


Vol 52, No 7 (2018)
- Year: 2018
- Articles: 34
- URL: https://journal-vniispk.ru/0146-4116/issue/view/10765
Article
Semantics-Driven Migration of Java Programs: A Practical Application
Abstract
The development of a procedure supporting automated migration of Java programs to a new set of libraries is explored. Code migration is a common task in modern software projects. For example, it may arise when a project must be ported to a more secure or feature-rich library, a new platform, or a new version of an existing library. This paper presents a procedure for semantics-driven automated migration. A metamodel that applies the formalism earlier proposed by the authors and intended to describe libraries in object-oriented languages was developed for the migration procedure. The formalism specifies a library behaviour by using a system of extended finite state machines (EFSMs). The migration is split into five steps and each step is described in the paper. The procedure applies an algorithm of an equivalent path based on a breadth-first search extended for the needs of the migration task. The proposed procedure is implemented in a prototype of the migration tool. The tool includes modules for extraction of the software execution path, visualization of library models, user interaction, and migration. A library description language was developed for the tool. The prototype was tested by both artificial code and a real-world open source project. The article describes the experiments performed, the difficulties that have arisen in the process of migration of test samples, and how they are solved in the proposed procedure. The HTTP protocol and log library are used as libraries in the experiment. The results of the experiments indicate that code migration can be successfully automated through the developed procedures.



Deriving Synchronizing and Homing Sequences for Input/Output Automata
Abstract
The paper considers the problems of checking the existence and synthesis of synchronizing and homing sequences for finite input/output automata. The relevant sequences can be used when identifying the state of the system under consideration after applying the proper input sequence. In the model considered in the study, the actions are divided into inputs and outputs, however, there are no explicitly specified sets of initial and final states. The article defines the concepts of synchronizing and homing sequences and suggests methods for their synthesis for a special class of input/output automata, which have transitions in each state on either input or output actions; in addition, there are no cycles marked with output symbols in the corresponding transition graph. The necessary and sufficient conditions of existence of synchronizing and homing sequences are established, and the length of such sequences is estimated for the described class of input/output automata. The subclasses of automata are specified, for which the worst (mainly, exponential) complexity cases are not reachable.



Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures
Abstract
The classification and application of switching methods and their advantages and disadvantages are considered. A computing grid model was constructed in the form of a colored Petri net with a node, which implements cut-through packet switching. The model consists of packet switching nodes, traffic generators, and guns that form malicious traffic disguised as usual user traffic. The characteristics of the grid model are investigated under a workload with different intensities. The influence of malicious traffic such as “traffic duel” to the quality of service parameters of the grid is estimated. A comparative analysis of computing grid stability with nodes, which implement store-and-forward (SAF) and cut-through switching technologies, was conducted. It is shown that grid performance is approximately the same under workload, and under peak load the grid with a node implementing SAF packet transmission is more stable. The grid with nodes implementing SAF technology comes to a complete deadlock through an additional load, which is less than 10%. It is shown after detailed study that the traffic duel configuration does not affect the grid with cut-through nodes when increasing the workload up to peak load, at which the grid comes to a complete deadlock. The periodicity of execution of the guns, which generate malicious traffic, is determined by a random function with the Poisson distribution. The CPN Tools modeling system is used for constructing models and measuring characteristics. The grid performance and average packet delivery time are estimated under different variants of the grid load.



Semantic Security Tools in Software-Defined Networks
Abstract
Software-defined networks are a promising technology for constructing communication networks, where network management is the software that configures network devices. This contrasts the traditional approach based on configuring individual devices. This controlling software make it possible to dynamically route the configuration of data streams in the network, depending on service quality requirements. That said, however, it becomes necessary to ensure a secure data transfer [23], e.g., so that streams from confidential nodes could not reach an open segment of the network. The article shows how this task is solved by semantic tools.



Deduplication in the Backup System with Information Storage in a Database
Abstract
Prevention of data loss from digital media includes processes such as backup. It can be done manually by copying data to external media or automatically on schedule using special software. There are also remote backup systems, when data are saved over the network to some remote repository. Such systems are multi-user and process large amounts of data. A shared storage can have files containing the same fragments. The elimination of repeated data is based on the mechanism of deduplication. It is a method of information compression, when the search for copies is carried out in the entire dataset rather than within a single file. The main advantage of using this technology is significant saving of disk space. However, the mechanism of eliminating repetitive data can significantly reduce the rate of saving and restoring information. This paper is devoted to the problem of implementing such a mechanism in the backup system with information storage in a relational database. In this work we consider an example of implementation of such a system working in two modes: with and without data deduplication. This paper illustrates a class diagram for the development of the client part of the application as well as the description of tables and their relationships in a database that belongs to the backend. The author proposes an algorithm for saving data with deduplication, and also provides results of comparative tests on the speed of the algorithms for saving and recovering information when working with relational database management systems from various manufacturers.



Investigation of a Markov Model for Computer System Security Threats
Abstract
This work investigates a model of computer system security threats formulated in the language of Markov processes. In this model the operation of a computer system is considered as a sequence of failures and recoveries, which result from information security threats affecting the system. The model is described in detail: explicit analytical formulas for probabilities of computer system states at any time are derived, some extreme cases discussed, and the system’s long-run dynamics is analyzed. The dependence of a secure state probability (i.e. a state with no threats) on the probabilities of threats is investigated separately. In particular, it is shown that this dependence takes on essentially different forms for odd and even times. For example, in case of one threat the secure state probability shows non-monotonic dependence on the probability of threats at even times; this function admits at least one local minimum in its region of definition. The indicated feature is considered important because it allows identifying the most dangerous areas of threats where the secure state probability can be below the permissible level. Finally, an important characteristic of the model is introduced, i.e., the relaxation time, by means of which the permissible value range of the system’s protection parameters, is constructed.



