Official website: icis.mephi.ru/en
Sergey Y. Misyurin
Executive Director
The Strategic Development Plan of the MEPhI’s Institute of Cyber Intelligence Systems (ICIS) (hereafter the Institute) is an internal MEPhI’s document (hereinafter University). It is composed on the basis of 2016 current situation and taking into account the transitional period. In the event of critical changes in the external and internal conditions the indicators can be changed, and the Strategic Plan for the 20162018 can be revised.
The strategic goal of ICIS is to achieve a leadership in Russia and in the world in science and education and innovation in the field of artificial intelligence, applied mathematics, information technology, cybernetics, information and financial security by conducting the advanced research and the commercialization of scientific and practical developments and training on the basis of their highly qualified staff, having all the necessary competences to solve the problems of modern science and technology.

Science:
ICIS  INNOVATIONS 

Development of new software and hardware protection tools and cyberphysical systems, development of unique software, product and technologies development and commercialization, getting international patents, having students engaged in research and innovative activity right from the first year of studies.
Education:
Program track 
Level 

Bachelor's degree programs 01.03.02 Applied mathematics and computer science 09.03.01 Computer science and computer engineering 09.03.04 Software engineering 10.03.01 Information security Specialist's degree programs 09.05.01 Application and operation of specialized automated systems 10.05.04 Information and analytic security systems 10.05.05 IT security in law enforcement sphere 38.05.01 Economic security 
Bachelors/Specialists 
Master's degree programs 01.04.04 Applied mathematics 09.04.01 Computer science and computer engineering 09.04.04 Software engineering 10.04.01 Information security Postgraduate's degree programs 09.06.01 Computer science and computer engineering 10.06.01 Information security 
Masters/Postgraduate students 
Leading scientists:
Golovko V.A.  MEPhI Professor, Hindex=5 
Korotkova M.A.  MEPhI Associate Professor, Hindex=7 
Burtchev M.S.  MEPhI Associate Professor, Hindex=3 
Pavlov M.V.  MEPhI Associate Professor, Hindex=13 
Bogdanov A.G.  MEPhI Associate Professor, Hindex=36 
Korotkov E.V.  MEPhI Professor, Hindex=11 
Nagornov O.V.  MEPhI Department Head, Hindex=6 
Mandzhirov A.V.  MEPhI Professor, Hindex=4 
Kudryashov N.A.  MEPhI Associate Professor, Hindex=24 
We study a new nonlinear partial differential equation of the fifth order for the description of perturbations in the FermiPastaUlam mass chain. This fifthorder equation is an expansion of the Gardner equation for the description of the FermiPastaUlam model. We use the potential of interaction between neighbouring masses with both quadratic and cubic terms. The equation is derived using the continuous limit. Unlike the previous works, we take into account higher order terms in the Taylor series expansions. We investigate the equation using the Painlevé approach. We show that the equation does not pass the Painlevé test and can not be integrated by the inverse scattering transform. We use the logistic function method and the Laurent expansion method to find travelling wave solutions of the fifthorder equation. We use the pseudospectral method for the numerical simulation of wave processes, described by the equation. © 2016 Elsevier B.V.
Threedimensional nonlinear wave interactions have been analytically described. The procedure under interest can be applied to threedimensional quasilinear systems of first order, whose hydrodynamic reductions are homogeneous semiHamiltonian hydrodynamic type systems (i. e. possess diagonal form and infinitely many conservation laws). The interaction of N waves was studied. In particular we prove that they behave like simple waves and they distort after the collision region. The amount of the distortion can be analytically computed.
Elaboration of methods for the control of biochemical reactions with deoxyribonucleic acid (DNA) strands is necessary for the solution of one of the basic problems in the creation of biocomputers  improvement in the reliability of molecular DNA computing. In this paper, the results of the solution of the fourparameter inverse problem of laser Raman spectroscopy  the determination of the type and concentration of each of the DNA nitrogenous bases in multicomponent solutions  are presented. © 2017 Astro Ltd.
Summary. We analyzed several prokaryotic and eukaryotic genomes looking for the periodicity sequences availability and employing a new mathematical method. The method envisaged using the random position weight matrices and dynamic programming. Insertions and deletions were allowed inside periodicities, thus adding a novelty to the results we obtained. A periodicity length, one of the key periodicity features, varied from 2 to 50 nt. Totally over 60,000 periodicity sequences were found in 15 genomes including some chromosomes of the H. sapiens (partial), C. elegans, D. melanogaster, and A.Thaliana genomes. © 2017 Felix E. Frenkel et al.
Liénardtype equations are used for the description of various phenomena in physics and other fields of science. Here we find a new family of the Liénardtype equations which admits a nonstandard autonomous Lagrangian. As a byproduct we obtain autonomous first integrals for each member of this family of equations. We also show that some of the previously known conditions for the existence of a nonstandard Lagrangian for the Liénardtype equations follow from the linearizability of the corresponding equation via nonlocal transformations. © 2016 Elsevier Ltd
The study deals with nonlinear ordinary differential equations defined parametrically by two relations; these arise in fluid dynamics and are a special class of coupled differentialalgebraic equations. We propose a few techniques for reducing such equations, first or second order, to systems of standard ordinary differential equations as well as techniques for the exact integration of these systems. Several examples show how to construct general solutions to some classes of nonlinear equations involving arbitrary functions. We specify a procedure for the numerical solution of the Cauchy problem for parametrically defined differential equations and related differentialalgebraic equations. The proposed techniques are also effective for the numerical integration of problems for implicitly defined equations. (C) 2016 Elsevier Ltd. All rights reserved.
We considered the process of density wave propagation in the logistic equation with diffusion, such as Fisher–Kolmogorov equation, and arguments deviation. Firstly, we studied local properties of solutions corresponding to the considered equation with periodic boundary conditions using asymptotic methods. It was shown that increasing of period makes the spatial structure of stable solutions more complicated. Secondly, we performed numerical analysis. In particular, we considered the problem of propagating density waves interaction in infinite interval. Numerical analysis of the propagating waves interaction process, described by this equation, was performed at the computing cluster of YarSU with the usage of the parallel computing technology—OpenMP. Computations showed that a complex spatially inhomogeneous structure occurring in the interaction of waves can be explained by properties of the corresponding periodic boundary value problem solutions by increasing the spatial variable changes interval. Thus, the complication of the wave structure in this problem is associated with its space extension. © 2017, Pleiades Publishing, Ltd.
Software tools for educational purposes, such as elessons, computerbased testing system, from the point of view of reliability, have a number of features. The main ones among them are the need to ensure a sufficiently high probability of their faultless operation for a specified time, as well as the impossibility of their rapid recovery by the way of replacing it with a similar running program during the classes. The article considers the peculiarities of reliability evaluation of programs in contrast to assessments of hardware reliability. The basic requirements to reliability of software used for carrying out practical and laboratory classes in the form of computerbased training programs are given. The essential requirements applicable to the reliability of software used for conducting the practical and laboratory studies in the form of computerbased teaching programs are also described. The mathematical tool based on Markov chains, which allows to determine the degree of debugging of the training program for use in the educational process by means of applying the graph of the software modules interaction, is presented. © 2017, American Institute of Physics Inc. All rights reserved.
This article discusses the questions associated with the use of reference systems in the preparation of graduates in physical function. The objective of this research is creation of model of recommender system user from the sphere of science and education. The detailed review of current scientific and social network for scientists and the problem of constructing recommender systems in this area. The result of this study is to research user information model systems. The model is presented in two versions: the full one  in the form of a semantic network, and short  in a relational form. The relational model is the projection in the form of semantic network, taking into account the restrictions on the amount of bonds that characterize the number of information items (research results), which interact with the system user. © 2017, American Institute of Physics Inc. All rights reserved.
This article discusses the issues associated with the use of software simulators for the evaluation of competences for certification of qualifications of employees of the nuclear industry. This study was conducted for the expert and methodical center of assessment and certification of qualifications of specialists in the nuclear industry, based on the National nuclear innovation consortium. The goal of this study is to build a model for assessing the sociopersonal competence and its realization in the form of a software simulator. The study was conducted among a large number of senior students MEPhI  future managers, IT professionals, and nuclear physicists. As a result of the survey five classes of students have been allocated differently performing case studies, and for and for different areas of training recommendations on the use of various educational technologies have been made. © 2017, American Institute of Physics Inc. All rights reserved.
The following paper contains the description of uptodate technologies in the area of webservices development, serviceoriented architecture and the Semantic Web. The paper contains the analysis of the most popular and widespread technologies and methods in the semantic web area which are used in the developed educational course. In the paper, we also describe the problem of teaching students to use these technologies and specify conditions for the creation of the learning and development course. We also describe the main exercise for personal work and skills, which all the students learning this course have to gain. Moreover, in the paper we specify the problem with software which students are going to use while learning this course. In order to solve this problem, we introduce the developing system which will be used to support the laboratory works. For this moment this system supports only the fourth work execution, but our following plans contain the expansion of the system in order to support the leftover works. © 2017, American Institute of Physics Inc. All rights reserved.
Recently the scroll machine is widely used in air and refrigeration compressors, vacuum pumps, because it has a small number of moving parts, high efficiency and low level of noise. The volumetric rotary scroll machine is reversible and can function in air motor mode without any significant construction modification. Scroll air motor is a relatively new concept of pneumatic actuators. There is no technical data comparison with traditional air motors which now on the market. In this paper we describe the experimental bench for determining mechanical and flow performance of scroll air motor under different value of inlet pressure, mechanical losses and exergy efficiency. Mathematical model contains geometrical description of the involute scrolls, chamber volumes, radial and tangential leakage areas as a function of orbital angle; thermodynamical pressure and temperature differential equations of compressed air; and equation of mechanical torque balance on motor shaft. The results of experiments and mathematical modeling are presented and analysed. In the last part of the paper the performances of scroll air motor are compared with such performances of traditional radial and axial piston, vane, turbine air motors. © Springer International Publishing Switzerland 2017.
As part of the National Research Nuclear University of National Research Nuclear University MEPhI (MEPhI) at the Department of Computer Systems and Technologies working laboratory "Robotics." University teachers and laboratory staff implement a training program for master's program "Computer technology in robotics." Undergraduates and graduate students conduct laboratory research and development in several promising areas in robotics. One of the methodologies that are actively used in carrying out dissertation research is the modeling of advanced hardware and software systems, robotics. This article presents the results of such a study. The purpose of this article is to simulate a sensor comprised of a group of laser rangefinders. The rangefinders should be simulated according to the following principle. Beams will originate from one point though with a deviation from normal, providing thereby simultaneous scanning of different points. The data obtained in our virtual test room should be used to indicate an average distance from the device to obstacles for all the four sensors in real time. By leveling the divergence angle of the beams we can simulate different kinds of rangefinders (laser and ultrasonic ones). By adjusting noise parameters we can achieve results similar to those of real models (rangefinders), and obtain a surface map displaying irregularities. We should use a model of an aircraft (quadcopter) as a device to install the sensor. In the article we made an overview of works on rangefinder simulation undertaken at institutions around the world and performed tests. The article draws a conclusion about the relevance of the suggested approach, the methods used, necessity and feasibility of further research in this area. © 2017, American Institute of Physics Inc. All rights reserved.
This paper is devoted to a new method of creating semantic maps by means of affix relations. We show the differences between our approach and already existing ones. We also explain the necessity of our research, as it is unique for Russian language and our approach could be used in further researches and for creating semantic cognitive maps for Russian language. In the end of the paper we present the results of our work and further plans of our research. © Springer International Publishing Switzerland 2016.
Abstract: A search is presented for a new, light boson with a mass of about 1 GeV and decaying promptly to jets of collimated electrons and/or muons (leptonjets). The analysis is performed with 20.3 fbsup−1/sup of data collected by the ATLAS detector at the Large Hadron Collider in protonproton collisions at a centreofmass energy of 8 TeV. Events are required to contain at least two leptonjets. This study finds no statistically significant deviation from predictions of the Standard Model and places 95% confidencelevel upper limits on the contribution of new phenomena beyond the SM, incuding SUSYportal and Higgsportal models, on the number of events with leptonjets.[Figure not available: see fulltext.] © 2016, The Author(s).
The article describes a solution of a data analysis problem. Data to be analyzed represent changes in a given set of multidimensional objects with time. We propose to apply the visualization method to solve this problem. A formalization of the method is presented with a mathematical description of each stage of the source data visualization. A developed interactive visualization application program is described. It is based on the models of the theoretical part of the article. We emphasize the efficiency of the visualization method. It allows one to make a judgment on the formation of bunches or clusters of objects formalized in the form of ntuples of real numbers and to find the objects seeking to be in a cluster or a bunch. Additionally, examples of use of the developed program for searching for invariants in changing the source data are provided.
The use of the World Wide Web for information analytical support of scientific research and development encounters such modern world's issues in the scope of IT as Big Data Mining. This paper describes an agentbased technique of data search in the web that were developed at the National Research Nuclear University (NRNU) "Moscow Engineering and Physics Institute (MEPhI)", department of "Analysis of competitive systems" and implemented in the Multiagent information and analytical system (MIAS). The experiments of the agentbased data search techniques and the MIAS have been carried out and the results are shared within this paper. By developing the MIAS, we support international standards for data sharing. Reasoning from this fact, we enable all services and people to bear down the most crucial issues of the 21st century as Big Data.
