D. S. Ivanov, V. P. Veiko, Y. B. Yakovlev, M. E. Carcia, B. Rethfeld

Read the full article 
Article in Russian

For citation: The work is done under the grant support of the President of the Russian Federation NSH-1364.2014.2, RFBR grants 12-02-01194, 13-02-00033, 13-02-00971, and is partially financially supported by the Government of the Russian Federation (grant 074-U01), grants DFG IV 122/1-1 and IV 122/1-2.


 The process of laser ablation under the influence of ultra short laser pulses on metals is investigated by methods of molecular dynamics. The validity and applicability of the hybrid atomistic-continuous model for the estimation of optimum modes of ultra short laser pulses processing are explored. Combination of atomistic model of laser-induced non-equilibrium process of a phase transition at the atomic level with continuous two-temperature model for describing the dynamics of photo-excitation of free media is proposed. Applicability of laser ablation model on the example of aluminum films and gold under exposure to pulses with different energy density and duration is shown. It is indicated that, depending on the ratio of the laser pulse duration and the characteristic time of electron-phonon material interaction, photothermal and photomechanical modes of destruction are implemented that determine the quality and performance of the laser processing. It is established that at the duration of laser pulse less than the time of electron-phonon interaction high-performance photomechanical type of destruction is implemented by internal stresses arising in the area of exposure. This is confirmed by a linear dependence of the ablation rate from the absorbed energy. At the duration of laser pulse greater than the time of electron-phonon interaction inefficient photothermal mode of destruction is implemented. The results may be useful for specialists engaged in the development of laser technologies

Keywords: laser ablation, ultra short laser pulses, molecular dynamics, photothermal destruction, photomechanical destruction

Acknowledgements. Работа выполнена при поддержке гранта Президента Российской Федерации НШ-1364.2014.2, грантов РФФИ 12-02-01194, 13-02-00033, 13-02-00971 и при государственной финансовой поддержке ведущих университетов Российской Федерации (субсидия 074-U01) и грантов DFG IV 122/1-1 и IV 122/1-2

1.     Gubanov D.A. Obzor Onlainovykh Sistem Reputatsii/Doveriya [Overview of Online Reputation/Trust Systems]. 2009. Available at: (accessed 24.03.2014).
2.     Zikratov I.A., Zikratova T.V., Lebedev I.S. Doveritel'naya model' informatsionnoi bezopasnosti mul'tiagentnykh robototekhnicheskikh sistem s detsentralizovannym upravleniem [Trust model for information security of multi-agent robotic systems with a decentralized management]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 2(90), pp. 47–52.
3.     Neeran K.M., Tripathi A.R. Security in the Ajanta MobileAgent system. Technical Report. Department of Computer Science, University of Minnesota, 1999, 28 p.
4.     Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. 4th International Conference on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2, pp. 1165–1166.
5.     Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios.Proc. 2nd Australasian Information Security Workshop (AISW2004). ACS Dunedin, New Zealand, 2004, vol. 32, pp. 17–25.
6.     Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities.Proc. 1st International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
7.     Dorigo M., Maniezzo V., Colorni A. Ant system: optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 1996, vol. 26, no. 1, pp. 29–41. doi: 10.1109/3477.484436
8.     Wooldridge M. Introduction to MultiAgent Systems. John Wiley & Sons Ltd, 2002, 368 p.
9.     Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom [Vulnerability analysis of robotic systems with swarm intelligence]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5(87), pp. 149–154.
10.Komarov I.I.,Drannik A.L., Yurieva R.A. Modelirovanie problem informatsionnoi bezopasnosti mul'tiagentnykh sistem [Multiagent information security problem’s simulation]. V Mire Nauchnykh Otkrytii, no. 4(52), pp. 61–70.
11.Drannik A.L. Ispol'zovanie programm-simulyatorov povedeniya roevykh robototekhnicheskikh sistem dlya issledovaniya voprosov bezopasnosti [Using program simulators of swarm robotic systems behavior for security studies]. Materialy VIII Sankt-Peterburgskoi Mezhregional'noi Konferentsii Informatsionnaya Bezopasnost' Regionov Rossii (IBRR-2013) [Proc. VIII St. Petersburg Interregional Conference "Information Security of Russian Regions"]. St. Petersburg, 2013, pp. 240–251.
12.Schillo M., Funk P., Rovatsos M. Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence, 2000, vol. 14, no. 8, pp. 825–848. doi: 10.1080/08839510050127579
13.Golbeck J., Parsia B., Hendler J. Trust networks on the semantic web. Lecture Notes in Artificial Intelligence, 2003, vol. 2782, pp. 238–249.
14.Garcia-Morchon O., Kuptsov D., Gurtov A., Wehrle K. Cooperative security in distributed networks. Computer Communications, 2013, vol. 36, no. 12, pp. 1284–1297. doi: 10.1016/j.comcom.2013.04.007
15.Beshta A.A., Kirpo M.A. Postroenie modeli doveriya k ob"ektam avtomatizirovannoi informatsionnoi sistemy dlya predotvrashcheniya destruktivnykh vozdeistvii na sistemu [Building a model of trust to objects of an automated information system in order to prevent the destructive effects on the system]. Bulletin of the Tomsk Polytechnic University, 2013, vol. 322, no. 5, pp. 104–108.
16.Ramchurn S.D., Huynh D., Jennings N.R. Trust in multi-agent systems. Knowledge Engineering Review, 2004, vol. 19, no. 1, pp. 1–25. doi:10.1017/S0269888904000116
17.Gorodetski V., Kotenko I., Karsaev O. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. Computer Systems Science and Engineering, 2003, no. 4, pp. 191–200.
18.Masloboev A.V., Putilov V.A. Razrabotka i realizatsiya mekhanizmov upravleniya informatsionnoi bezopasnost'yu mobil'nykh agentov v raspredelennykh mul'tiagentnykh informatsionnykh sistemakh [Development and implementation of mobile agent security control mechanisms in the distributed multi-agent information systems]. Proceedings of the MSTU, 2010, vol. 13, no. 4–2, pp. 1015–1032.
Copyright 2001-2017 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.