Time) = TIME;
output_min(
hop(all_links; STATUS == infected; Infection_time &lt; Time;
Time = Infection_time);
NAME &amp;&amp; Time)
</p>
        </sec>
      </sec>
      <sec id="sec-5-6">
        <title>Algorithm basics</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Comparison of spatial grasp model with traditional algorithms</title>
      <p>
        Algorithm is a finite sequence of mathematically rigorous instructions typically used to solve
a class of specific problems or to perform a computation.A procedure for solving a mathematical
problem in a finite number of steps that frequently involves repetition of an operation [48]. A
procedure used for solving a problem or performing a computation which acts as an exact list of
instructions that conduct specified actions step by step in either hardware- or software-based
routines [41]. A systematic procedure that produces in a finite number of steps the answer to a
question or the solution of a problem [
        <xref ref-type="bibr" rid="ref22">49</xref>
        ]. A set of mathematical instructions or rules that,
especially if given to a computer, helps to calculate an answer to a problem [ 42]. A set of rules
that must be followed when solving a particular problem [
        <xref ref-type="bibr" rid="ref23">50</xref>
        ]. A set of instructions that is
designed to accomplish a task, usually taking one or more inputs, running them systematically
through a series of steps, and providing one or more outputs [
        <xref ref-type="bibr" rid="ref24">51</xref>
        ]. A mathematical process for
solving a problem using a finite number of steps, being a key component of any computer
program and the driving force behind various systems and applications [
        <xref ref-type="bibr" rid="ref25">52</xref>
        ]. A methodical,
stepby-step procedure for solving problems or accomplishing tasks, acting as the backbone of software
applications [
        <xref ref-type="bibr" rid="ref26">53</xref>
        ].
      </p>
      <p>Elementary algorithm structures are shown in Figure 13 a, b, where Figure 13b reflects the
flowchart with three decision making nodes (1, 2, 3) for finding the greatest common divisor of two
numbers.</p>
      <p>
        Distributed algorithm is an algorithm designed to run on computer hardware constructed
from interconnected processors; used in application areas of distributed computing. Mobile agent
is a piece of software combined with data that is able to migrate from one computer to another
autonomously and continue its execution on the destination. Spatial analysis algorithms are
used for Geographic Information Systems (GIS) especially for manipulation of map coordinates
[
        <xref ref-type="bibr" rid="ref27">54</xref>
        ].
      </p>
      <p>In comparison with the described SG Model and Language, the traditional as well as extended
algorithms may be considered just as specific tools for solving concrete problems. Whereas the
Spatial Grasp may actually, not only symbolically, represent a universal philosophy, paradigm
and technology oriented on explaining, covering, and ruling the whole universe.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>The described Spatial Grasp paradigm covers any spatial systems philosophically, methodologically
and practically within the same spatial model and vision, whereas traditional algorithms being just
specific tools for solving concrete problems.</p>
      <p>This approach also fundamentally differs from any other models and languages for description,
composition, control and management of large distributed dynamic systems traditionally representing
solutions by their distributed parts (or agents) communicating with each other and exchanging
messages. Leaving this culture and types of operations only for the automatic implementation, the SGT
scenarios describe all solutions on a much higher level, in the form of integral parallel spatial flooding,
or even clever super-virus. The latter will always remain alive by being self-organized and
selfconfident during freely self-propagating, self-replicating, self-matching and self-recovering in
distributed spaces, even after or during any possible disruptions and damages, in the most
unpredictable and hostile environments. These high level spatial scenarios in SGL independently
operating “over” rather than “in” distributed systems are much clearer and enormously shorter (up to
hundred times) than in traditional C or Java languages.</p>
      <p>
        Investigations and trial implementations of SGT and its predecessor WAVE were made in
different countries and demonstrated via the internet [26–39]. Any new technology versions can be
carried out quickly by a small group of system programmers and on any existing platforms, also
effectively integrated with advanced communication systems. Results of the ongoing investigation
of SGT applicability in new areas of management, control, and cybersecurity [
        <xref ref-type="bibr" rid="ref28 ref29 ref30">40, 55–57</xref>
        ] will also
be revealed in the subsequent papers. The briefest technology reference: “Spatial Grasp” in
google.com.