The Shortest Path Problem for a Multiple Graph
Abstract
In the article, the definition of an undirected multiple graph of any natural multiplicity \(k > 1\) is stated. There are edges of three types: ordinary edges, multiple edges, and multi-edges. Each edge of the last two types is the union of \(k\) linked edges, which connect 2 or \(k + 1\) vertices, correspondingly. The linked edges should be used simultaneously. If a vertex is incident to a multiple edge, it can be also incident to other multiple edges and it can be the common ending vertex to \(k\) linked edges of some multi-edge. If a vertex is the common end of a multi-edge, it cannot be the common end of any other multi-edge. Also, a class of the divisible multiple graphs is considered. The main peculiarity of them is a possibility to divide the graph into \(k\) parts, which are adjusted on the linked edges and which have no common ordinary edges. Each part is an ordinary graph. The following terms are generalized: the degree of a vertex, connectedness of a graph, the path, the cycle, the weight of an edge, and the path length. The definition of a reachability set for the ordinary and multiple edges is stated. The adjacency property is defined for a pair of reachability sets. It is shown, that we can check the connectedness of a multiple graph with the polynomial algorithm based on the search for reachability sets and testing their adjacency. A criterion of the existence of a multiple path between two given vertices is considered. The shortest multiple path problem is stated. Then, we suggest an algorithm for finding the shortest path in a multiple graph. It uses Dijkstra’s algorithm for finding the shortest paths in subgraphs, which correspond to different reachability sets.



Clarification of the Properties of a Tree Centroid
Abstract
This paper is devoted to clarification of tree centroid properties. The authors attention was drawn to the popular problem of a (binary) partition of a graph, whose solution is known only by a brute force algorithm. It was found that for an “efficient” partition of the tree, it makes sense to consider partitions in the neighborhood of centroid vertices, the definition of which is presented. In the paper, we proposed proofs connected with the limitation of their weight. It is also proven that if there are two centroid vertices in a tree, they are adjacent. In what follows, it is noted that three such vertices cannot be in a tree. The corresponding statements are made. According to the first one, any vertex of a tree with a certain restriction on its weight is a centroid. According to one of the points of the second statement, if there are two centroid vertices in a tree, the order of the tree is an even number. The third statement says that if a tree has a centroid vertex of limited weight, there is another centroid vertex of the same weight, adjacent to the first one. To prove these statements, we consider a branch of the greatest weight with a centroid vertex and take another vertex adjacent to the centroid in this branch. In this paper, Jordan’s theorem is used; three images are used to illustrate the material.



Analysis of Typed Inclusion Dependences with Null Values
Abstract
Null values have become an urgent problem since the creation of the relational data model. The impact of uncertainty affects all types of dependences used in designing and operating a database. This fully applies to inclusion dependences, which are the theoretical basis for referential integrity on the data. Attempts to solve this problem contain inaccuracies in the statement of the problem and its solution. The errors in formulation of the problem can be associated with use in the definition of untyped inclusion dependences, which leads to permutations of the attributes, although, the attributes in database technology are identified by name and not by their place. In addition, linking with the use of inclusion dependences of heterogeneous attributes, even of the same type, is a sign of lost functional dependences and leads to interaction of inclusion dependences and non-trivial functional dependences. Inaccuracies in the solution of the problem are contained in the statements of axioms and proof of their properties, including completeness. In this paper we propose an original solution of this problem only for typed inclusion dependences in the presence of Null values: a new axiom system is proposed, its completeness and soundness are proven. On the basis of inference rules, we developed an algorithm for the construction of a nonredundant set of typed inclusion dependences. The correctness of the algorithm is proven.



Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
Abstract
For the practical application of code cryptosystems such as McEliece, the code used in the cryptosystem should have a fast decoding algorithm. On the other hand, the code used must ensure that finding a secret key from a known public key is impractical with a relatively small key size. In this connection, in the present paper it is proposed to use tensor product \({{C}_{1}} \otimes {{C}_{2}}\) of group MLD codes \({{C}_{1}}\) and \({{C}_{2}}\) in a McEliece-type cryptosystem. The algebraic structure of code \({{C}_{1}} \otimes {{C}_{2}}\) in a general case differs from the structure of codes \({{C}_{1}}\) and \({{C}_{2}}\), so it is possible to build stable cryptosystems of the McEliece type even on the basis of codes \({{C}_{i}}\) for which successful attacks on the key are known. However, in this way there is a problem of decoding code \({{C}_{1}} \otimes {{C}_{2}}\). The main result of this paper is the construction and validation of a series of fast algorithms needed for decoding this code. The process of constructing the decoder relies heavily on the group properties of code \({{C}_{1}} \otimes {{C}_{2}}\). As an application, the McEliece-type cryptosystem is constructed on code \({{C}_{1}} \otimes {{C}_{2}}\) and an estimate is given of its resistance to attack on the key under the assumption that for code cryptosystems on codes \({{C}_{i}}\) an effective attack on the key is possible. The results obtained are numerically illustrated in the case when \({{C}_{1}}\) and \({{C}_{2}}\) are Reed–Muller–Berman codes for which the corresponding code cryptosystem was hacked by L. Minder and A. Shokrollahi (2007).



Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy-Current Defectograms
Abstract
Nondestructive testing of rails using various approaches and methods, including methods of magnetic and eddy-current flaw detection, is regularly carried out to ensure traffic safety on railway transport. This article is devoted to the problem of automatic determination of the threshold level of the amplitudes of useful signals (from the flaws and structural elements of the track) when interpreting defectograms of magnetic and eddy-current flaw detectors. A signal is considered useful (and is subject to further analysis), if the deviation of its value from the average value of all signals is, at least, twice more than the threshold noise level of rails. The probability of appearance of a signal with some amplitude in flawless rails in a section without structural elements, i.e. being a rail noise, is characterized by the normal distribution law. Thus, the three-sigma rule can be used to calculate the threshold noise level, and doubling the noise threshold gives a level that, if it exceeds the amplitude deviation from the sample mean, means that the signal is useful. This article proposes an algorithm to find the threshold noise level of rails and gives its theoretical justification, as well as examines examples of its operation in several fragments of real magnetic and eddy-current defectograms.



On n-Dimensional Simplices Satisfying Inclusions \(S \subset {{[0,1]}^{n}} \subset nS\)
Abstract
Let \(n \in \mathbb{N}\), \({{Q}_{n}} = {{[0,1]}^{n}}.\) For a nondegenerate simplex \(S \subset {{\mathbb{R}}^{n}}\), by \(\sigma S\) we denote the homothetic image of \(S\) with center of homothety in the center of gravity of \(S\) and ratio of homothety \(\sigma \). By \({{d}_{i}}(S)\) we mean the \(i\)th axial diameter of \(S\), i. e. the maximum length of a line segment in \(S\) parallel to the \(i\)th coordinate axis. Let \(\xi (S) = min{\text{\{ }}\sigma \geqslant 1:{{Q}_{n}} \subset \sigma S{\text{\} }},\)\({{\xi }_{n}} = min{\text{\{ }}\xi (S):S \subset {{Q}_{n}}{\text{\} }}.\) By \(\alpha (S)\) we denote the minimal \(\sigma > 0\) such that \({{Q}_{n}}\) is contained in a translate of simplex \(\sigma S\). Consider \((n + 1) \times (n + 1)\)-matrix \({\mathbf{A}}\) with the rows containing coordinates of vertices of \(S\); last column of \({\mathbf{A}}\) consists of 1’s. Put \({{{\mathbf{A}}}^{{ - 1}}}\)\( = ({{l}_{{ij}}})\). Denote by \({{\lambda }_{j}}\) linear function on \({{\mathbb{R}}^{n}}\) with coefficients from the \(j\)th column of \({{{\mathbf{A}}}^{{ - 1}}}\), i.e. \({{\lambda }_{j}}(x) = {{l}_{{1j}}}{{x}_{1}} + \ldots + {{l}_{{nj}}}{{x}_{n}} + {{l}_{{n + 1,j}}}.\) Earlier the first author proved the equalities \(\tfrac{1}{{{{d}_{i}}(S)}} = \tfrac{1}{2}\sum\nolimits_{j = 1}^{n + 1} \left| {{{l}_{{ij}}}} \right|,\alpha (S) = \sum\nolimits_{i = 1}^n \tfrac{1}{{{{d}_{i}}(S)}}.\) In the present paper we consider the case \(S \subset {{Q}_{n}}\). Then all the \({{d}_{i}}(S) \leqslant 1\), therefore, \(n \leqslant \alpha (S) \leqslant \xi (S).\) If for some simplex \(S{\kern 1pt} {{'}} \subset {{Q}_{n}}\) holds \(\xi (S{\kern 1pt} {{'}}) = n,\) then \({{\xi }_{n}} = n\), \(\xi (S{\kern 1pt} {{'}}) = \alpha (S{\kern 1pt} {{'}})\), and \({{d}_{i}}(S{\kern 1pt} {{'}}) = 1\). However, such the simplices S ' exist not for all the dimensions \(n\). The first value of \(n\) with such a property is equal to \(2\). For each 2-dimensional simplex, \(\xi (S) \geqslant {{\xi }_{2}} = 1 + \tfrac{{3\sqrt 5 }}{5} = 2.34 \ldots > 2\). We have an estimate \(n \leqslant {{\xi }_{n}} < n + 1\). The equality \({{\xi }_{n}} = n\) takes place if there exist an Hadamard matrix of order \(n + 1\). Further investigation showed that \({{\xi }_{n}} = n\) also for some other \(n\). In particular, simplices with the condition \(S \subset {{Q}_{n}} \subset nS\) were built for any odd \(n\) in the interval \(1 \leqslant n \leqslant 11\). In the first part of the paper we present some new results concerning simplices with such a condition. If \(S \subset {{Q}_{n}} \subset nS\), then center of gravity of \(S\) coincide with center of \({{Q}_{n}}\). We prove that \(\sum\nolimits_{j = 1}^{n + 1} \left| {{{l}_{{ij}}}} \right| = 2\,(1 \leqslant i \leqslant n),\sum\nolimits_{i = 1}^n \left| {{{l}_{{ij}}}} \right| = \tfrac{{2n}}{{n + 1}}(1 \leqslant j \leqslant n + 1).\) Also we give some corollaries. In the second part of the paper we consider the following conjecture. Let for simplex \(S \subset {{Q}_{n}}\)an equality \(\xi (S) = {{\xi }_{n}}\) holds. Then \((n - 1)\)-dimensional hyperplanes containing the faces of \(S\) cut off from the cube \({{Q}_{n}}\) the equal-sized parts. Though it is true for \(n = 2\) and \(n = 3\), in general case this conjecture is not valid.