The Compressed Baryonic Matter (CBM) experimental setup is currently being constructed at the Facility for Antiproton and Ion Research (FAIR) acceleration complex at GSI (Darmstadt, Germany) by an international collaboration that includes a team from JINR. One of the main goals of this experiment is to study the charmonium production in highenergy nuclear collisions. The experiment will operate at extreme interaction rates of up to 10 MHz. The expected dataflow rate will be of the order of 1 TB/s, making it impossible to store all the raw data from detectors in longterm buffers. It will demand the selection of J/ψ → μsup+/supμsup/sup decays in realtime. This paper presents criteria for the fast and effective selection of signal events by using exclusively data on charged muon hits collected in the Muon Chamber (MUCH) coordinate stations and describes the software implementing these criteria. The possibility of this software to solve the problem of the online selection J/ψ → μsup+/supμsup/sup decays is proven. © Owned by the authors.
We consider the problem of density wave propagation in a logistic equation with delay and diffusion (FisherKolmogorov equation with delay). A GinzburgLandau equation was constructed in order to study the qualitative behavior of the solution near the equilibrium state. The numerical analysis of wave propagation shows that for a sufficiently small delay this equation has a solution similar to the solution of a classical FisherKolmogorov equation. The delay increasing leads to existence of the oscillatory component in spatial distribution of solutions. A further increase of delay leads to destruction of the traveling wave. That is expressed in the fact that undamped spatiotemporal fluctuations exist in a neighborhood of the initial perturbation. These fluctuations are close to the solution of the corresponding boundary value problem with periodic boundary conditions. Finally, when the delay is sufficiently large we observe intensive spatiotemporal fluctuations in the whole area of wave propagation.
This article is aimed at revealing of interrelation of current amplitudefrequency spectrum and amplitudes of harmonic components in analyzed signals with subsequent derivation of working equation for detection of amplitudes. With this purpose the article discusses generation of amplitudefrequency spectrum in time, interrelation between harmonic amplitudes and generated spectrum, a variant of working equation for amplitude calculation is proposed with estimation of its error. The interrelation between amplitudes of harmonic components and amplitudefrequency spectrum is obtained provided that the determining contribution to generation of spectrum at preset frequency is made by harmonic components with this frequency.
The results of an experimental study of the effect of acoustic interference and noise on the reaction time of a person are presented. The analytical dependence, allowing the evaluation the impact of objective and subjective factors on the reaction time is proposed. The total power of acoustic noises, acoustic noises character, reverberation time within working place are considered as the objective factors.
The method of estimation of the psychological climate in the team, based on acoustic technology, which allows to determine the level of emotional stress of every employee in the management of industrial negotiations is suggested. The expediency of visualization of interpersonal relations in a group with the help of directed graphs technology is shown. On the basis of the acoustic data results suggested assessment of personal conflict team members. Application of the method will reduce the risk of mancaused accidents and disasters.
Mathematical model for a polycrystalline specimen and EBSD experiment is proposed. As the measurement parameters, the scanning step and the threshold disorientation angle are considered. To study the impact of the measurement parameters Pole Figures and Orientation Distribution Function of model specimen and corresponding ones, calculated from model EBSD measurements, are compared. The real EBSD experiment was also performed. The results of the model experiment are correlated with such detected in the real EBSD data. The most significant results are formulated in the given work. © 2016 The Authors, published by EDP Sciences.
A twodimensional mathematical model of a polycrystalline sample and an experiment on electron backscattering diffraction (EBSD) is considered. The measurement parameters are taken to be the scanning step and threshold grainboundary angle. Discrete pole figures for materials with hexagonal symmetry have been calculated based on the results of the model experiment. Discrete and smoothed (by the kernel method) pole figures of the model sample and the samples in the model experiment are compared using homogeneity criterion χ2, an estimate of the pole figure maximum and its coordinate, a deviation of the pole figures of the model in the experiment from the sample in the space of L1 measurable functions, and the RPcriterion for estimating the pole figure errors. Is is shown that the problem of calculating pole figures is illposed and their determination with respect to measurement parameters is not reliable. © 2016, Pleiades Publishing, Inc.
In recent pattern matching architecture researches, there has been much attention to highthroughput implementations with reconfiguration on the fly on FPGAs as well as ASICs. In this paper, we propose to use selforganizing approach to synthesize twodimensional map (cluster) of a simple processing units with lateral links for fast pattern matching of onedimensional input event. We suggest scalable processor core with heterogeneous cluster architecture. Experimental results show that the proposed architecture has advantages over the previously developed architectures in the terms of operating frequency, time delay and data bandwidth. For stateoftheart FPGA we achieve operating frequency 600500 MHz for the processor core with single cluster (input pattern of 8512 bits, rule set of 64 bits), 490440 MHz for the processor core with multiple clusters (rule set of 128  4096 bits, input pattern of 512 bits). Each cluster is characterized by low pipeline time delay of 3 ∼ 5 clock cycles. © 2016 IEEE.
Brute force techniques used in many fields of authentication process. Ftp servers, web servers and mail servers very often got threatened by attackers. Old technique for mail service brute force still working and it can be easily detected by special signature. Main sources of attacks were detected and separated by countries and time of the day. Bursts of attacks detected depending on weekdays. Copyright © 2016 Institute of Advanced Engineering and Science. All rights reserved.
A new approach about automated test generation presented. Original model gives new opportunities to generate well done educational tests. New software developed that gives ability to generate automatic tests just from books and educational manual. It can be made fast and without professional assistance. © 20062016 Asian Research Publishing Network (ARPN).
The article describes the method of forecasting time series of cash withdrawals in ATMs. The hybrid model is based on two methods: HoltWinters additive method and Markov chainbased model. The combination occurs with the help of weight coefficients which are calculated on the basis of work of each model. HoltWinters method forecasts time series with trend and seasonal variations. Markov chain enables to forecast patterns of basic time series, such as peaks or holes. The composition of these two approaches will allow banks and other financial organizations to predict cash withdrawals more accurately than the methods used separately. © Research India Publications.
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. The authors have proposed and explored the way to counter the leakage of information via covert channels by introducing additional random delays before packets' sending. The main topic of the research is the case when the capacity of the covert channel without error does not exceed the permissible value. In addition, practical recommendations to choose the counteraction parameter values are given. © 2016 IEEE.
In this paper, using the Hojman construction, we give examples of various Poisson brackets which differ from those which are usually analyzed in Hamiltonian mechanics. They possess a nonmaximal rank, and in the general case an invariant measure and Casimir functions can be globally absent for them. © 2016, Institute of Mathematics. All rights reserved.
We consider a mathematical model of equilibrium configurations of plasma, magnetic field, and electric field in a toroidal trap with two ring conductors with current loaded into plasma. We present the mathematical apparatus of the model based on the numerical solution of boundary value problems for the Grad–Shafranov equation (a differential equation of elliptic type for the magnetic flux function), solution methods for these problems, and numerically obtained properties of equilibrium configurations. We indicate the differences in configurations in the toroidal trap and in its analog straightened into a cylinder. © 2016, Pleiades Publishing, Ltd.
The paper deals with the issue of computing the amount of electricity consumed for millions of subscribers of power distribution companies. Problems inherent in existing architectures used in making the computation are considered. A rationale for the use of hybrid CPU+GPU architecture to enhance the performance and currentness of computation as against relational DBMS computing is given. © 2016, Research India Publications.
Prompt photon production in root SNN = 2.76TeV Pb + Pb collisions has been measured by the ATLAS experiment at the Large Hadron Collider using data collected in 2011 with an integrated luminosity of 0.14 nb(1). Inclusive photon yields, scaled by the mean nuclear thickness function, are presented as a function of collision centrality and transverse momentum in two pseudorapidity intervals, vertical bar eta vertical bar 1.37 and 1.52
This paper discusses the efficiency of statistical tests for evaluating of pseudorandom number generators. We present the method to reduce a number of false negatives for pseudorandom sequences testing. We discuss this method applicability for specific tests and provide calculations of confidence intervals based on the tests significance. Also we describe the approach based on the calculation of the number of absences. It reduces the memory requirements for the tests implementation. © 2016 IEEE.
The aim of this study is to develop technologies to be used to design a modern advising system (in the form of a cloud service) for report medical information systems (MIS). Data transmission from MIS to the cloud service is based on the access protocols of the Unified State Healthcare Information System of the Russian Federation. Technologically, this allows to process data from any MIS without the need for additional communication modules. The cloud service was developed as a pilot project. It uses neural network techniques and evolutionary algorithms related to heuristic optimization methods. The service is used to solve classification, forecasting and regression problems based on data obtained from MIS. In the algorithm, genetic algorithm and neural network model are equivalent and are applied simultaneously. Genetic algorithm operators are used for recombination of candidate solutions obtained by means of a neural network model. In the course of this work, a cloud service executing the algorithm presented was developed. This service is used by the MIS of Tyumen Cardiology Center in identifying the factors affecting the level of inflammatory response markerCreactive proteinin patients with stable and unstable angina. © Research India Publications.
The ATLAS experiment at the CERN Large Hadron Collider has performed searches for new, heavy bosons decaying to WW, WZ and ZZ final states in multiple decay channels using 20.3 fbsup1/sup of pp collision data at s=8 TeV. In the current study, the results of these searches are combined to provide a more stringent test of models predicting heavy resonances with couplings to vector bosons. Direct searches for a charged diboson resonance decaying to WZ in the ℓνℓsup'/supℓsup'/sup (ℓ=μ, e), ℓℓqq, ℓνqq and fully hadronic final states are combined and upper limits on the rate of production times branching ratio to the WZ bosons are compared with predictions of an extended gauge model with a heavy Wsup'/sup boson. In addition, direct searches for a neutral diboson resonance decaying to WW and ZZ in the ℓℓqq, ℓνqq, and fully hadronic final states are combined and upper limits on the rate of production times branching ratio to the WW and ZZ bosons are compared with predictions for a heavy, spin2 graviton in an extended RandallSundrum model where the Standard Model fields are allowed to propagate in the bulk of the extra dimension. © 2016 CERN for the benefit of the ATLAS Collaboration.
The strength and tensor structure of the Higgs boson's interactions are investigated using an effective Lagrangian, which introduces additional CPeven and CPodd interactions that lead to changes in the kinematic properties of the Higgs boson and associated jet spectra with respect to the Standard Model. The parameters of the effective Lagrangian are probed using a fit to five differential cross sections previously measured by the ATLAS experiment in the H→γγ decay channel with an integrated luminosity of 20.3 fb1 at √s=8 TeV. In order to perform a simultaneous fit to the five distributions, the statistical correlations between them are determined by reanalysing the H→γγ candidate events in the protonproton collision data. No significant deviations from the Standard Model predictions are observed and limits on the effective Lagrangian parameters are derived. The statistical correlations are made publicly available to allow for future analysis of theories with nonStandard Model interactions. © 2015 CERN for the benefit of the ATLAS Collaboration.
The concept of cybertrust as a crucial aspect of cyber security for public electronic interactions and, in particular, distance learning systems (DLSs), is introduced. This concept is the opposite of such wellknown terms as cyberattacks and/or cyberespionage and it supports cyber security issues by providing legal significance of a public electronic document interchange. The possibility of cybertrust assurance in an eLearning environment (ELE) is shown using two proposed methods of network time synchronization. Copyright © 2016 by SCITEPRESSScience and Technology Publications, Lda. All rights reserved.
The neuronal cultures in vitro plated on the multielectrode arrays is an important object of research in modern neurosciences. The protocol of culture stimulation which allows to receive a required response of culture on a selected electrode in response to stimulation is known. Such stimulation protocol can be considered as the elementary form of learning. In this study we create model of neuronal culture in vitro and obtained primary data on ability of such model to learning through stimulation. © Springer International Publishing Switzerland 2016.
The structural, electronic, phonon, and other characteristics of the normal phases of phosphorus hydrides with stoichiometry PHk are analyzed. The properties of the initial substance, namely, diphosphine are calculated. In contrast to phosphorus hydrides with stoichiometry PH3, a quasitwodimensional phosphorusstabilized lattice of metallic hydrogen can be formed in this substance during hydrostatic compression at a high pressure. The formed structure with H–P–H elements is shown to be locally stable in phonon spectrum, i.e., to be metastable. The properties of diphosphine are compared with the properties of similar structures of sulfur hydrides. © 2016, Pleiades Publishing, Inc.
The method of mathematical modelling was used for the calculation of the structural, electronic, phononic, and other characteristics of various normal phases of phosphorus hydrides with stoichiometry PHk. It was shown that the diphosphine may form 2D lattice of the metallic hydrogen in it, stabilized by phosphorus atoms under high hydrostatic pressure. The resulting structure with the elements of HPH has a locally stable (or metastable) phonon spectrum. The properties of diphosphine were compared with the properties of similar structures such as the sulphur hydrides.