      </p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[22] B. Roy, Space Horizons: An Era of Hope in the Geostationary Orbit, University of Oregon
School of Law, 2020.
https://scholarsbank.uoregon.edu/items/dd40b459-2a12-4396-bdd8e41348793bfe
[23] P. Kumberger, F. Frey, et al., Multiscale modeling of virus replication and spread, Wiley, FEBS</p>
      <p>Letters, 13 (2016) 1972–1986. doi:10.1002/1873-3468.12095
[24] G. A. Funk, V. A. A. Jansen, et al., Spatial models of virus-immune dynamics, J. Theor. Biology,
233(2) 21 (2005). doi:10.1016/j.jtbi.2004.10.004
[25] P. S. Sapaty, A distributed processing system, European Patent N 0389655, Publ. 10.11.93,</p>
      <p>European Patent Office.
[26] P. S. Sapaty, Ruling Distributed Dynamic Worlds. New York: John Wiley &amp; Sons, 2005.
[27] P. S. Sapaty, Managing Distributed Dynamic Systems with Spatial Grasp Technology,</p>
      <p>Springer, 2017.
[28] P. S. Sapaty, Holistic Analysis and Management of Distributed Social Systems, Springer, 2018.
[29] V. Grechaninov, et al., Models and Methods for Determining Application Performance
Estimates in Distributed Structures, in: Cybersecurity Providing in Information and
Telecommunication Systems, vol. 3288, 2022, 134–141.
[30] S. Zhebka, et al., Method for Adaptive Allocation of Cryptographic Resources in Distributed
Databases, in: Cybersecurity Providing in Information and Telecommunication Systems, vol.
3991 (2025) 620–628.
[31] P. S. Sapaty, Complexity in International Security: A Holistic Spatial Approach, Emerald</p>
      <p>Publishing, 2019.
[32] P. S. Sapaty, Symbiosis of Real and Simulated Worlds under Spatial Grasp Technology,</p>
      <p>Springer, 2021.
[33] P. S. Sapaty, Spatial Grasp as a Model for Space-based Control and Management Systems, CRC</p>
      <p>Press, 2022.
[34] P. S. Sapaty, Spatial Networking in the United Physical, Virtual, and Mental World, Springer,
2024.
[35] P. S. Sapaty, Self-Healing and Self-Recovering Systems under the Spatial Grasp Model,</p>
      <p>Emerald Publishing Limited, 2025.
[36] A. T. Bondarenko, S. B. Mikhalevich, A. I. Nikitin, P. S. Sapaty, Software of BESM-6 computer
for communication with peripheral computers via telephone channels, Computer Software, 5
(1970).
[37] P. S. Sapaty, A Method of organization of an intercomputer dialogue in the radial computer
systems, in The Design of Software and Hardware for Automatic Control Systems, Inst. of
Cybernetics Press, Kiev, 1973.
[38] S. Sapaty, A wave language for parallel processing of semantic networks. Comput. Artif. Intell.</p>
      <p>5(4) (1986) 289–314.
[39] P. S. Sapaty, Distributed modeling of cooperative behavior by mobile agents, Proc. Sixth
Conference on Computer Generated Forces and Behavioral Representation, IST UCF, Orlando,
FL, 1996, 599-613.
[40] Common internet Cyber Attacks.
https://www.shutterstock.com/image-vector/vector-infographic-common-internet-attacks-606244733
[41] A. S. Gillis, What is an algorithm? https://www.techtarget.com/whatis/definition/algorithm
[42] Algorithm. https://dictionary.cambridge.org/dictionary/english/algorithm
[43] M. G. Ievlev, One of the methods of decomposition of the problem of optimization of rolling
modes in a thick-plate mill, Math. Machines Syst. 3 (2022) 108–120.
[44] A. O. Morozov, V. P. Klymenko, G. G. Grabovsky, M. G. Ievlev, S. E. Moiseenko, Concepts of
human-machine automation in the ACS of thick-plate mills, Math. Machines Syst. 1 (2022) 81–
96.