On Minimal Absorption Index for an n-Dimensional Simplex
Abstract
Let \(n \in \mathbb{N}\) and let \({{Q}_{n}}\) be the unit cube \({{[0,1]}^{n}}\). For a nondegenerate simplex \(S \subset {{\mathbb{R}}^{n}}\), by \(\sigma S\) denote the homothetic copy of \(S\) with center of homothety in the center of gravity of \(S\) and ratio of homothety \(\sigma .\) Put \(\xi (S) = min{\text{\{ }}\sigma \geqslant 1:{{Q}_{n}} \subset \sigma S{\text{\} }}{\text{.}}\) We call \(\xi (S)\) an absorption index of simplex \(S\). In the present paper we give new estimates for minimal absorption index of the simplex contained in \({{Q}_{n}}\), i.e., for the number \({{\xi }_{n}} = min{\text{\{ }}\xi (S):S \subset {{Q}_{n}}{\text{\} }}.\) In particular, this value and its analogues have applications in estimates for the norms of interpolation projectors. Previously the first author proved some general estimates of \({{\xi }_{n}}\). Always \(n \leqslant {{\xi }_{n}} < n + 1\). If there exist an Hadamard matrix of order \(n + 1\), then \({{\xi }_{n}} = n\). The best known general upper estimate have the form \({{\xi }_{n}} \leqslant \tfrac{{{{n}^{2}} - 3}}{{n - 1}}\)\((n > 2)\). There exist constant \(c > 0\) not depending on \(n\) such that, for any simplex \(S \subset {{Q}_{n}}\) of maximum volume, inequalities \(c\xi (S) \leqslant {{\xi }_{n}} \leqslant \xi (S)\) take place. It motivates the making use of maximum volume simplices in upper estimates of \({{\xi }_{n}}\). The set of vertices of such a simplex can be consructed with application of maximum \(0/1\)-determinant of order \(n\) or maximum \( - 1/1\)-determinant of order \(n + 1\). In the paper we compute absorption indices of maximum volume simplices in \({{Q}_{n}}\) constructed from known maximum \( - 1/1\)-determinants via special procedure. For some \(n\), this approach makes it possible to lower theoretical upper bounds of \({{\xi }_{n}}\). Also we give best known upper estimates of \({{\xi }_{n}}\) for \(n \leqslant 118\).



Invariant Characteristics of Forced Oscillations of Beams with Longitudinal Compression
Abstract
Oscillations of an elastic beam with longitudinal compressions are investigated. The beam consists of two steel strips connected at the free ends. The compression is caused by tensioned thread. The oscillations are excited by the action of an alternating magnetic field on a magnet mounted at the end of the beam. The law of motion under changes of the frequency of harmonic action is registered. As a result of a full-scale experiment, a large set of data has been obtained. This set contains ordered periodic oscillations as well as disordered oscillations specific to dynamic systems with chaotic behavior. To study the invariant numerical characteristics of the attractor of the corresponding dynamic system, the correlation integral and correlation dimensionality as well as β-statentropy are calculated. A large numerical experiment showed that the calculation of β-statentropy is preferable compared with calculation of the correlation index. Based on the developed algorithms, the dependence of β-statentropy on the frequency of external action is constructed. The constructed dependence can serve as an effective tool to measure the adequacy of the mathematical model of forced oscillations of a beam with loss of stability.



The Andronov–Hopf Bifurcation in a Biophysical Model of the Belousov Reaction
Abstract
We consider the problem of mathematical modeling of oxidation-reduction oscillatory chemical reactions based on the Belousov reaction mechanism. The process of main component interaction in such a reaction can be interpreted by a phenomenologically similar to it predator–prey model. Thereby, we consider a parabolic boundary value problem consisting of three Volterra-type equations, which is the mathematical model of this reaction. We carry out a local study of the neighborhood of the system’s non-trivial equilibrium state and define a critical parameter at which the stability is lost in this neighborhood in an oscillatory manner. Using standard replacements, we construct the normal form of the considered system and the form of its coefficients, that define the qualitative behavior of the model, and show the graphical representation of these coefficients depending on the main system parameters. The obtained normal form makes it possible to prove a theorem on the existence of an orbitally asymptotically stable limit cycle, which bifurcates from the equilibrium state, and find its asymptotics. To identify the applicability limits of the found asymptotics, we compare the oscillation amplitudes of one periodic solution component obtained on the basis of asymptotic formulas and by numerical integration of the model system. Along with the main case of Andronov–Hopf bifurcation, we consider various combinations of normal form coefficients obtained by changing the parameters of the studied system and the resulting behavior of solutions near the equilibrium state. In the second part of the paper, we consider the problem of diffusion loss of stability of the spatially homogeneous cycle obtained in the first part. We find a critical value of the diffusion parameter at which this cycle of the distributed system loses its stability.