The structural, electron, phonon, and other characteristics of the metallic normal phase of hydrogen at a pressure of 500 GPa are calculated by an ab initio mathematical simulation. It is shown that metallic hydrogen having a lattice with the I41/amd symmetry is a stable phase at a high hydrostatic compression pressure. The resulting structure has the spectrum of phonons stable with respect to the decay. © 2016, Pleiades Publishing, Inc.
Austenitic stainless steel AISI 304, 316 and similar in composition, are used to create many elements of the reactor core, such as fuel cladding of fastneutron reactor. It is known that during the operation, they became subject to such type of radiation damage, as the vacancy swelling and radiation creep. In this paper, was analyzed the effect of alloying elements, impurities and their complexes with radiation defects (RD) on the characteristics of RD and radiationenhanced diffusion (RED) Parameters of vacancy voids nucleation and growth processes were also studied on the example of Cr18Ni10T steel. Evaluation of the temperature dependence of steadystate concentration of RD for materials with different binding energy complexes «defect  impurity», the effective values of mutual recombination rate RD for materials complexes, influence the formation of impurity complexes and volume density of grain boundaries on the rate of growth of vacancy voids and radiation creep was conducted. The possibility of varying the characteristics of the complex defect  impurity and grain boundary size for the suppression of radiation creep and vacancy swelling was studied.
Polynomial dynamical systems describing interacting particles in the plane are studied. A method replacing integration of a polynomial multiparticle dynamical system by finding polynomial solutions of partial differential equations is introduced. The method enables one to integrate a wide class of polynomial multiparticle dynamical systems. The general solutions of certain dynamical systems related to linear secondorder partial differential equations are found. As a byproduct of our results, new families of orthogonal polynomials are derived.
A manipulator with three degrees of freedom similar to a Delta robot has been considered. The mechanism degree of mobility has been analyzed and, in the general case, the mechanism has negative mobility. Structural diagram of the mechanism with three degrees of freedom similar to the original one is constructed for solving the direct and inverse kinematic problems. A method for determining mobility based on the study of coupling equations of the mechanism has been proposed. The method is applied to the considered spatial mechanism, an analogue of a Delta robot. The direct kinematic problem has been solved. © 2016, Allerton Press, Inc.
A 6.8 nbsup1/sup sample of pp collision data collected under lowluminosity conditions at s=7TeV by the ATLAS detector at the Large Hadron Collider is used to study diffractive dijet production. Events containing at least two jets with pT>20GeV are selected and analysed in terms of variables which discriminate between diffractive and nondiffractive processes. Cross sections are measured differentially in δηsupF/sup, the size of the observable forward region of pseudorapidity which is devoid of hadronic activity, and in an estimator, ξ~, of the fractional momentum loss of the proton assuming single diffractive dissociation (pp→pX). Model comparisons indicate a dominant nondiffractive contribution up to moderately large δηsupF/sup and small ξ~, with a diffractive contribution which is significant at the highest δηsupF/sup and the lowest ξ~. The rapiditygap survival probability is estimated from comparisons of the data in this latter region with predictions based on diffractive parton distribution functions. © 2016 CERN for the benefit of the ATLAS Collaboration.
The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by 'Financial monitoring specialist (in the area of antimoney laundering and combating financing of terrorism)' professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and outlines the steps that were carried out to identify and align the disciplines essential for fostering the core capabilities of the standard. © 2016 IEEE.
We propose a, unified approach for querying data, sources which are accessible in form of heterogeneous APIs rather than some standards compliant databases. Different APIs use different query structures and support different capabilities. Typetheoretic approach is used for query structure representation. Because of the fact that not any API will support the full expressibility of the query language we propose techniques for "widening" the query to make it compatible with the given API possibilities. After the query is executed additional filters are applied to the acquired data. In order to achieve this goal a special set of query expansion rules was developed. It consists of the rules that generate special conversion functions which transform more, specific queries into less specific ones. (C) 2016 Published by Elsevier B.V. This is an open access article under the CC BYNND license (http://creativecommons.org/licenses/byncnd/4.0/). Peerreview under responsibility of KES International
The purpose of this paper was to study causal relationships between left and right hippocampal regions (LHIP and RHIP, respectively) within the default mode network (DMN) as represented by its key structures: the medial prefrontal cortex (MPFC), posterior cingulate cortex (PCC), and the inferior parietal cortex of left (LIPC) and right (RIPC) hemispheres. Furthermore, we were interested in testing the stability of the connectivity patterns when adding or deleting regions of interest. The functional magnetic resonance imaging (fMRI) data from a group of 30 healthy righthanded subjects in the resting state were collected and a connectivity analysis was performed. To model the effective connectivity, we used the spectral Dynamic Causal Modeling (DCM). Three DCM analyses were completed. Two of them modeled interaction between five nodes that included four DMN key structures in addition to either LHIP or RHIP. The last DCM analysis modeled interactions between four nodes whereby one of the main DMN structures, PCC, was excluded from the analysis. The results of all DCM analyses indicated a high level of stability in the computational method: those parts of the winning models that included the key DMN structures demonstrated causal relations known from recent research. However, we discovered new results as well. First of all, we found a pronounced asymmetry in LHIP and RHIP connections. LHIP demonstrated a high involvement of DMN activity with preponderant information outflow to all other DMN regions. Causal interactions of LHIP were bidirectional only in the case of LIPC. On the contrary, RHIP was primarily affected by inputs from LIPC, RIPC, and LHIP without influencing these or other DMN key structures. For the first time, an inhibitory link was found from MPFC to LIPC, which may indicate the subjects' effort to maintain a resting state. Functional connectivity data echoed these results, though they also showed links not reflected in the patterns of effective connectivity. We suggest that such lateralized architecture of hippocampal connections may be related to lateralization phenomena in verbal and spatial domains documented in human neurophysiology, neuropsychology, and neurolinguistics.
In the present paper we describe an approach to the dynamical clustering of fMRI resting state networks and their connections, in which we use two known mathematical methods for data analysis: topological data analysis and kmeans method. With these two methods we found about 4 stable states in group analysis. Dynamics of these states is characterized by periods of stability (blocks) with subsequent transition to another state. Topological data analysis method allowed us to find some regularity in subsequent transitions between blocks of states for individuals but it was not shown that the regularity repeats in all subjects. Topological method gives smoother distribution of dynamic states comparing to kmeans method, highlighting about 4 dominant states in percentage, while kmeans method gives 1–2 such states. © Springer International Publishing Switzerland 2016.
Algorithms for the dynamic allocation of RAM (Random Access Memory) to the operating system when multiprogramming have a significant impact on the efficiency of the operating system as a whole. Memory Manager (allocator) of GNU C Library UNIX standard library, which claims universality, is ineffective in some cases. This article describes the allocator algorithm with a list of clear areas, proposed by the authors, which allows achieving a higher efficiency of the RAM usage. The test methodology is proposed for the developed allocators, and the results of the comparison of the proposed allocator with the allocator of the GNU C Library UNIX standard library are provided. © 2005  2016 JATIT & LLS. All rights reserved.
The Default Mode Network (DMN) is a brain system that mediates internal modes of cognitive activity, showing higher neural activation when one is at rest. Nowadays, there is a lot of interest in assessing functional interactions between its key regions, but in the majority of studies only association of Bloodoxygenlevel dependent (BOLD) activation patterns is measured, so it is impossible to identify causal influences. There are some studies of causal interactions (i.e., effective connectivity), however often with inconsistent results. The aim of the current work is to find a stable pattern of connectivity between four DMN key regions: the medial prefrontal cortex (mPFC), the posterior cingulate cortex (PCC), left and right intraparietal cortex (LIPC and RIPC). For this purpose functional magnetic resonance imaging (fMRI) data from 30 healthy subjects (1000 time points from each one) was acquired and spectral dynamic causal modeling (DCM) on a restingstate fMRI data was performed. The endogenous brain fluctuations were explicitly modeled by Discrete Cosine Set at the low frequency band of 0.0078–0.1 Hz. The best model at the group level is the one where connections from both bilateral IPC to mPFC and PCC are significant and symmetrical in strength (p < 0.05). Connections between mPFC and PCC are bidirectional, significant in the group and weaker than connections originating from bilateral IPC. In general, all connections from LIPC/RIPC to other DMN regions are much stronger. One can assume that these regions have a driving role within the DMN. Our results replicate some data from earlier works on effective connectivity within the DMN as well as provide new insights on internal DMN relationships and brain’s functioning at resting state. © 2016 Sharaev, Zavyalova, Ushakov, Kartashov and Velichkovsky.
The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background. © 2016 IEEE.
Big data analytics are very fruitful for solving problems in cybersecurity. We have analyzed modern trends in intelligent security systems research and practice and worked out a syllabus for a new university course in the area of data mining and machine learning with applications to cybersecurity. The course is for undergraduate and graduate students studying the cybersecurity. The main objective of the course is to provide students with fundamental concepts in data mining (in particular, mining frequent patterns, associations and correlations, classification, cluster analysis, outlier detection), machine learning (including neural networks, support vector machines etc.) and related issues, e.g. the basics of multidimensional statistics. Contrary to the traditional data mining and machine learning courses we illustrate course topics by cases from the area of cybersecurity including botnet detection, intrusion detection, deep packet inspection, fraud monitoring, malware detection, phishing detection, active authentication. We note that our course has great potential for development. © 2016 IEEE.
Nowadays information technologies are widespread and used in every computerbased system, hence information security tasks are quite important and their successful solution is required in business process. Cryptographic means are used in different applications, especially in cases when data confidentiality should be provided; although they can be utilized to maintain data availability and integrity, user's anonymity, author's nonrepudiation and so on. Many information security tools use random numbers, but unfortunately, quality of output random numbers and speed of their generation do not satisfy modern requirements. The rate of productionrun random number generators is limited by the physical processes used. One of the reasons of low random numbers generating rate is application of binary events. Many generators use analog events, e.g. noise in electronic devices, converted to binary numbers utilizing the threshold value or quantum discrete events, e.g. photon passing through the polarizer. The main idea of this work is that one can increase random number generator's rate using the nonbinary sequences, e.g. nonbinary quantum processes. © 2016 IEEE.
Almost all modern computer networks are based on TCP/IP protocol suite. However, structure features of IP allow constructing covert channels with high capacity using modification of interpackets delays, packets’ header fields and packets lengths. A technique to eliminate such channels is traffic normalization which means sending packets with equal lengths and fixed header fields with equal interpackets delays that leads to significant decreasing of efficient communication channels capacity and missing of functional capabilities of network protocols. Another way to counteract covert channel is to detect an active channel. Nevertheless, an attacker can reduce the covert channel capacity purposely to make it undetectable. We investigate on/off covert channel and give recommendations to choose the parameters of εsimilarity detection method with specified threshold values of covert channels capacity. © Springer Science+Business Media Singapore 2016.
This Letter presents evidence for single topquark production in the schannel using protonproton collisions at a centreofmass energy of 8 TeV with the ATLAS detector at the CERN Large Hadron Collider. The analysis is performed on events containing one isolated electron or muon, large missing transverse momentum and exactly two btagged jets in the final state. The analysed data set corresponds to an integrated luminosity of 20.3 fbsup1/sup. The signal is extracted using a maximumlikelihood fit of a discriminant which is based on the matrix element method and optimized in order to separate singletopquark schannel events from the main background contributions, which are topquark pair production and W boson production in association with heavyflavour jets. The measurement leads to an observed signal significance of 3.2 standard deviations and a measured crosssection of σs=4.8±0.8(stat.)1.3+1.6(syst.) pb, which is consistent with the Standard Model expectation. The expected significance for the analysis is 3.9 standard deviations. © 2016 CERN for the benefit of the ATLAS Collaboration.
This article discusses the calculation of the capture efficiency of solar radiation flat solar collector. Balance equations formulated for the individual nodes and elements of the heat reflector flat, as well as the coolant flowing through the heat sink channels. On the surface of the transparent insulation the heatfall: the flow of direct sunlight, the flow of sunlight reflected from the mirrors and the flux of scattered (diffuse) radiation from the sky, from the surrounding objects, which are absorbed by the individual layers of the heating surface. In solving the energy balance equation in the steady state surface density of captured radiation is equal to the surface density of the heat flow withdrawn from the receiver element of the working medium (coolant), or the average temperature of the latter does not differ from the ambient temperature. Collection efficiency of radiation receiver an exponential pattern. The calculation, which allowed to determine the functional dependence of the capture of the time, solar radiation and thermal parameters of the receiver. © 2016, Research India Publications.
The logistic equation with delay feedback circuit and with periodic perturbation parameters is considered. Parameters of the problem (coefficient of linear growth and delay) are chosen close to the critical values at which cycle is bifurcated from equilibrium point. We assume that these values have doublefrequency relation to the time and the frequency of action and doubled frequency of the natural vibration are close. Asymptotic analysis is performed under these assumptions and leads to a twodimensional system of ordinary differential equations. Linear part of this system is periodic. If the parameter that defines frequency detuning of an external action is large or small we can apply standard asymptotic methods to the resulting system. Otherwise numerical analysis is performed. Using results of numerical analysis, we clarify the main scenarios of phase transformations and find the region of chaotic oscillations. It is main conclusion that in the case of parametric resonance the dynamics of the problem with doublefrequency perturbation is more complicated than dynamics of the problem with singlefrequency perturbation. © 2016, Education and Upbringing Publishing. All rights reserved.