[45] V. P. Klymenko, V. B. Korbut, M. G. Ievlev, et al., Energy-saving automation tools and LED
lighting systems in industry, transport, construction and municipal sectors, Sci. Innov. 5 (2013)
19–26.
[46] What is cybersecurity?
https://www.cisco.com/site/us/en/learn/topics/security/what-iscybersecurity.html
[47] Types of cyber attacks.
https://www.fortinet.com/uk/resources/cyberglossary/types-of-cyberattacks
[48] Algorithm. https://www.merriam-webster.com/dictionary/algorithm
2023.</p>
    </sec>
    <sec id="sec-8">
      <title>Appendix: Spatial Grasp Language Summary</title>
      <p>In the language summary below, syntactic categories are shown in italics, vertical bar separates
alternatives, parts in braces indicate zero or more repetitions with a delimiter at the right, and
constructs in brackets are optional. The remaining characters and words are the language symbols
(including boldfaced braces):
information</p>
      <p> string | scenario | number
grasp
constant
string
scenario
number
matter
special
variable
global
heritable
frontal
nodal
 constant | variable | [ rule ] [({ grasp,})]
 information | matter | special
 ‘{character}’
 {{character}}
 “{character}”
 [sign]{digit}[.{digit}[e[sign]{digit}]]
 thru | done | fail | fatal | infinite | nil | any | all |
other | allother | current | passed | existing |
neighbors | direct | forward | backward | synchronous |
asynchronous | virtual | physical | executive |
engaged | vacant | firstcome | unique
 global | heritable | frontal | nodal | environmental
</p>
      <sec id="sec-8-1">
        <title>H{alphameric}</title>
        <p>

</p>
      </sec>
      <sec id="sec-8-2">
        <title>G{alphameric}</title>
      </sec>
      <sec id="sec-8-3">
        <title>F{alphameric}</title>
      </sec>
      <sec id="sec-8-4">
        <title>N{alphameric}</title>
        <p>environmental  TYPE | NAME | CONTENT | ADDRESS | QUALITIES | WHERE |</p>
      </sec>
      <sec id="sec-8-5">
        <title>BACK | PREVIOUS | PREDECESSOR | DOER | RESOURCES | LINK |</title>
      </sec>
      <sec id="sec-8-6">
        <title>DIRECTION | WHEN | TIME | STATE | VALUE | IDENTITY | IN | OUT | STATUS | SIZE | WEIGHT | LENGTH rule</title>
        <p>
movement | creation | advancement | branching | cycling |
echoing | verification | assignment | transference |
exchange | timing | qualifying | type | usage
movement  hop | hopfirst | hopforth | move | shift | follow
creation  create | linkup | delete | unlink
advancement  advance | slide | align | fringe
branching  branch | sequence | parallel | if | or | and | orsequence |
orparallel | andsequence | andparallel | choose |
quickest | | split | replicate
cycling  repeat | cycle | loop | sling | whirl
echoing  state | rake | order | unit | unique | sum | count | first |
last | min | max | random | average | sortup | sortdown |
reverse | element | position | fromto | add | subtract |
multiply | divide | degree | separate | unite | attach |
append | common | withdraw | increment | decrement |
access | invert | apply | location | distance
verification  equal | nonequal | less | lessorequal | more | moreorequal |
bigger | smaller | heavier | lighter | longer | shorter | empty |
nonempty | belong | notbelong | intersect | notintersect | yes | no
assignment  assign | assignpeers
transference  run | call
exchange  input | output | send | receive | emit | get
timing  sleep | allowed
qualifying  contain | release | trackless | free | blind | quit |
abort | stay | lift | seize | exit
type  global | heritable | frontal | nodal | environmental |
matter | number | string | scenario | constant
usage  address | coordinate | content | index | time | speed |
name | place | center | range | doer | node | link | unit</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Oliver,
          <article-title>What is spatial temporal in philosophy? 2019</article-title>
          . https://www.quora.com/What-isspatial
          <article-title>-temporal-in-philosophy#:~:text=This%20is%20an%20adjective%20describing,as%20your %20thoughts%20and%20emotions</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] What is Spatial Thinking</article-title>
          . https://www.igi-global.com/dictionary/spatial-thinking/
          <fpage>62031</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Spatial</given-names>
            <surname>Thinking</surname>
          </string-name>
          . https://geometriedidaktik.at/en/spatial-ability/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Spatial vision</article-title>
          . https://www.sciencedirect.com/topics/neuroscience/spatial-vision
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bardt</surname>
          </string-name>
          , The Feeling of Space, The MIT Press,
          <year>2024</year>
          . https://mitpress.mit.edu/9780262049368/ the-feeling-of-space/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J. J. Sellers</given-names>
            , R. J. 