Local Dynamics of a Model of an Opto-Electronic Oscillator with Delay
Abstract
We consider the dynamics of an electro-optic oscillator described by a system of differential equations with delay. An essential feature of this model is that one of the derivatives is multiplied by a small parameter, which allows us to draw conclusions about the action of processes with rates of different orders. The local dynamics of a singularly perturbed system near a zero steady state is analyzed. When values of the parameters are close to critical, the characteristic equation of the linearized problem has an asymptotically large number of roots with close-to-zero real parts. The bifurcations taking place in the system are studied by constructing special normalized equations for slow amplitudes, which describe the behavior of close-to-zero solutions of the initial problem. An important feature of these equations is that they do not depend on the small parameter. The structure of roots of the characteristic equation and the order of supercriticality determine the normal form, which can be represented by a partial differential equation. The “fast” time, for which periodicity conditions are fulfilled, acts as a “spatial” variable. The high sensitivity of dynamic properties of normalized equations to the change of a small parameter is noted, which is a sign of a possible unlimited process of direct and inverse bifurcations. Also, the obtained equations exhibit multistability of solutions.



The Kuramoto–Sivashinsky Equation. A Local Attractor Filled with Unstable Periodic Solutions
Abstract
A periodic boundary value problem is considered for one of the first versions of the Kuramoto–Sivashinsky equation, which is widely known in mathematical physics. Local bifurcations in a neighborhood of spatially homogeneous equilibrium points are studied in the case when they change stability. It is shown that the loss of stability of homogeneous equilibrium points leads to the occurrence of a two-dimensional local attractor on which all solutions are periodic functions of time, except for one spatially inhomogeneous state. The spectrum of frequencies of this family of periodic solutions fills the entire number line, and all of them are unstable in the sense of Lyapunov’s definition in the metric of the phase space (the space of initial conditions) of the corresponding initial boundary value problem. As the phase space, a Sobolev functional space natural for this boundary value problem is chosen. Asymptotic formulas are given for periodic solutions filling the two-dimensional attractor. To analyze the bifurcation problem, analysis methods for an infinite-dimensional dynamical system are used: the integral (invariant) manifold method combined with the methods of the Poincaré normal form theory and asymptotic methods. Analyzing the bifurcations for the periodic boundary value problem is reduced to analyzing the structure of the neighborhood of the zero solution to the homogeneous Dirichlet boundary value problem for the equation under consideration.



Age Groups in Hutchinson Equations
Abstract
The dynamics of a generalized Hutchinson’s equation with two delays is investigated. A local analysis of stability loss for the nonzero equilibrium state of the problem is presented. Main bifurcations are analyzed by means of numerical methods with the aid of obtained asymptotic relations. The bifurcation curves corresponding to principal bifurcations taking place in the system are constructed on the plane of parameters.



Asymptotic Expansions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Singularly Perturbed Second-Order Differential Equation with Turning Points
Abstract
For a second-order equation with a small factor at the highest derivative, the asymptotic behavior of all eigenvalues of periodic and antiperiodic boundary value problems is studied. The main assumption is that the coefficient at the first derivative in the equation is the sign of the variable, i.e., turning points exist. An algorithm to compute all coefficients of asymptotic series for every considered eigenvalue is developed. It turns out that the values of these coefficients are determined only by the values of the coefficients of the original equation in a neighborhood of turning points. The asymptotic behavior of the length of Lyapunov stability and instability zones is obtained. In particular, the stability problem is solved for solutions of second-order equations with periodic coefficients and small parameters at the highest derivative.



Contrast Structures with a Multizone Internal Layer
Abstract
A boundary value problem for a singularly perturbed second-order differential equation is considered in two cases, in each of which one of the roots of the degenerate equation is double. In the first case, a narrow internal layer is proven to be formed where there is a rapid transition of the solution from the double root of the degenerate equation to a simple root; in the second case, the solution is proven to have a “spike” in the internal layer. Such solutions are called step-like contrast structures and spike-like contrast structures, respectively. In each case, the asymptotic expansion of the contrast structure is constructed. It significantly differs from the known expansion when all roots of the degenerate equation are simple; in particular, the internal layer turns out to be multizone.



Difference Approximations of a Reaction–Diffusion Equation on Segments
Abstract
The system of phase differences for a chain of diffuse weakly coupled oscillators on a stable integral manifold is constructed and analyzed. It is shown (by means of numerical methods) that Lyapunov dimension growth is close to linear as the number of oscillators in the chain increases. Extensive computations performed for the difference model of the Ginsburg–Landau equation illustrate this result and determine the applicability limits for asymptotic methods.



The Impulse-Refractive Mode in a Neural Network with Ring Synaptic Interaction
Abstract
This paper considers a mathematical model of a ring neural network with an even number of synaptically interacting elements. The model is a system of scalar nonlinear differential-difference equations, the right-hand sides of which depend on a large parameter. The unknown functions being contained in the system characterize membrane potentials of neurons. It is of interest to search within the system for special periodic solutions, so-called impulse-refractory modes. Functions with odd numbers of the impulse-refraction cycle have an asymptotically large burst and the functions with even numbers are asymptotically small. For this purpose, two substitutions are made sequentially, making it possible to study of a two-dimensional system of nonlinear differential-difference singularly perturbed equations with two delays instead of the initial system. Further, as the large parameter tends to infinity, the limiting object is defined, which is a relay system of equations with two delays. Using the step-by-step method, we prove that the solution of a relay system with an initial function from a suitable class is a periodic function with required properties. Then, using the Poincaré operator and the Schauder principle, the existence of a relaxation periodic solution of a two-dimensional singularly perturbed system is proven. To do this, we construct asymptotics of this solution, and then prove its closeness to the solution of the relay system. The exponential estimate of the Frechet derivative of the Poincaré operator implies uniqueness of the solution of a two-dimensional differential-difference system of equations with two delays in the constructed class of functions and is used to justify the exponential orbital stability of this solution. Furthermore, with the help of reverse replacement, the proven result is transferred to the original system.