The paper compares the use of neural network and neurofuzzy approaches in diagnosis of endogenous intoxication syndrome. The comparison was carried out on real patient data. Data preprocessing, neural network design and experiments are reported. A fuzzy neural network and results of experiments with it are presented. The advantages of fuzzy neural network are shown. © Research India Publications.
Finitedifference timedomain method for numerical solution of Maxwell equations has been applied to the problems of propagation and interaction of ultrashort light pulses in the media with linear dispersion and kerrlike nonlinearity. The evolution of temporal and spectral structures of femtosecond laser pulses has been analyzed in the modes of selfand crossphase modulation, formation of shock waves, and solitonlike temporal pulses. Interaction of two ultrashort laser pulses in nonlinear media has been studied for the case of collinear propagation. The peculiarities of transformation of spatialtemporal structure of probe pulse have been analyzed numerically in the regime of its reflection from the pump pulse. © 2016 Education and Upbringing Publishing.
Relevance of the study chosen subject is caused by that in modern time the productive solution of the questions connected with the personnel management, selection, training has a great value in the development and formation of the organizations, enterprises, and innovative associations. Now marked the change method, type, technology, transition phase, due to the acceleration of the social systems development, the emergence of new social relationships, relationships. Thus, it is considered to be the most essential phenomenon of the present stage of the society development of the ownership forms change with means of production, orientation of reforms with the market methods of managing and management, newest to the Russian Federation. In such circumstances, especially important is the organization and development question of the new social subject  the innovation cluster country, region, sector, which is assigned a significant role in developing and mastering the socioeconomic area market. On the one hand, innovative cluster acts as a social group, goals and values that involve adaptation to the socioeconomic situation, on the other  as a social system uniting groups, business organizations, impact on the environment by improving the socioeconomic situation of the economic market. However, along with it there are social and administrative problems as contradictions between data on needs for productive practical actions for human resource management of a cluster and ignorance of implementation mechanisms of these actions. © 2016, Econjournals. All rights reserved.
This paper reports a detailed study of techniques for identifying boosted, hadronically decaying W bosons using 20.3 fb (Formula presented.) of proton–proton collision data collected by the ATLAS detector at the LHC at a centreofmass energy (Formula presented.). A range of techniques for optimising the signal jet mass resolution are combined with various jet substructure variables. The results of these studies in Monte Carlo simulations show that a simple pairwise combination of groomed jet mass and one substructure variable can provide a 50 % efficiency for identifying W bosons with transverse momenta larger than 200 GeV while maintaining multijet background efficiencies of 2–4 % for jets with the same transverse momentum. These signal and background efficiencies are confirmed in data for a selection of tagging techniques. © 2016, CERN for the benefit of the ATLAS collaboration.
The object of research is a distributed database management system Apache Cassandra and methods to improve its functionality by applying hybrid computing technologies. The encryption standard GOST 2814789, which has a great potential for parallelization on the graphics core and can be used as the expansion module. Development was carried out in the Java language using the open source project Apache Cassandra and JCuda parallelization library for GPGPU systems. The article contains analysis of the Apache Cassandra architectural features and review of possibilities for connecting the expansion modules. The article presents a mathematical model of the proposed solution and experimental results (graphs of recording data rate to the base: in the standard mode, with using CPU encryption, with using GPU encryption). © 2016 IEEE.
Development of the integrated expert systems with the problemoriented methodology and the problems of the intellectualization of ATTECHNOLOGY workbench are reviewed. Intelligent technology for integrated expert systems construction is described, in particular for dynamic integrated expert systems construction. Intelligent planning methods applied for integrated expert systems development plan generation are described with usage of the intelligent planner, reusable components, typical design procedures, and other intelligent program environment components. Discussed technology was used for building tutoring IES prototypes for different courses/disciplines and two industrial dynamic IES prototypes: “Management of medical forces and resources for major traffic accidents” and “Resource management for satellite communications system between regional centers”. © Springer International Publishing Switzerland 2016.
We study the temperaturedependent quantum correction to conductivity due to the interplay of spin density fluctuations and weak disorder for a twodimensional metal near an antiferromagnetic (AFM) quantum critical point. AFM spin density fluctuations carry large momenta around the ordering vector Q and, at lowest order of the spinfermion coupling, only scatter electrons between "hot spots" of the Fermi surface which are connected by Q. Earlier, it was seen that the quantum interference between AFM spin density fluctuations and soft diffusive modes of the disordered metal is suppressed, a consequence of the largemomentum scattering. The suppression of this interference results in a nonsingular temperature dependence of the corresponding interaction correction to conductivity. However, at higher order of the spinfermion coupling, electrons on the entire Fermi surface can be scattered successively by two spin density fluctuations and, in total, suffer a small momentum transfer. This higherorder process can be described by composite modes which carry small momenta. We show that the interference between formally subleading composite modes and diffusive modes generates singular interaction corrections which ultimately dominate over the nonsingular firstorder correction at low temperatures. We derive an effective lowenergy theory from the spinfermion model which includes the abovementioned higherorder process implicitly and show that for weak spinfermion coupling the smallmomentum transfer is mediated by a composite propagator. Employing the conventional diagrammatic approach to impurity scattering, we find the correction δσ +ln2T for temperatures above an exponentially small crossover scale. ©2016 American Physical Society.
The main issue of this work is to search of suspicious operations that were made with the use of cryptocurrency. The set tasks: creation of a database from received information; visualization of received results; analysis and conclusions of received results. The object of the research is money laundering and financing terrorism by means of cryptocurrency. Nowadays it is an actual term for research as for countries cryptocurrency is a new way of payments and each country decides differently how to deal with it. But new technologies provide us new possibilities in our live (especially in anonymous transactions as payments for goods and other purposes) and of course they can be used in illegal activity such as money laundering and financing of terrorism. Besides anonymity is one of the main features of cryptocurrency that helps to hide the source of income. This is the problem for countries because they have to combat such a threat as money laundering and financing of terrorism. So it is natural to find out ways of searching suspicious operations that can be directed to money laundering and financing of terrorism. © 2005  2015 JATIT & LLS. All rights reserved.
The article covers the experience of using, processing and visualization Assessment center (AC) methodology results and evaluation of candidates' potential and abilities for key position staff reserve. Program system Reserve provides users amount of data and charts including: candidates' personal information; the result evaluation based on AC methodology; results of psychophysiological tests.
The article is devoted to the issues of testing software and hardware data security tools (DST) used in modern information systems (IS) to ensure the required level of security of the data being processed therein. The author substantiates the need of improving the existing approaches to testing of hardware and software DST due to the growing popularity of IS and reduction of time spent for their creation. The article considers the applicability of software testing methods to software and hardware DST, identifies features of software and hardware DST depending on the principles of their operation, which prevent from using the existing testing methods in their original form. A mathematical model for software and hardware DST has been developed, and the criteria of applicability of software testing methods to such DST have been formed. On the basis of the above criteria, the requirements for automation of the testing process have been established. As illustrated by one of the types of software and hardware DST, the author proves the fact that testing automation requires additional hardware equipment. The article describes the purpose, the structure and the principle of operation of a developed testing tool – a USB switcher used for automated testing of portable software and hardware DST operating in an OS of a computer and having a USB connection interface. The criteria proposed in the article allow to determine applicability of one or another testing method to a certain software and hardware DST, and the developed USB switcher allows to automate testing of most of the software and hardware DST having a USB connection interface. © Research India Publications.
The local dynamics of systems of difference and singularly perturbed differentialdifference equations is studied in the neighborhood of a zero equilibrium state. Critical cases in the problem of stability of its state of equilibrium have infinite dimension. Special nonlinear evolution equations, which act as normal forms, are set up. It is shown that their dynamics defines the behavior of solutions to the initial system. © 2016 Elsevier B.V.
We consider the scalar complex equation with spatially distributed control. Its dynamical properties are studied by asymptotic methods when the control coefficient is either sufficiently large or sufficiently small and the function of distribution is either almost symmetric or significantly nonsymmetric relative to zero. In all cases we reduce original equation to quasinormal for  the family of special parabolic equations, which do not contain big and small parameters, which nonlocal dynamics determines the behaviour of solutions of the original equation. (C) 2015 Elsevier B.V. All rights reserved.
We study the logistic equation with two delays. When studying its nonlocal dynamics, we obtain a condition for the existence and the asymptotics of a relaxation cycle. When studying the local dynamics, we show that the behavior of solutions of the original equation is determined by the structure of solutions of special families of nonlinear boundary value problems of parabolic and degenerateparabolic type.
The local dynamics of the KdVBurgers equation with periodic boundary conditions is studied. A special nonlinear partial differential equation is derived that plays the role of a normal form, i.e., in the first approximation, it determines the behavior of all solutions of the original boundary value problem with initial conditions from a sufficiently small neighborhood of equilibrium.
Use of scientific recommender systems allows to facilitate process of scientific search considerably. Therefore, this direction attracts more and more researchers in recent years. The basic principles of operation of recommendatory systems in general are formulated for the sphere of electronic commerce in which the concept of personalization of information sentence was for the first time read. However, in the field of the recommendation of the scientific content actual for the user there is a set of the directions of further enhancement of algorithms, methods and technologies. This paper is devoted to development of approach to creation of recommendations on the basis of results of classification of content interesting the user. Classical method of collaborative filtering is most often inapplicable in scientific systems because of absence of the user estimates. Therefore, to describe content results of text analysis on the basis of the structure of classes of articles and the accompanying ontology of terms developed by authors were used. For the solution of the task of classification by authors the ensemble of algorithms with the original voter circuit is offered. As data for carrying out experiment data on scientific publications of two largest Russian public resources are used. Optimum parameters of algorithms for the offered diagram of ensemble are determined by the received results. This study was financially supported according to Federal Target Program "Research and development on priority directions of scientifictechnological complex of Russia for 20142020" (grant No RFMEFI57614X0068). © Research India Publications.
A computational model for refining of data domains which are selected out in the property recognition over the Big Data sources is developed and considered. Data sources can originate both from natural and/or human activities. Thus discovered in a problem domain data objects  the individuals,  are considered as processes in a mathematical sense depending on parameters. The proposed parametrization is based on twodimensional model using crossreferencing over assignments/crowdsoucers and recognizable properties/domains and is aimed to support the iteration procedure. This gives rise to the computational model based on the variable domains assumption. Such a vision is able to take into account the interaction of crowdsourcers and properties when they are varying with the evolving the events. The property recognition stagebystage model enables the fine tuning of the target data domains and has the representable functor. This model as may be shown is faithfully embedded into a category of indexed sets. The proposed (, g)tuning of the data domains leads to a neighborhood structure for cognition activity and gives a flexible computing model. © 2016 IEEE.
This paper deals with the object detection, recognition and categorization taking into account its ability to convert into some other object. This is possible when the object variance includes an individual ability to change one or more of its properties within some fixed computational framework. The potentially convertible individuals are gathered into the variable domains, in turn. The variance of domains is also considered within a fixed computational model. The construction of a computational model suitable to capture the semantics of variable individuals is proposed as a special 'conceptual stand'. This leads to a primitive frame to detect the individual migration from domain to domain. The detection of such a convertible individual gives rise to the task of 'mining' the disguised individuals with changed properties. The convertible individuals are modeled by the elements of variable domains. The supporting computational model is based on a separation of individuals into actual, possible and virtual ones. The convertible individual in a model can be recognized by its decomposing into its dimensional counterparts. As was shown, this leads to an adoption of the stagebystage cognition model with a pair of evolvents to capture dynamics of the domains  the 2dimensions model. The first evolvent reflects the generation of the individuals in a domain, the beginning of and canceling out their existence in a domain. The second evolvent reflects the shifts in properties of the individuals. As awaited this unified data model will have the applications to a wide range of models in computer science and Information Technologies. © 2016 IEEE.
The feasibility of implanting ions into dust particles by means of highvoltage charging under conditions of a beamplasma discharge (BPD) is discussed. It is proposed that additional pulsed charging in the BPD autooscillating mode, and magnetic and temporal compression of the highenergy electron beam, be used to increase the potential of dust particle surfaces. © 2016, Allerton Press, Inc.
Estimation of the worstcase execution time (WCET) of programs is an important problem for the development of realtime systems. In particular, the estimation of the WCET is a goal in the verification of aeronautical software specified in DO178B/C. This is a difficult problem, and its exact solution is often practically impossible. This problem has been studied for many years; as a result, a lot of techniques for various cases have been developed. A survey of the available techniques for estimating the WCET is presented, which can be useful for choosing methods for solving particular problems. © 2016, Pleiades Publishing, Ltd.