            <surname>Astore</surname>
          </string-name>
          , et al, Understanding Space:
          <article-title>An Introduction to Astronautics, 2nd Edition</article-title>
          ,
          <source>McGraw-Hill Primis Custom Pub; 2nd edition</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J. J. Sellers</given-names>
            , R. J. 
            <surname>Astore</surname>
          </string-name>
          , et al,
          <string-name>
            <surname>Understanding</surname>
            <given-names>Space</given-names>
          </string-name>
          ,
          <article-title>An Introduction to Astronautics 4th Edition</article-title>
          ,
          <string-name>
            <surname>McGraw-Hill</surname>
            <given-names>Companies</given-names>
          </string-name>
          , Inc.,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8] What is Spatial Awareness? https://www.twinkl.com/teaching-wiki/spatial-awareness#:~: text=
          <source>Spatial%20awareness%20is%20the%20ability,you%20can%20walk%20without%20bending</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>J. </surname>
          </string-name>
          <article-title>Seladi-Schulman, What's Important about Spatial Awareness?</article-title>
          <year>2020</year>
          . https://www.healthline.com/health/spatial-awareness
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>D.</surname>
          </string-name>
           Galland,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Grønning</surname>
          </string-name>
          , Spatial Consciousness, Online library Wiley,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1002/9781118568446.eurs0308
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>D.</surname>
          </string-name>
           Karmarkar,
          <source>Spatial Awareness and Consciousness: Navigating Life's Spaces</source>
          ,
          <year>2023</year>
          . https://medium.com/@karmarkardipesh/spatial
          <article-title>-awareness-and-consciousness-navigatinglifes-spaces-54158e13a153</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>L.</surname>
          </string-name>
           
          <article-title>Fitzgibbons, Spatial intelligence</article-title>
          . https://www.techtarget.com/whatis/definition/spatialintelligence
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R. </given-names>
            <surname>Laurini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Thompson</surname>
          </string-name>
          ,
          <fpage>17</fpage>
          -Spatial Knowledge:
          <article-title>Intelligent spatial information systems</article-title>
          ,
          <source>Fundamentals of Spatial Inf. Syst</source>
          . (
          <year>1992</year>
          )
          <fpage>620</fpage>
          -
          <lpage>670</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>-08-092420-5</source>
          .
          <fpage>50022</fpage>
          -
          <lpage>0</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Dandoulaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lazoglou</surname>
          </string-name>
          ,
          <article-title>Disaster Risk Management and Spatial Planning: Evidence from the Fire-Stricken Area of Mati, Greece</article-title>
          .
          <source>Sustainability</source>
          <volume>15</volume>
          (
          <issue>12</issue>
          ) (
          <year>2023</year>
          )
          <article-title>9776</article-title>
          . doi:
          <volume>10</volume>
          .3390/su15129776
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <article-title>“Spatial Beliefs” in the context of school</article-title>
          . Multicollectivity, Education and Space, University of Passau,
          <year>2024</year>
          . https://www.sobi.uni-passau.de/en/education
          <article-title>-diversity-educational-spaces/ research/education-and-space/translate-to-englisch-spatial-beliefs-im-kontext-schule</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>J. Nejasmic</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
           
          <string-name>
            <surname>Bucher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Knauff</surname>
          </string-name>
          ,
          <article-title>Grounded spatial belief revision</article-title>
          ,
          <source>Acta Psychologica</source>
          ,
          <volume>157</volume>
          (
          <year>2015</year>
          )
          <fpage>144</fpage>
          -
          <lpage>154</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.actpsy.