Spatially Inhomogeneous Periodic Solutions in a Distributed Hutchinson’s Equation
Abstract
Abstract—The asymptotics of spatially inhomogeneous periodic solutions of the complex, spatially distributed Hutchinson equation with periodic boundary conditions are presented. It is shown that such solutions are observable in a numerical experiment.



Asymptotical Distributions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Second-Order Differential Equations
Abstract
Abstract—We consider asymptotical distributions of characteristic constants in periodic and antiperiodic boundary value problems for a second-order linear equation with periodic coefficients. This allows one to obtain asymptotical properties of stability and instability zones of solutions. We show that if there are no turning points, i.e., if \(r(t) > 0\), then the lengths of instability zones converge to zero as their number increases, while the lengths of stability zones converge to a positive number. If \(r(t) \geqslant 0\) and function \(r(t)\) has zeroes, then the lengths of stability and instability zones have finite nonzero limits as the numbers of the corresponding zones infinitely increase. If function \(r(t)\) is alternating, then the lengths of all stability zones converge to zero and the lengths of all instability zones converge to finite numbers. This yields various stability and instability criteria for solutions of second-order equations with periodic coefficients. The presented results are illustrated by a substantial example. The investigation methods are based on a detailed study of so-called special standard equations and the reduction of original equations to standard equations. Here, asymptotical methods of the theory of singular perturbations and properties of series of special functions are used.



On а Recursive-Parallel Algorithm for Solving the Knapsack Problem
Abstract
In this paper, we offer an efficient parallel algorithm for solving the NP-complete Knapsack Problem in its basic, so-called 0-1 variant. To find its exact solution, algorithms belonging to the category “branch-and-bound methods” have long been used. To speed up the solving with varying degrees of efficiency, various options for parallelizing computations are also used. We propose here an algorithm for solving the problem, based on the paradigm of recursive-parallel computations. We consider it suited well for problems of this kind, when it is difficult to immediately break up the computations into a sufficient number of subtasks that are comparable in complexity, since they appear dynamically at run time. We used the RPM_ParLib library, developed by the author, as the main tool to program the algorithm. This library allows us to develop effective applications for parallel computing on a local network in the .NET Framework. Such applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. Any language with support for the .NET Framework can be used as a programming language in conjunction with this library. For our experiments, we developed some C# applications using this library. The main purpose of these experiments was to study the acceleration achieved by recursive-parallel computing. A detailed description of the algorithm and its testing, as well as the results obtained, are also given in the paper.



On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks
Abstract
In this paper, we consider a schedulability analysis problem for real-time modular computer systems (RT MCS). A system configuration is called schedulable if all the jobs finish within their deadlines. The authors propose a stopwatch automata-based general model of RT MCS operation. A model instance for a given RT MCS configuration is a network of stopwatch automata (NSA) and it can be built automatically using the general model. A system operation trace, which is necessary for checking the schedulability criterion, can be obtained from the corresponding NSA trace. The paper substantiates the correctness of the proposed approach. A set of correctness requirements to models of system components and to the whole system model were derived from RT MCS specifications. The authors proved that if all models of system components satisfy the corresponding requirements, the whole system model built according to the proposed approach satisfies its correctness requirements and is deterministic (i.e. for a given configuration a trace generated by the corresponding model run is uniquely determined). The model determinism implies that any model run can be used for schedulability analysis. This fact is crucial for the approach efficiency, as the number of possiblemodel runs grows exponentially with the number of jobs in a system. Correctness requirements to models of system components models can be checked automatically by a verifier using observer automata approach. The authors proved by using UPPAAL verifier that all the developed models of system components satisfy the corresponding requirements. User-defined models of system components can be also used for system modeling if they satisfy the requirements.



On Optimal Interpolation by Linear Functions on n-Dimensional Cube
Abstract
Let \(n \in N\), and let \({{Q}_{n}}\) be the unit cube \({{[0,1]}^{n}}\). By \(C({{Q}_{n}})\) we denote the space of continuous functions \(f:{{Q}_{n}} \to R\) with the norm \({{\left\| f \right\|}_{{C({{Q}_{n}})}}}: = \mathop {max}\limits_{x \in {{Q}_{n}}} \left| {f(x)} \right|,\) by \({{\Pi }_{1}}\left( {{{R}^{n}}} \right)\) – the set of polynomials of \(n\) variables of degree \( \leqslant 1\) (or linear functions). Let \({{x}^{{(j)}}},\)\(1 \leqslant j \leqslant n + 1,\) be the vertices of an \(n\)-dimnsional nondegenerate simplex \(S \subset {{Q}_{n}}\). The interpolation projector \(P:C({{Q}_{n}}) \to {{\Pi }_{1}}({{R}^{n}})\) corresponding to the simplex \(S\) is defined by the equalities \(Pf\left( {{{x}^{{(j)}}}} \right) = f\left( {{{x}^{{(j)}}}} \right).\) The norm of \(P\) as an operator from \(C({{Q}_{n}})\) to \(C({{Q}_{n}})\) can be calculated by the formula \(\left\| P \right\| = \mathop {max}\limits_{x \in {\text{ver}}({{Q}_{n}})} \sum\nolimits_{j = 1}^{n + 1} {\left| {{{\lambda }_{j}}(x)} \right|} .\) Here \({{\lambda }_{j}}\) are the basic Lagrange polynomials with respect to \(S,\)\({\text{ver}}({{Q}_{n}})\) is the set of vertices of \({{Q}_{n}}\). Let us denote by \({{\theta }_{n}}\) the minimal possible value of \(\left\| P \right\|.\) Earlier the first author proved various relations and estimates for values \(\left\| P \right\|\) and \({{\theta }_{n}}\), in particular, having geometric character. The equivalence \({{\theta }_{n}} \asymp \sqrt n \) takes place. For example, the appropriate according to dimension \(n\) inequalities can be written in the form \(\tfrac{1}{4}\sqrt n \)\( < {{\theta }_{n}}\)\( < 3\sqrt n .\) If the nodes of a projector \(P{\text{*}}\) coincide with vertices of an arbitrary simplex with maximum possible volume, then we have \(\left\| {P{\text{*}}} \right\| \asymp {{\theta }_{n}}.\) When an Hadamard matrix of order \(n + 1\) exists, holds \({{\theta }_{n}} \leqslant \sqrt {n + 1} .\) In the present paper, we give more precise upper bounds of \({{\theta }_{n}}\) for \(21 \leqslant n \leqslant 26\). These estimates were obtained with application of maximum volume simplices in the cube. For constructing such simplices, we utilize maximum determinants containing the elements \( \pm 1.\) Also we systematize and comment the best nowaday upper and low estimates of \({{\theta }_{n}}\) for concrete \(n.\)