Background: The numerical decision systems of the nonlinear equations for a preset network, traffic and conditions of functioning allows to implement determination of a probabilitytime characteristics of a network, carry out a rating of used algorithms of routing, methods of streams control. Analysis: This paper is devoted to the problems of investigation of routing processes in large distribution systems. Findings: The identification of parameters of model of the routing process close to best values is possible during a repetitive process of search of the solution of a system of nonlinear equations. Conclusion: Multiparameter routing process based on Markov's model can be successfully used while routing traffic within big networks.
The problem of the preselection of parameters of a power unit of a mechatronic complex on the basis of the condition for providing a required control energy has been discussed. The design of the unit is based on analysis of its dynamics under the effect of a specialtype test conditional control signal. The specific features of the approach used are a reasonably simplified normalized dynamic model of the unit and the formation of basic similarity criteria. Methods of designing a power unit with a hydraulic piston actuator that operates in pointtopoint and oscillatory modes have been considered. © 2016, Pleiades Publishing, Ltd.
Over the last decade, the deep neural networks are a hot topic in machine learning. It is breakthrough technology in processing images, video, speech, text and audio. Deep neural network permits us to overcome some limitations of a shallow neural network due to its deep architecture. In this paper we investigate the nature of unsupervised learning in restricted Boltzmann machine. We have proved that maximization of the loglikelihood input data distribution of restricted Boltzmann machine is equivalent to minimizing the crossentropy and to special case of minimizing the mean squared error. Thus the nature of unsupervised learning is invariant to different training criteria. As a result we propose a new technique called “REBA” for the unsupervised training of deep neural networks. In contrast to Hinton’s conventional approach to the learning of restricted Boltzmann machine, which is based on linear nature of training rule, the proposed technique is founded on nonlinear training rule. We have shown that the classical equations for RBM learning are a special case of the proposed technique. As a result the proposed approach is more universal in contrast to the traditional energybased model. We demonstrate the performance of the REBA technique using wellknown benchmark problem. The main contribution of this paper is a novel view and new understanding of an unsupervised learning in deep neural networks. © 2016, Allerton Press, Inc.
The generalization of the SwiftHohenberg equation is studied. It is shown that the equation does not pass the Kovalevskaya test and does not possess the Painlevé property. Exact solutions of the generalized SwiftHohenberg equation which are very useful to test numerical algorithms for various boundary value problems are obtained. The numerical algorithm which is based on the CrankNicolsonAdamsBashforth scheme is developed. This algorithm is tested using the exact solutions. The selforganization processes described by the generalization of the SwiftHohenberg equation are studied. © 2016 Elsevier Inc. All rights reserved.
The Rayleigh equation for the description of spherical gasfilled bubbles dynamics is considered. It is shown that this equation can be transformed into an equation for the elliptic function for arbitrary values of the polytropic exponent. General analytical solutions of the Rayleigh equation are studied for some particular cases, such as the isothermal case. © 2016 Author(s).
The problem of long wave propagation on the shallow water under ice sheet is studied. The ninthorder evolutional equation for water level perturbation is presented. Some exact solution are found. It is shown that three types of solution are exist. © 2016 Author(s).
We consider generalizations of the Kortewegde Vries equation of the fifth and seventh order obtained from the FermiPastaUlam problem. Analytical properties of the equation are investigated taking into account the Painlevé test. It is shown that the equations of the fifth and seventh order do not have the Painlevé property. We demonstrate that there are expansions of the solution in the Laurent series and as a consequence we can find exact solutions of the equations. Solitary wave and elliptic solutions of the fifth and seventh order equations are presented. © 2016 Polish Scientific Publishers.
Numerical computation of the three dimensional problem of the freezing interface propagation during the cryosurgery coupled with the multiobjective optimization methods is used in order to improve the efficiency and safety of the cryosurgery operations performing. Prostate cancer treatment and cutaneous cryosurgery are considered. The heat transfer in soft tissue during the thermal exposure to low temperature is described by the Pennes bioheat model and is coupled with an enthalpy method for blurred phase change computations. The finite volume method combined with the control volume approximation of the heat fluxes is applied for the cryosurgery numerical modeling on the tumor tissue of a quite arbitrary shape. The flux relaxation approach is used for the stability improvement of the explicit finite difference schemes. The method of the additional heating elements mounting is studied as an approach to control the cellular necrosis front propagation. Whereas the undestucted tumor tissue and destucted healthy tissue volumes are considered as objective functions, the locations of additional heating elements in cutaneous cryosurgery and cryotips in prostate cancer cryotreatment are considered as objective variables in multiobjective problem. The quasigradient method is proposed for the searching of the Pareto front segments as the multiobjective optimization problem solutions. © 2016 Author(s).
In this paper, we consider the problem of planning and optimizing the destruction of the tumor tissue during cutaneous cryosurgery. A method of mounting additional heating elements is proposed as an approach to control propagation of the front of cellular necrosis. Mathematical simulation and Pareto optimality of calculable functions are used to improve the effectiveness of the proposed method. An explicit scheme that is based on the finite volume approximation of the Pennes bioheat transfer model is applied, together with an enthalpy method for computing blurred phase transitions. A flux relaxation method is used to improve the stability of the scheme. © 2016, Pleiades Publishing, Ltd.
Extended Boussinesq equation for the description of the FermiPastaUlam problem is studied. It is analysed with the Painlevé test. It is shown, that the equation does not pass the Painlevé test, although necessary conditions for existence of the meromorphic solution are carried out. Method of the logistic function is introduced for Solitary wave solutions of the considered equation. Elliptic solutions for studied equation are constructed and discussed. © 2016 Author(s).
The generalized modified Kortewegde Vries equation of the fifth order with dissipation is considered. The Painlevé test is applied for studying integrability of this equation. It is shown that the generalized modified Kortewegde Vries equation of the fifth order does not pass the Painlevé test in the general case but has the expansion of the solution in the Laurent series. As a consequence the equation can have some exact solutions at additional conditions on the parameters of the equation. We present the effective modification of methods for finding of solitary wave and elliptic solutions of nonlinear differential equations. Solitary wave and elliptic solutions of the generalized modified Kortewegde Vries equation of the fifth order are found by means of expansion for solution in the Laurent series. These solutions can be used for description of nonlinear waves in the medium with dissipation, dispersion. © 2016 Elsevier Inc. All rights reserved.
The Liénard equation is of a high importance from both mathematical and physical points of view. However a question about integrability of this equation has not been completely answered yet. Here we provide a new criterion for integrability of the Liénard equation using an approach based on nonlocal transformations. We also obtain some of the previously known criteria for integrability of the Liénard equation as a straightforward consequence of our approach's application. We illustrate our results by several new examples of integrable Liénard equations. © 2016 Elsevier Ltd. All rights reserved.
The modified Kortewegde Vries equation with polynomial source is considered. Using the Painleve test we show that the generalized Kortewegde Vries equation is not integrable by the inverse scattering transform. However there are some expansions of solution in the Laurent series and some exact solutions can exist. Some traveling wave solutions of the modified Kortewegde Vries equation with polynomial source are found. © 2015 Elsevier Inc. All rights reserved.
The theory of the normal properties of a metal generalized to the case of particular properties of an electron band with a finite width for electron–phonon systems with a varying electron density of states has been used to study the normal state of the SH3 phase of hydrogen sulfide at a pressure of 225 GPa and a temperature of 200 K. The frequency dependences of the real, ReΣ(ω), and imaginary, ImΣ(ω), parts of the selfenergy part of the Green’s function of the electron Σ(ω), as well as the electron density of states N(ε) of the Im–3m stable orthorhombic structure of SH3 hydrogen sulfide at a pressure of P = 225 GPa, which is renormalized by the strong electron–phonon coupling, have been calculated. It has been established that a part of the electron conduction band of the SH3 phase of hydrogen sulfide adjacent to the Fermi level undergoes renormalizationinduced reconstruction in the form of a number of energy pockets with the widths equal to fractions of the characteristic phonon energies of the system. © 2016, Pleiades Publishing, Inc.
We study a family of Li,nardtype equations. Such equations are used for the description of various processes in physics, mechanics and biology and also appear as travelingwave reductions of some nonlinear partial differential equations. In this work we find new conditions for the integrability of this family of equations. To this end we use an approach which is based on the application of nonlocal transformations. By studying connections between this family of Li,nardtype equations and type III Painlev,Gambier equations, we obtain four new integrability criteria. We illustrate our results by providing examples of some integrable Li,nardtype equations. We also discuss relationships between linearizability via nonlocal transformations of this family of Li,nardtype equations and other integrability conditions for this family of equations.
The problem of searching for the optimal strategy has been researched in the paper. The main aim of this paper is to present a strategies and new Lemma for strategies. The special curriculum has been developed for the set competences. The curriculum contains the main basic and specialized disciplines. Strategies comprise effectiveness indicators. A new Lemma related to effective strategies and the two disciplines was proved. All these strategies are compared to each other. As a result, the optimal strategy for the given competence was found. © 2016 IEEE.
The effective factographic information retrieval problem has been investigated in the paper. The primary objective of this paper is to outline factographic information retrieval and new Lemma related to properties of factographic information retrieval. The special curriculum has been developed for the set competences. The curriculum contains specialized disciplines. These disciplines use factographic information retrieval. Factographic information retrieval has effectiveness indicators. New Lemma about effectiveness and properties of factographic information retrieval was proved. © 2016 IEEE.
The article summarizes the major premises and goals for building a modern software system, which will support student learning and academic performance rating processes. It covers the testing quality evaluation system and describes how the data is loaded into the Learning Management System using the SCORM standard. The article includes such issues as authorization and audit for the Learning Management Systems. In particular, it describes an approach based on the role access policy. The article also demonstrates the videoconferencing module that enables to hold webinars using audio and video communication. © Research India Publications.
Coulomb drag is a transport phenomenon whereby longrange Coulomb interaction between charge carriers in two closely spaced but electrically isolated conductors induces a voltage (or, in a closed circuit, a current) in one of the conductors when an electrical current is passed through the other. The magnitude of the effect depends on the exact nature of the charge carriers and the microscopic, manybody structure of the electronic systems in the two conductors. Drag measurements have become part of the standard toolbox in condensed matter physics that can be used to study fundamental properties of diverse physical systems including semiconductor heterostructures, graphene, quantum wires, quantum dots, and optical cavities.
We report a nonsaturating linear magnetoresistance in chargecompensated bilayer graphene in a temperature range from 1.5 to 150 K. The observed linear magnetoresistance disappears away from charge neutrality, ruling out the traditional explanation of the effect in terms of the classical random resistor network model. We show that experimental results qualitatively agree with a phenomenological twofluid model taking into account electronhole recombination and finitesize sample geometry. © 2016 American Physical Society.
Major problems occurring upon designing of computing tools in residue number systems (RNS) include number conversion from positional number systems into RNS and reverse. A possible approach to solution of these problems is selection of RNS base values. This work proposes series of RNS base values in the respective forms of 2k,2k  λ,2k + λ. With these base values upon number conversion mathematical operations in positional number systems are excluded, and favorable conditions are established for spreadsheet computing. This reduces time consumptions, simplifies designing of computing tools and creates positive backgrounds for further researches, hence, creation of computing tools of higher rate operating in RNS. © 2005  2016 JATIT & LLS. All rights reserved.
The paper deals with the humanitarian issues of cybersecurity, related to the ethical issues of IT development and the formation of an information society's culture. The experience of relevant educational courses' teaching in domestic and foreign institutions of higher education is used. © 2016 IEEE.
Marketing management in the process of implementing is the organization and management system of production and sale’s activity of the enterprises, market research for the purpose of formation and satisfaction of demand for production and services and make profit. As a function of management, marketing is no less important than any activity associated with the finance, manufacturing, research, logistics and others. As the management concept (business philosophy) marketing requires the “to vote” for the necessary to them product by the money. This determines the company success and optimally satisfies the customer’s needs. Since marketing is the way to convince the masses to purchase, the majority erroneously identified this concept with sales and promotion. The difference lies in the following: Sales mainly involves facetoface contactthe seller has to deal with potential the buyers. Marketing uses the media and other ways to capture the attention and convince many peoplepeople who may not have any direct contact with any of the companies of the marketer by creating demand. One of the leading theorists on management problems, Peter Drucker, says it this way: The marketing purpose is to make efforts on unnecessary sales. Its purpose is so good to know and understand the customer that the product or service will exactly fit the last and sell themselves. © 2016, Econjournals. All rights reserved.
A mathematical model of the thermal processes of selfpropagating hightemperature synthesis in the formation of wearresistant coatings by pulse plasma processing of a composite plaster of a charge containing SHS reagents has been developed. The boundaryvalue problem is solved by a finite volume method in a twodimensional formulation using iterative processes. It is shown that the character of SHS depends substantially on the plasma jet power, processing distance, warming of the substrate, and on the internal energy of agglomerates (microcomposites) after mechanical activation of the initial charge. Optimal modes of forming Ni/NiCr + TiC composite coatings have been determined with the aid of computational experiments. © 2016 by Begell House, Inc.