          <year>2015</year>
          .
          <volume>02</volume>
          .008
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>J. </surname>
          </string-name>
          <article-title>Corrigan, Spatiality and religion</article-title>
          ,
          <source>in Book The Spatial Turn, Routledge</source>
          ,
          <year>2008</year>
          . doi:
          <volume>10</volume>
          .4324/9780203891308
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>P.</surname>
          </string-name>
           Hopkins, Afterword: Spatializing Hate - Relational, Intersectional and
          <string-name>
            <given-names>Emotional</given-names>
            <surname>Approaches</surname>
          </string-name>
          , Bristol University Press,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .56687/
          <fpage>9781529215205</fpage>
          -
          <lpage>017</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>M.</surname>
          </string-name>
           R. Wenger,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lantz</surname>
          </string-name>
          , Hate Crime and
          <article-title>Place: The Spatial and Temporal Concentration of Bias-Motivated Crime</article-title>
          in Washington, D.C.,
          <string-name>
            <given-names>J Interpers</given-names>
            <surname>Violence</surname>
          </string-name>
          ,
          <year>2022</year>
          doi:10.1177/0886260520987817
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Hipp</surname>
          </string-name>
          ,
          <source>The Spatial Scale of Crime, Routledge; 1st edition</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Spatial</given-names>
            <surname>Diversity</surname>
          </string-name>
          .
          <source>From: Wireless Communications Design Handbook</source>
          ,
          <year>1998</year>
          . https://www.sciencedirect.com/topics/engineering/spatial-diversity
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [49]
          <string-name>
            <surname>Algorithm</surname>
          </string-name>
          . https://www.britannica.com/science/algorithm
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [50]
          <string-name>
            <surname>Algorithm</surname>
          </string-name>
          . https://www.oxfordlearnersdictionaries.com/definition/english/algorithm
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [51]
          <string-name>
            <surname>Algorithm</surname>
          </string-name>
          . https://www.nnlm.gov/guides/data-glossary/algorithm
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Nikolopoulou</surname>
          </string-name>
          , What Is an Algorithm? | Definition &amp; Examples, https://www.scribbr.com/ai
          <article-title>-tools/what-is-an-algorithm/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>What</given-names>
            <surname>Is</surname>
          </string-name>
          an Algorithm?
          <year>2024</year>
          . https://computer.howstuffworks.
          <article-title>com/what-is-a-computeralgorithm</article-title>
          .htm
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [54]
          <string-name>
            <surname>A.</surname>
          </string-name>
           J. Lembo,
          <string-name>
            <given-names>Spatial</given-names>
            <surname>Algorithms</surname>
          </string-name>
          , Salisbury University. https://faculty.salisbury.edu/~ajlembo/ 419/lecture11.pdf
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>A. O.</given-names>
             
            <surname>Morozov</surname>
          </string-name>
          , V. O. 
          <string-name>
            <surname>Yashchenko</surname>
          </string-name>
          ,
          <article-title>Situational centers and decision-making systems</article-title>
          .
          <source>Innovative technologies of national security, Math. Machines Syst. 3-4</source>
          (
          <year>2024</year>
          )
          <fpage>3</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>A. O.</given-names>
             
            <surname>Morozov</surname>
          </string-name>
          , V. O. 
          <article-title>Yashchenko, Decision-making technologies in military systems. challenges and prospects</article-title>
          .
          <source>Math. Machines Syst</source>
          .
          <volume>4</volume>
          (
          <issue>2023</issue>
          )
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>A. O.</given-names>
             
            <surname>Morozov</surname>
          </string-name>
          , V. O. 
          <article-title>Yashchenko, Robots in modern warfare. Prospects for the development of intelligent autonomous robots with an artificial brain</article-title>
          ,
          <source>Math. Machines Syst</source>
          .
          <volume>3</volume>
          (
          <issue>2023</issue>
          )
          <fpage>3</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>