Loop-invariant Optimization in the Pifagor Language
Abstract
The paper considers methods of program transformation equivalent to optimizing the cycle invariant, applied to the functional data-flow model implemented in the Pifagor programming language. Optimization of the cycle invariant in imperative programming languages is reduced to a displacement from the cycle of computations that do not depend on variables that are changes in the loop. A feature of the functional data flow parallel programming language Pifagor is the absence of explicitly specified cyclic computations (the loop operator). However, recurring calculations in this language can be specified recursively or by applying specific language constructs (parallel lists). Both mechanisms provide the possibility of parallel execution. In the case of optimizing a recursive function, repeated calculations are carried out into an auxiliary function, the main function performing only the calculation of the invariant. When optimizing the invariant in computations over parallel lists, the calculation of the invariant moves from the function that executes over the list items to the function containing the call. The paper provides a definition of “invariant” applied to the Pifagor language, algorithms for its optimization, and examples of program source codes, their graph representations (the program dependence graph) before and after optimization. The algorithm shown for computations over parallel lists is applicable only to the Pifagor language, because it rests upon specific data structures and the computational model of this language. However, the algorithm for transforming recursive functions may be applied to other programming languages.



Verification of Programs with Mutual Recursion in Pifagor Language
Abstract
In the article, we consider verification of programs with mutual recursion in the data driven functional parallel language Pifagor. In this language the program could be represented as a data flow graph, that has no control connections, and only has data relations. Under these conditions it is possible to simplify the process of formal verification, since there is no need to analyse resource conflicts, which are present in the systems with ordinary architectures. The proof of programs correctness is based on the elimination of mutual recursions by program transformation. The universal method of mutual recursion of an arbitrary number of functions elimination consists in constructing the universal recursive function that simulates all the functions in mutual recursion. A natural number is assigned to each function in mutual recursion. The universal recursive function takes as its argument the number of a function to be simulated and the arguments of this function. In some cases of the indirect recursion it is possible to use a simpler method of program transformation, namely, the merging of the functions code into a single function. To remove mutual recursion of an arbitrary number of functions, it is suggested to construct a graph of all connected functions and transform this graph by removing functions that are not connected with the target function, then by merging functions with indirect recursion and finally by constructing the universal recursive function. It is proved that in the Pifagor language such transformations of functions as code merging and universal recursive function construction do not change the correctness of the initial program. The example of partial correctness proof is given for the program that parses a simple arithmetic expression. We construct the graph of all connected functions and demonstrate two methods of proofs: by means of code merging and by means of the universal recursive function.



An Efficient Algorithm for Finding the Level of Useful Signals on Interpretation of Magnetic and Eddy Current Defectograms
Abstract
To ensure traffic safety of railway transport, non-destructive testing of rails is regularly carried out by using various approaches and methods, including magnetic and eddy current flaw detection methods. An automatic analysis of large data sets (defectgrams) that come from the corresponding equipment is still an actual problem. The analysis means a process of determining the presence of defective sections along with identifying structural elements of railway tracks on defectograms. At the same time, under the conditions of significant volumes of incoming information, fast and efficient algorithms of data analysis are of most interest. This article is an addition to the previous article devoted to the problem of automatic determination of a threshold level of amplitudes of useful signals (from defects and structural elements of a railway track) during the analysis of defectograms (records) of magnetic and eddy current flaw detectors, which contains an algorithm for finding the threshold level of a rail noise and its theoretical justification with examples of its operation on several fragments of real magnetic and eddy current defectograms. The article presents a simple and effective implementation of the algorithm, which is successfully used in practice for the automatic analysis of magnetic and eddy current defectograms.