The momentumweighted sum of the charges of tracks associated to a jet is sensitive to the charge of the initiating quark or gluon. This paper presents a measurement of the distribution of momentumweighted sums, called jet charge, in dijet events using 20.3 fb(1) of data recorded with the ATLAS detector at root s = 8 TeV in pp collisions at the LHC. The jet charge distribution is unfolded to remove distortions from detector effects and the resulting particlelevel distribution is compared with several models. The p(T) dependence of the jet charge distribution average and standard deviation are compared to predictions obtained with several leadingorder and nexttoleadingorder parton distribution functions. The data are also compared to different Monte Carlo simulations of QCD dijet production using various settings of the free parameters within these models. The chosen value of the strong coupling constant used to calculate gluon radiation is found to have a significant impact on the predicted jet charge. There is evidence for a pT dependence of the jet charge distribution for a given jet flavor. In agreement with perturbative QCD predictions, the data show that the average jet charge of quarkinitiated jets decreases in magnitude as the energy of the jet increases.
In the pp→tt process the angular distributions of top and antitop quarks are expected to present a subtle difference, which could be enhanced by processes not included in the Standard Model. This Letter presents a measurement of the charge asymmetry in events where the topquark pair is produced with a large invariant mass. The analysis is performed on 20.3 fbsup1/sup of pp collision data at √s=8TeV collected by the ATLAS experiment at the LHC, using reconstruction techniques specifically designed for the decay topology of highly boosted top quarks. The charge asymmetry in a fiducial region with large invariant mass of the topquark pair (mtt>0.75 TeV) and an absolute rapidity difference of the top and antitop quark candidates within 2<ytyt<2 is measured to be 4.2±3.2%, in agreement with the Standard Model prediction at nexttoleading order. A differential measurement in three tt mass bins is also presented. © 2016 CERN for the benefit of the ATLAS Collaboration.
This paper reports inclusive and differential measurements of the t (t) over bar charge asymmetry A(C) in 20.3 fb(1) of root s = 8 TeV pp collisions recorded by the ATLAS experiment at the Large Hadron Collider at CERN. Three differential measurements are performed as a function of the invariant mass, transverse momentum and longitudinal boost of the t (t) over bar system. The t (t) over bar pairs are selected in the singlelepton channels (e or mu) with at least four jets, and a likelihood fit is used to reconstruct the t (t) over bar event kinematics. A Bayesian unfolding procedure is performed to infer the asymmetry at parton level from the observed data distribution. The inclusive t (t) over bar charge asymmetry is measured to be A(C) = 0.009 +/ 0.005 (stat. + syst.). The inclusive and differential measurements are compatible with the values predicted by the Standard Model.
A measurement of the correlations between the polar angles of leptons from the decay of pairproduced t and (t) over bar quarks in the helicity basis is reported, using protonproton collision data collected by the ATLAS detector at the LHC. The dataset corresponds to an integrated luminosity of 4.6 fb(1) at a centerofmass energy of root s = 7 TeV collected during 2011. Candidate events are selected in the dilepton topology with large missing transverse momentum and at least two jets. The angles theta(1) and theta(2) between the charged leptons and the direction of motion of the parent quarks in the t (t) over bar rest frame are sensitive to the spin information, and the distribution of cos theta(1).cos theta(2) is sensitive to the spin correlation between the t and (t) over bar quarks. The distribution is unfolded to parton level and compared to the nexttoleading order prediction. A good agreement is observed.
The relationship between jet production in the central region and the underlyingevent activity in a pseudorapidityseparated region is studied in 4.0 pbsup1/sup of s=2.76 TeV pp collision data recorded with the ATLAS detector at the LHC. The underlying event is characterised through measurements of the average value of the sum of the transverse energy at large pseudorapidity downstream of one of the protons, which are reported here as a function of hardscattering kinematic variables. The hard scattering is characterised by the average transverse momentum and pseudorapidity of the two highest transverse momentum jets in the event. The dijet kinematics are used to estimate, on an eventbyevent basis, the scaled longitudinal momenta of the hardscattered partons in the target and projectile beamprotons moving toward and away from the region measuring transverse energy, respectively. Transverse energy production at large pseudorapidity is observed to decrease with a linear dependence on the longitudinal momentum fraction in the target proton and to depend only weakly on that in the projectile proton. The results are compared to the predictions of various Monte Carlo event generators, which qualitatively reproduce the trends observed in data but generally underpredict the overall level of transverse energy at forward pseudorapidity. © 2016 CERN for the benefit of the ATLAS Collaboration.
The differential crosssection for pair production of top quarks with high transverse momentum is measured in 20.3 fb1 of protonproton collisions at a centerofmass energy of 8 TeV. The measurement is performed for tt¯ events in the lepton+jets channel. The crosssection is reported as a function of the hadronically decaying top quark transverse momentum for values above 300 GeV. The hadronically decaying top quark is reconstructed as an antikt jet with radius parameter R=1.0 and identified with jet substructure techniques. The observed yield is corrected for detector effects to obtain a crosssection at particle level in a fiducial region close to the event selection. A partonlevel crosssection extrapolated to the full phase space is also reported for top quarks with transverse momentum above 300 GeV. The predictions of a majority of nexttoleadingorder and leadingorder matrixelement Monte Carlo generators are found to agree with the measured crosssections. © 2016 CERN.
The crosssection for the production of a single top quark in association with a W boson in protonproton collisions at √s = 8TeV is measured. The dataset corresponds to an integrated luminosity of 20.3 fbsup−1/sup, collected by the ATLAS detector in 2012 at the Large Hadron Collider at CERN. Events containing two leptons and one central bjet are selected. The W t signal is separated from the backgrounds using boosted decision trees, each of which combines a number of discriminating variables into one classifier. Production of W t events is observed with a significance of 7.7σ. The crosssection is extracted in a profile likelihood fit to the classifier output distributions. The W t crosssection, inclusive of decay modes, is measured to be 23.0 ± 1.3(stat.)− 3.5 sup+ 3.2/sup(syst.)±1.1(lumi.) pb. The measured crosssection is used to extract a value for the CKM matrix element Vtb of 1.01 ± 0.10 and a lower limit of 0.80 at the 95% confidence level. The crosssection for the production of a top quark and a W boson is also measured in a fiducial acceptance requiring two leptons with pT> 25 GeV and η < 2.5, one jet with pT> 20 GeV and η < 2.5, and ET supmiss/sup > 20 GeV, including both W t and topquark pair events as signal. The measured value of the fiducial crosssection is 0.85 ± 0.01(stat.)− 0.07 sup+ 0.07/sup(syst.)±0.03(lumi.) pb. © 2016, The Author(s).
The ZZ production cross section in protonproton collisions at 13 TeV centerofmass energy is measured using 3.2 fb(1) of data recorded with the ATLAS detector at the Large Hadron Collider. The considered Z boson candidates decay to an electron or muon pair of mass 66116 GeV. The cross section is measured in a fiducial phase space reflecting the detector acceptance. It is also extrapolated to a total phase space for Z bosons in the same mass range and of all decay modes, giving 16.7(2.0)(+2.2) (stat)(0.7)(+0.9) (syst)(0.7)(+1.0) (lumi) pb. The results agree with standard model predictions.
Fiducial crosssections for tt¯ production with one or two additional bjets are reported, using an integrated luminosity of 20.3 fb1 of proton–proton collisions at a centreofmass energy of 8 TeV at the Large Hadron Collider, collected with the ATLAS detector. The crosssection times branching ratio for tt¯ events with at least one additional bjet is measured to be 950 ± 70 (stat.) 190 +240 (syst.) fb in the leptonplusjets channel and 50 ± 10 (stat.) 10 +15 (syst.) fb in the eμ channel. The crosssection times branching ratio for events with at least two additional bjets is measured to be 19.3 ± 3.5 (stat.) ± 5.7 (syst.) fb in the dilepton channel (eμ, μμ, and ee) using a method based on tight selection criteria, and 13.5 ± 3.3 (stat.) ± 3.6 (syst.) fb using a looser selection that allows the background normalisation to be extracted from data. The latter method also measures a value of 1.30 ± 0.33 (stat.) ± 0.28 (syst.)% for the ratio of tt¯ production with two additional bjets to tt¯ production with any two additional jets. All measurements are in good agreement with recent theory predictions. © 2016, CERN for the benefit of the ATLAS collaboration.
The fourlepton (4ℓ, ℓ=e, μ) production cross section is measured in the mass range from 80 to 1000 GeV using 20.3 fb1 of data in pp collisions at s=8 TeV collected with the ATLAS detector at the LHC. The 4ℓ events are produced in the decays of resonant Z and Higgs bosons and the nonresonant ZZ continuum originating from qq, gg, and qg initial states. A total of 476 signal candidate events are observed with a background expectation of 26.2±3.6 events, enabling the measurement of the integrated cross section and the differential cross section as a function of the invariant mass and transverse momentum of the fourlepton system. In the mass range above 180 GeV, assuming the theoretical constraint on the qq production cross section calculated with perturbative NNLO QCD and NLO electroweak corrections, the signal strength of the gluonfusion component relative to its leadingorder prediction is determined to be μgg=2.4±1.0 (stat.)±0.5 (syst.)±0.8 (theory). © 2015 CERN for the benefit of the ATLAS Collaboration.
Combined analyses of the Higgs boson production and decay rates as well as its coupling strengths to vector bosons and fermions are presented. The combinations include the results of the analyses of the H → γγ, ZZ∗, WW∗, Zγ, bb, ττ and μμ decay modes, and the constraints on the associated production with a pair of top quarks and on the offshell coupling strengths of the Higgs boson. The results are based on the LHC protonproton collision datasets, with integrated luminosities of up to 4.7 fb1 at √S =7 TeV and 20.3 fb1 at √S = 8 TeV, recorded by the ATLAS detector in 2011 and 2012. Combining all production modes and decay channels, the measured signal yield, normalised to the Standard Model expectation, is 1.18+0.15 0.14. The observed Higgs boson production and decay rates are interpreted in a leadingorder coupling framework, exploring a wide range of benchmark coupling models both with and without assumptions on the Higgs boson width and on the Standard Model particle content in loop processes. The data are found to be compatible with the Standard Model expectations for a Higgs boson at a mass of 125.36 GeV for all models considered. © 2015, The Author(s).
In the present paper, we propose to use the method of Empirical Mode Decomposition for frequency band analysis of MEG data. This method is compared with the more traditional methods of narrow band filtering and Hilbert transform. By the analysis of MEG data recorded during subjects’ volitional sensorimotor tasks, it is shown that the extraction of empirical modes can potentially detect some useful information about brain cognitive activity which is inaccessible to classical methods of frequency band analysis. © Springer International Publishing Switzerland 2016.
This paper considers the technique for studying the testing of tubular solar collector in a lab. Today, there are several ways methods of using solar collectors. When using the first method, the following values are measured: Coolant flow, difference between the temperatures of the collector coolant fluid at the collector inlet and outlet and the density of the incident solar radiation flux. Here, all these values are measured simultaneously and under quasistationary mode. Much of the research is related to testing of collectors in field conditions using the instant method. At the end of the tests, the product of the total heat loss coefficient of the collector and efficiency coefficient of the absorption panel was determined. The heat output of the collector was also measured. As is seen from experimental methods of testing tubular solar collector, the tubular collector with an absorbing screen decreases from 0.8 to 0.17 when water is supplied at the inlet 20°C, 30°C, 40°C and 50°C, while the efficiency of the tubular collector with a reflector increases from 0.17 to 0.68 when water is supplied at the inlet 20°C, 30°C, 40°C, and then decreases to 0.4 at t150°C. It is obvious that the efficiency of heat absorption and transfer as a result of thermal conductivity is much higher than the capturing and reflection of sunlight by the absorbing pipe. However, both the cost and labor input involved in the manufacture of the above tubular collector with an absorbing screen is higher. © 2005  2016 JATIT & LLS. All rights reserved.
At present information security (IS) incidents have become not only more numerous and diverse but also more damaging and disruptive. Preventive controls based on the IS risk assessment results decrease the majority but not all the IS incidents. Therefore, an IS incident management system is necessary for rapidly detecting IS incidents, minimizing loss and destruction, mitigating the vulnerabilities that were exploited and restoring the Internet of Things infrastructure (IoTI), including its IT services. These systems can be implemented on the basis of a Security Operations Center (SOC). Based on the related works a survey of the existing SOCs, their mission and main functions is given. The SOCs' classification as well as the key indicators of IS incidents in IoTI are proposed. Some serious firstgeneration SOCs' limitations are defined. This analysis leads to the main area of further research launched by the author. © 2016 IEEE.
The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution. © 2016 IEEE.
At a time when the media constantly reports about new sophisticated attacks, organizations of any business and size need to be prepared for such attacks against their IT infrastructures. To reflect the attacks organizations should have a properly designed information security (IS) management system with adequate documentation support. Among the most important documents, there are IS policies for different application areas, including an IS incident management policy. In order to create a truly effective IS policy it is necessary to adequately describe the organization's business environment from the IS viewpoint. The paper presents four most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided. © 2016 IEEE.
Today we witness the appearance of some additional to Big Data concepts: data lakes and fast data. Are they simply the new marketing labels for the old Big Data IT or really new ones? Thus the key goal of the paper is to identify the relationship between these three concepts, giving special attention to their application to information security (IS) issues. The reason lies in the fact that volumes of ISrelated information is one thing, but the real problem for securing enterprises' IT infrastructure assets is the speed with which things related to IS happen.
Two important areas of our lives  Internet of Things (IoT) and Clouds  are based on the general information and communication technologies (ICT) concepts. If so, the modern statelevel requirements for the competencies of information security (IS) professionals are completely applicable to IS professionals needed for the IoT and Clouds. That is why the peculiarities of American, Australian and European approaches to the development of IS professional competencies are discussed on four bestinthebreed examples: "The Competency and Functional Framework for IT Security Workforce Development" by the U.S. DHS/NCSD, the NICE by NIST, "The Cyber Security Capability Framework & Mapping of Information Security Manual Roles" by AGIMO and "The European eCompetence Framework" by the European Commission. Pros and cons of all approaches are marked. A short prediction on the new international standard ISO/IEC 27021 content with IS professional competencies is proposed. The discussion of all these documents' applicability to the IoT and Cloud IS professional competencies concludes the paper.
Today the information security (IS) of data mining is the crucial and comprehensive issue for organizations of the different spheres and size. The main challenges of Big Data IT are management of large amounts of heterogeneous information and providing its availability. Big Data protection against unauthorized access and corruption (keeping its confidentiality and integrity) as well as availability maintenance form the key research priorities in this field. The issues related to providing these Big Data features are considered in the paper. The existing approaches to their solution are analyzed. Some concepts for their improvement while designing the secure Big Data mining algorithm are formulated in accordance to IS properties.
While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.
The description of the crossplatform web application providing users with the flexible tool for storage of an object model of arbitrary data domain for the purpose of operational formation of controls loading of multiserver systems on the basis of scalable Markov processes is provided. The threelevel clientserver architecture is the cornerstone of system. In it loading is distributed between the service provider called by the server and the customers of services called by clients. In operation ORM a framework of Eclipse Link which is reference implementation of the Java Persistence API (JPA) specifications which were included in Java EE is used. Traditional approach with creation of classes' entities for each specific type of objects isn't suitable for creation of a data model which would allow keeping objects of arbitrary data domain as neither object types, nor their parameters are in advance unknown. The meta model which describes each object the set of attributes inherent in specific object type, and values for these attributes is developed for the solution of this task. Such approach to the description of objects allows storing arbitrary object model, using a limited set of classes' entities. The layer of business logic of application is realized by means of JSF Managed Beans or bins  Java of classes which are under control of a container framework (Java EE application server). JSF components of the presentation layer can get directly access to fields and methods. The layer of representation is realized by means of Java Server Faces (JSF)  a platform for creation of the user interface of the web applications written in the Java language and library the Prime Faces 5.2 JSF component. © 20062016 Asian Research Publishing Network (ARPN).
This paper presents the results of application of the elaborated methods for monitoring of nanodiamonds in human urine using fluorescence spectroscopy. High efficiency of artificial neural networks applied for recognition and estimation of the concentration of nanodiamonds in urine with a strong autofluorescence background is demonstrated. It was found that minimal concentration of nanodiamonds with strong fluorescence containing nitrogenvacancy (NV) centers can be detected in urine by fluorescence spectroscopy at a level of 3.06 × 10−4 g L−1; while use of artificial neural networks for detection of weakly fluorescent detonation nanodiamonds provides reasonably high accuracy of detection, not worse than 6.8 × 10−3 g L−1. © 2016 WILEYVCH Verlag GmbH & Co. KGaA, Weinheim
In this work, we study gas flow through shale matrix consisting of a microporous inorganic material and nanoporous organic material (kerogen). We apply a multiscale analysis to mass balance equations taking into account such processes as desorption of gas from nanopores in kerogen, diffusion, and filtration. As a result, we get a macroscopic initial boundaryvalue problem with effective coefficients. The effective coefficients are determined from the solution of a problem on representative elementary volume (REV or periodicity cell). They are influenced by the structure of shale matrix. The values of the effective coefficients depend on permeability and porosity, diffusivity of adsorbed and free gas, adsorption/desorption mechanism, and the concentration of kerogen. We study the free gas amount across the shale matrix as a function of coordinates and time. We conclude that due to the adsorbedphase transport by the organic pore walls, the amount of gas inplace and gas production rate increase with the concentration of kerogen. We investigate both the Henry and Langmuir adsorption, and also the effect of nonlinearity caused by the dependence of matrix permeability on pressure. © 2016 by Begell House, Inc.
Forensic handwriting examination is one of the most sophisticated and controversial in terms of the results objectivity. One reason for this is that the result of the examination is affected by the subjectivity of the expert. The article suggests a number of methods to reduce the impact of human factors on the results of handwriting examination. First of all, it is the development of quantitative techniques for handwriting analysis, allowing obtaining scientifically grounded results of the study. As an example of those techniques, technique for identification (verification) of the writer of the handwritten text is described. In addition, as a way to reduce the influence of the human factor, it is suggested to pay attention to improving the skills of existing experts and training of new experts for forensic handwriting examination. These problems can be partly solved by using presented automated workplace of forensic handwriting expert 'FHWE v.1.0'. © 2016 IEEE.
Three new stochastic transformations are proposed in the paper. A linear transformation on the basis of a pseudorandom number generator (PRNG), functioning in finite fields and constructed by the Galois scheme, exceeds by its mixing properties the known solution on the basis of PRNG, constructed by the Fibonacci scheme. A nonlinear transformation on the basis of an RFSR (Random Feedback Shift Register) has an efficient software implementation. In the nonlinear multiround 256bit transformation, as distinct from known solutions, the entire input block is changed during one round. The considered transformations are directed, first of all, to the construction of cryptoalgorithms using multidimensional transformations. © 2005  2016 JATIT & LLS. All rights reserved.
Results of the experimental study of electron emission from liquid xenon via electroluminescence of the gas phase are presented. We report on observation of a peculiar kind of delayed electroluminescent signal following initial electroluminescence caused by ionizing particles. We also present the results of a study of spontaneous single electron emission following cosmic muon signals. It was found that the rate of spontaneous single electron signals strongly depends on the time passed since the initial electroluminescence happened. The analysis of experimental data showed that both spontaneous single electron signals and delayed electroluminescent signals are associated with ionization electrons which are trapped by the potential barrier at the interface. © 2016 IOP Publishing Ltd and Sissa Medialab srl.
This paper proposes an approach to find the expectation of the betadistribution on the basis of the relationship between the mode and the variance of this law. A cubic equation relating these three characteristics of the beta distribution was received. It is proved that the equation will have three real roots. Experimentally the root which corresponds to the expectation was found. © 2016 International Information Institute.
This work aimed at comparing two different approaches (classical general linear model based on the Bayesian approach and the method of algebraic topology) for fMRI data processing in a simple motor task. Subjects imposes block paradigm, consisting of three identical blocks. The duration of each block was 40 s (20 s of rest and 20 s of right hand fingers busting). To obtain statistically significant results were carried out 20 sessions of experiment. The results obtained by both methods were very close to each other, but correspondence between statistically significant changes in BOLDsignal was not quite complete. TDA (topologic data analyses) allocated additional voxels in Post central gyrus right. This region could be revealed with the changing in the level of confidence in the GLM model, but with this lower level of confidence too much additional voxels appeared. Combination of two approaches could be used for verification of results. © Springer International Publishing Switzerland 2016.
Nonlinear diffusion equation with a polynomial source is considered. The Painlevé analysis of equation has been studied. Exact traveling wave solutions in the simplest cases have been found. © 2015John Wiley & Sons, Ltd.
The article based on the analysis of the literature and experience in the field of economic education is considered a system of key concepts on the topic, as well as features of the introduction of competence approach in teaching practice polytechnic institute, the problem of realization competence approach in higher education, the formation of key information technology competencies, ensuring high availability polytechnic institute graduates to solve problems in the practice of the specialty, modern requirements to the society and the state system of vocational education at all levels, the task of creating these pedagogical conditions, which would help improve the quality of training of future specialists. This article lists didactic, psychopedagogical, organizational and pedagogical conditions that are necessary to improve the level of information technology training of future specialists. Their implementation will create the necessary information technology economist competence. © 2016, Econjournals. All rights reserved.
The present paper provides a systematic treatment of various decomposition methods for linear (and some model nonlinear) systems of coupled threedimensional partial differential equations of a fairly general form. Special cases of the systems considered are commonly used in applied mathematics, continuum mechanics, and physics. The methods in question are based on the decomposition (splitting) of a system of equations into a few simpler subsystems or independent equations. We show that in the absence of mass forces the solution of the system of four threedimensional stationary and nonstationary equations considered can be expressed via solutions of three independent equations (two of which having a similar form) in a number of ways. The notion of decomposition order is introduced. Various decomposition methods of the first, second, and higher orders are described. To illustrate the capabilities of the methods, more than fifteen distinct systems of coupled 3D equations are discussed which describe viscoelastic incompressible fluids, compressible barotropic fluids, thermoelasticity, thermoviscoelasticity, electromagnetic fields, etc. The results obtained may be useful when constructing exact and numerical solutions of linear problems in continuum mechanics and physics as well as when testing numerical and approximate methods for linear and some nonlinear problems. © 2015 Elsevier Inc.
Currently great attention is paid to the operating system (OS) protection against malicious malware, viruses, etc. WiFi is the most popular and demanded way of connection to the Internet, which is used in many companies and by the individuals. WiFi is a widespread technology and in different situations it requires additional software for a protected installation. WiFi networks can be cracked, and personal data can be stolen or compromised. A process of WiFi network's hacking for educational purposes is considered in the paper. Some hacking techniques are shown as implemented in the laboratory works. © 2016 IEEE.
The aim of this study was to show that amino acid sequences have a latent periodicity with insertions and deletions of amino acids in unknown positions of the analyzed sequence. Genetic algorithm, dynamic programming, and random weight matrices were used to develop the new mathematical algorithm for latent periodicity search. The method makes the direct optimization of the positionweight matrix for multiple sequence alignment without using pairwise alignments. The developed algorithm was applied to analyze the amino acid sequences of a small number of proteins. This study showed the presence of latent periodicity with insertions and deletions in the amino acid sequences of such proteins, for which the presence of latent periodicity was not previously known. The origin of latent periodicity with insertions and deletions is discussed. Copyright © 2016 by SCITEPRESS  Science and Technology Publications, Lda. All rights reserved.
The new direction of investigation, namely, modeling of cognitive evolution is described. The cognitive evolution is evolution of animal cognitive abilities. Investigation of cognitive evolution is based on models of autonomous agents. The sketch program for future investigations of cognitive evolution is proposed. Initial models, which were developed in accordance with the sketch program, are characterized. In particular, the model of agents that have several natural needs, models of agent movement in mazes, accumulation of knowledge, and formation of predictions, and the model of plan formation of rather complex behavior are described. © Springer International Publishing Switzerland 2016.
The lecture describes current models of autonomous cognitive agents. The study of these models can be considered as the method of investigations of biologically inspired cognitive architectures (BICA). The main attention is paid to the models that are used at studying of cognitive evolution. Several examples of such models are outlined. Schemes of new models are proposed. © Springer International Publishing Switzerland 2016.
This paper presents tools aimed at automating the data integration process between different SaaSapplications. Data transformations creation and customization represents a major task in this area. We propose a solution based on type theory and describe an approach to automated transformation construction in form of typed functions. (C) 2016 Published by Elsevier B.V. This is an open access article under the CC BYNND license (http://creativecommons.org/licenses/byncnd/4.0/). Peerreview under responsibility of KES International
The paper proposes a short comparative analysis of the contemporary models of public key infrastructure (PKI) as base of the cloud trust. The Russian model of PKI is presented. Differences between the North American and West Europe models of PKI and Russian model of PKI are described. The problems of creation and main directions of further development and improvement of the Russian PKI and its integration into the global trust environment are defined. © 2016 IEEE.
The work deals with the problems of integration and hybridization in today’s dynamic intelligent systems. On the example of the individual classes of intelligent control systems (ICS) development experience the evolution of ICS architectures in accordance with the integration paradigm of artificial intelligence with models, methods and tools from other areas (automatic control system, simulation, etc.) are examined. An example of the integration of complex discrete systems simulation models with of dynamic integrated expert systems separate components developed in MEPhI and based on taskoriented methodology and tool set ATTECHNOLOGY is described. © Springer International Publishing Switzerland 2016.
The paper discusses scientific and technological problems of dynamic integrated expert systems development. Putting various inference tools together with simulation modeling tools gives a cumulative result in temporal knowledge processing. © Springer International Publishing Switzerland 2016.
The problems of intellectualization in the development process of integrated expert systems basing on the problemoriented methodology and the ATTECHNOLOGY workbench are considered. The experience from carrying out intellectual planning for the synthesis of architectural layouts of prototypes in integrated expert systems, the intelligent planner usage, reusable components, typical project procedures, and other components of the intellectual software environment in the ATTECHNOLOGY complex is described. © Springer International Publishing Switzerland 2016.