The Spanning Tree of a Divisible Multiple Graph
Abstract
In this paper, we study undirected multiple graphs of any natural multiplicity \(k > 1\). There are edges of three types: ordinary edges, multiple edges and multi-edges. Each edge of the last two types is a union of \(k\) linked edges, which connect 2 or \(k + 1\) vertices, correspondingly. The linked edges should be used simultaneously. If a vertex is incident to a multiple edge, it can be also incident to other multiple edges, and it can be the common ending vertex to \(k\) linked edges of a multi-edge. If a vertex is the common end of some multi-edge, it cannot be the common end of any other multi-edge. Special attention is paid to the class of divisible multiple graphs. The main peculiarity of them is a possibility to divide the graph into \(k\) parts, which are adjusted on the linked edges and which have no common edges. Each part is an ordinary graph. The definition of a multiple tree is stated and the basic properties of such trees are studied. Unlike ordinary trees, the number of edges in a multiple tree is not fixed. In the article, the estimation of the minimum and maximum number of edges in the divisible tree is stated and proved. Next, the definitions of the spanning tree and the complete spanning tree of a multiple graph are given. The criterion of completeness of the spanning tree is proved for divisible graphs. It is also proved that a complete spanning tree exists in any divisible graph. If the multiple graph is weighted, the minimum spanning tree problem and the minimum complete spanning tree problem can be set. In the article, we suggest a heuristic algorithm for the minimum complete spanning tree problem for a divisible graph.



On Some Approaches to the Solution of the “Useful Proof-of-Work for Blockchains” Task
Abstract
The blockchain technology is based on the “proof-of-work” principles. The essence of this principle is that some event (for example the bill-to-bill money transaction) becomes significant after the confirmation by certain computer work. So, a demand arose for such computational problems to work on, and we will spend for it about the whole blockchain system computing capacity. Now the main class of such problems is a “hash-puzzle” – the problem to find a bit string with a hash that satisfies some conditions. The major hash-puzzle weakness is the lack of the useful application outside of the blockchain technology. In this work, we offer some approaches to the “Useful Proof-of-work for blockchains” task, namely, we consider some practical variants of the NP-complete problems (tasks) that could be solved with the help of SAT-solvers as the proof-of-work computational problems. The use of the FPT-problems requires special study. The approach offered allows to provide the following characteristics of the proof-of-work computational problems: usefulness, problems complexity management (through the dimension change, choosing problems of certain type, the indication of necessary solution precision), mass character. Herewith we admit that not every solved task can be useful but we consider the opportunity to solve some practical tasks with the help of the blockchain technology. Among other things it is also possible to compare the virtual crypto-currency value (through the energy costs spent) and the effective result of the practical problems solution. The most complicated points of the described approach are the realization of the events-tasks (providing the computer work for these events) relations and the realization of the tasks complexity analysis system. This issue should be viewed as a research program because of many technical details that must be worked out further.



Complicated Dynamic Regimes in a Neural Network of Three Oscillators with a Delayed Broadcast Connection
Abstract
A model of neural association of three pulsed neurons with a delayed broadcast connection is considered. It is assumed that the parameters of the problem are chosen near the critical point of stability loss by the homogeneous equilibrium state of the system. Because of the broadcast connection the equation corresponding to one of the oscillators can be detached in the system. Two remaining pulsed neurons interact with each other and, in addition, there is a periodic external action, determined by the broadcast neuron. Under these conditions, the normal form of this system is constructed for the values of parameters close to the critical ones on a stable invariant integral manifold. This normal form is reduced to a four-dimensional system with two variables responsible for the oscillation amplitudes, and the other two are defined as the difference between the phase variables of these oscillators with the phase variable of the broadcast oscillator. The obtained normal form has an invariant manifold on which the amplitude and phase variables of the oscillators coincide. Dynamics of the problem is described on this manifold. An important result was obtained on the basis of numerical analysis of the normal form. It turned out that periodic and chaotic oscillatory solutions can occur when the coupling link between the oscillators is weakened. Moreover, a cascade of bifurcations associated with the same type of phase transformations was discovered, where a self-symmetric stable cycle alternately loses symmetry with the appearance of two symmetrical to each other cycles. A cascade of bifurcations of period doubling occurs with each of these cycles with the appearance of symmetric chaotic regimes. With further decreasing of the coupling parameter, these symmetric chaotic regimes are combined into a self-symmetric one, which is then rebuilt into a self-symmetric cycle of a more complex form compared to the cycle obtained at the previous step. Then the whole process is repeated. Lyapunov exponents were computed to study chaotic attractors of the system.



Equivalence of Conventional and Modified Network of Generalized Neural Elements
Abstract
The article is devoted to the analysis of neural networks consisting of generalized neural elements. The first part of the article proposes a new neural network model – a modified network of generalized neural elements (MGNE-network). This network developes the model of generalized neural element, whose formal description contains some flaws. In the model of the MGNE-network these drawbacks are overcome. A neural network is introduced all at once, without preliminary description of the model of a single neural element and method of such elements interaction. The description of neural network mathematical model is simplified and makes it relatively easy to construct on its basis a simulation model to conduct numerical experiments. The model of the MGNE-network is universal, uniting properties of networks consisting of neurons-oscillators and neurons-detectors. In the second part of the article we prove the equivalence of the dynamics of the two considered neural networks: the network, consisting of classical generalized neural elements, and MGNE-network. We introduce the definition of equivalence in the functioning of the generalized neural element and the MGNE-network consisting of a single element. Then we introduce the definition of the equivalence of the dynamics of the two neural networks in general. It is determined the correlation of different parameters of the two considered neural network models. We discuss the issue of matching the initial conditions of the two considered neural network models. We prove the theorem about the equivalence of the dynamics of the two considered neural networks. This theorem allows us to apply all previously obtained results for the networks, consisting of classical generalized neural elements, to the MGNE-network.