We review the problems of the acquisition of temporal knowledge for the automated construction of knowledge base in dynamic integrated expert systems, the development of which is based on the taskoriented methodology and ATTECHNOLOGY workbench. Analyze modern approaches of temporal knowledge acquisition from different sources of knowledge. And present features of the extended knowledge representation language and combined knowledge acquisition method, as well as promising directions of its development. © Springer International Publishing Switzerland 2016.
The aim of this work is the analysis and synthesis of experience in the development and usage of tools for intellectual tutoring, functioning as part of ATTECHNOLOGY workbench in the study process. © Springer International Publishing Switzerland 2016.
Abstract: A search for a highmass Higgs boson H is performed in the H → WW → ℓνℓν and H → WW → ℓνqq decay channels using pp collision data corresponding to an integrated luminosity of 20.3 fbsup−1/sup collected at s=8(Formula presented.) TeV by the ATLAS detector at the Large Hadron Collider. No evidence of a highmass Higgs boson is found. Limits on σH × BR(H → WW) as a function of the Higgs boson mass mH are determined in three different scenarios: one in which the heavy Higgs boson has a narrow width compared to the experimental resolution, one for a width increasing with the boson mass and modeled by the complexpole scheme following the same behavior as in the Standard Model, and one for intermediate widths. The upper range of the search is mH = 1500 GeV for the narrowwidth scenario and mH = 1000 GeV for the other two scenarios. The lower edge of the search range is 200–300 GeV and depends on the analysis channel and search scenario. For each signal interpretation, individual and combined limits from the two WW decay channels are presented. At mH = 1500 GeV, the highestmass point tested, σH × BR(H → WW) for a narrowwidth Higgs boson is constrained to be less than 22 fb and 6.6 fb at 95% CL for the gluon fusion and vectorboson fusion production modes, respectively.[Figure not available: see fulltext.] © 2016, The Author(s).
A search is presented for a highmass Higgs boson in the , , , and decay modes using the ATLAS detector at the CERN Large Hadron Collider. The search uses protonproton collision data at a centreofmass energy of 8 TeV corresponding to an integrated luminosity of 20.3 fb. The results of the search are interpreted in the scenario of a heavy Higgs boson with a width that is small compared with the experimental mass resolution. The Higgs boson mass range considered extends up to for all four decay modes and down to as low as 140 , depending on the decay mode. No significant excess of events over the Standard Model prediction is found. A simultaneous fit to the four decay modes yields upper limits on the production crosssection of a heavy Higgs boson times the branching ratio to boson pairs. 95 % confidence level upper limits range from 0.53 pb at GeV to 0.008 pb at GeV for the gluonfusion production mode and from 0.31 pb at GeV to 0.009 pb at GeV for the vectorbosonfusion production mode. The results are also interpreted in the context of TypeI and TypeII twoHiggsdoublet models.
Abstract: The electroweak production and subsequent decay of single top quarks is determined by the properties of the Wtb vertex. This vertex can be described by the complex parameters of an effective Lagrangian. An analysis of angular distributions of the decay products of single top quarks produced in the t channel constrains these parameters simultaneously. The analysis described in this paper uses 4.6 fbsup−1/sup of protonproton collision data at (Formula presented.) TeV collected with the ATLAS detector at the LHC. Two parameters are measured simultaneously in this analysis. The fraction f1 of decays containing transversely polarised W bosons is measured to be 0.37 ± 0.07 (stat.⊕syst.). The phase δ− between amplitudes for transversely and longitudinally polarised W bosons recoiling against lefthanded bquarks is measured to be −0.014π ± 0.036π (stat.⊕syst.). The correlation in the measurement of these parameters is 0.15. These values result in twodimensional limits at the 95% confidence level on the ratio of the complex coupling parameters gR and VL, yielding Re[gR/VL] ∈ [−0.36, 0.10] and Im[gR/VL] ∈ [−0.17, 0.23] with a correlation of 0.11. The results are in good agreement with the predictions of the Standard Model.[Figure not available: see fulltext.] © 2016, The Author(s).
Charged Higgs bosons heavier than the top quark and decaying via Hsup±/sup → tb are searched for in protonproton collisions measured with the ATLAS experiment at (Formula presented.) TeV corresponding to an integrated luminosity of 20.3fbsup−1/sup. The production of a charged Higgs boson in association with a top quark, gb → tHsup±/sup, is explored in the mass range 200 to 600 GeV using multijet final states with one electron or muon. In order to separate the signal from the Standard Model background, analysis techniques combining several kinematic variables are employed. An excess of events above the backgroundonly hypothesis is observed across a wide mass range, amounting to up to 2.4 standard deviations. Upper limits are set on the gb → tHsup±/sup production cross section times the branching fraction BR(Hsup±/sup → tb). Additionally, the complementary schannel production, qqsup′/sup → Hsup±/sup, is investigated through a reinterpretation of Wsup′/sup → tb searches in ATLAS. Final states with one electron or muon are relevant for Hsup±/sup masses from 0.4 to 2.0 TeV, whereas the allhadronic final state covers the range 1.5 to 3.0 TeV. In these search channels, no significant excesses from the predictions of the Standard Model are observed, and upper limits are placed on the qqsup′/sup → Hsup±/sup production cross section times the branching fraction BR(Hsup±/sup → tb). © 2016, The Author(s).
A search for direct pair production of the supersymmetric partner of the top quark, decaying via a scalar tau to a nearly massless gravitino, has been performed using 20 fb (Formula presented.) of proton–proton collision data at (Formula presented.). The data were collected by the ATLAS experiment at the LHC in 2012. Top squark candidates are searched for in events with either two hadronically decaying tau leptons, one hadronically decaying tau and one light lepton, or two light leptons. No significant excess over the Standard Model expectation is found. Exclusion limits at (Formula presented.) confidence level are set as a function of the top squark and scalar tau masses. Depending on the scalar tau mass, ranging from the (Formula presented.) LEP limit to the top squark mass, lower limits between 490 and (Formula presented.) are placed on the top squark mass within the model considered. © 2016, CERN for the benefit of the ATLAS collaboration.
A search for the flavourchanging neutralcurrent decay is presented. Data collected by the ATLAS detector during 2012 from protonproton collisions at the Large Hadron Collider at a centreofmass energy of root s = 8 TeV, corresponding to an integrated luminosity of 20.3 fb(1), are analysed. Topquark pairproduction events with one top quark decaying through the t  qZ (q = u,c) channel and the other through the dominant Standard Model mode t  bW are considered as signal. Only the decays of the Z boson to charged leptons and leptonic W boson decays are used. No evidence for a signal is found and an observed (expected) upper limit on the t  qZ branching ratio of 7 x 10(4) (8 x 10(4)) is set at the 95 % confidence level.
A search for a Higgs boson produced via vectorboson fusion and decaying into invisible particles is presented, using 20.3 fbsup−1/sup of protonproton collision data at a centreofmass energy of 8 TeV recorded by the ATLAS detector at the LHC. For a Higgs boson with a mass of 125 GeV, assuming the Standard Model production cross section, an upper bound of 0.28 is set on the branching fraction of H → invisible at 95% confidence level, where the expected upper limit is 0.31. The results are interpreted in models of Higgsportal dark matter where the branching fraction limit is converted into upper bounds on the darkmatternucleon scattering cross section as a function of the darkmatter particle mass, and compared to results from the direct darkmatter detection experiments. © 2016, The Author(s).
A search for highly ionizing particles produced in protonproton collisions at 8 TeV centerofmass energy is performed by the ATLAS Collaboration at the CERN Large Hadron Collider. The data set used corresponds to an integrated luminosity of 7.0 fb(1). A customized trigger significantly increases the sensitivity, permitting a search for such particles with charges and energies beyond what was previously accessible. No events were found in the signal region, leading to production cross section upper limits in the mass range 2002500 GeV for magnetic monopoles with magnetic charge in the range 0.5g(D) vertical bar g vertical bar 2.0g(D), where g(D) is the Dirac charge, and for stable particles with electric charge in the range 10 vertical bar z vertical bar 60. Modeldependent limits are presented in given pairproduction scenarios, and modelindependent limits are presented in fiducial regions of particle energy and pseudorapidity.
This Letter describes a modelagnostic search for pairs of jets (dijets) produced by resonant and nonresonant phenomena beyond the Standard Model in 3.6 fbsup1/sup of protonproton collisions with a centreofmass energy of s=13 TeV recorded by the ATLAS detector at the Large Hadron Collider. The distribution of the invariant mass of the two leading jets is examined for local excesses above a dataderived estimate of the smoothly falling prediction of the Standard Model. The data are also compared to a Monte Carlo simulation of Standard Model angular distributions derived from the rapidity of the two jets. No evidence of anomalous phenomena is observed in the data, which are used to exclude, at 95% CL, quantum black holes with threshold masses below 8.3 TeV, 8.1 TeV, or 5.1 TeV in three different benchmark scenarios; resonance masses below 5.2 TeV for excited quarks, 2.6 TeV in a Wsup'/sup model, a range of masses starting from mZ'=1.5 TeV and couplings from gq=0.2 in a Zsup'/sup model; and contact interactions with a compositeness scale below 12.0 TeV and 17.5 TeV respectively for destructive and constructive interference between the new interaction and QCD processes. These results significantly extend the ATLAS limits obtained from 8 TeV data. Gaussianshaped contributions to the mass distribution are also excluded if the effective crosssection exceeds values ranging from approximately 50300 fb for masses below 2 TeV to 220 fb for masses above 4 TeV. © 2016 CERN for the benefit of the ATLAS Collaboration.
Results of a search for new phenomena in events with at least three photons are reported. Data from proton–proton collisions at a centreofmass energy of 8 TeV, corresponding to an integrated luminosity of 20.3 fb (Formula presented.) , were collected with the ATLAS detector at the LHC. The observed data are well described by the Standard Model. Limits at the 95 % confidence level on new phenomena are presented based on the rate of events in an inclusive signal region and a restricted signal region targeting the rare decay (Formula presented.) , as well as diphoton and triphoton resonance searches. For a Standard Model Higgs boson decaying to four photons via a pair of intermediate pseudoscalar particles (a), limits are found to be (Formula presented.) for 10 GeV (Formula presented.) 62 GeV. Limits are also presented for Higgs bosonlike scalars (H) for (Formula presented.) 125 GeV, and for a (Formula presented.) decaying to three photons via (Formula presented.). Additionally, the observed limit on the branching ratio of the Z boson decay to three photons is found to be BR (Formula presented.) , a result five times stronger than the previous result from LEP. © 2016, CERN for the benefit of the ATLAS collaboration.
Abstract: A search is performed for the production of highmass resonances decaying into a photon and a jet in 3.2 fbsup−1/sup of protonproton collisions at a centreofmass energy of (Formula presented.) TeV collected by the ATLAS detector at the Large Hadron Collider. Selected events have an isolated photon and a jet, each with transverse momentum above 150 GeV. No significant deviation of the γ+jet invariant mass distribution from the backgroundonly hypothesis is found. Limits are set at 95% confidence level on the cross sections of generic Gaussianshaped signals and of a few benchmark phenomena beyond the Standard Model: excited quarks with vectorlike couplings to the Standard Model particles, and nonthermal quantum black holes in two models of extra spatial dimensions. The minimum excluded visible cross sections for Gaussianshaped resonances with widthtomass ratios of 2% decrease from about 6 fb for a mass of 1.5 TeV to about 0.8 fb for a mass of 5 TeV. The minimum excluded visible cross sections for Gaussianshaped resonances with widthtomass ratios of 15% decrease from about 50 fb for a mass of 1.5 TeV to about 1.0 fb for a mass of 5 TeV. Excited quarks are excluded below masses of 4.4 TeV, and nonthermal quantum black holes are excluded below masses of 3.8 (6.2) TeV for RandallSundrum (ArkaniHamedDimopoulousDvali) models with one (six) extra dimensions.[Figure not available: see fulltext.] © 2016, The Author(s).
Abstract: A search is conducted for new physics in multijet final states using 3.6 inverse femtobarns of data from protonproton collisions at (Formula presented.) TeV taken at the CERN Large Hadron Collider with the ATLAS detector. Events are selected containing at least three jets with scalar sum of jet transverse momenta (HT) greater than 1 TeV. No excess is seen at large HT and limits are presented on new physics: models which produce final states containing at least three jets and having cross sections larger than 1.6 fb with HT> 5.8 TeV are excluded. Limits are also given in terms of new physics models of strong gravity that hypothesize additional spacetime dimensions.[Figure not available: see fulltext.] © 2016, The Author(s).
The ATLAS experiment has performed extensive searches for the electroweak production of charginos, neutralinos, and staus. This article summarizes and extends the search for electroweak supersymmetry with new analyses targeting scenarios not covered by previously published searches. New searches use vectorboson fusion production, initialstate radiation jets, and lowmomentum lepton final states, as well as multivariate analysis techniques to improve the sensitivity to scenarios with small mass splittings and lowproduction cross sections. Results are based on 20 fbsup1/sup of protonproton collision data at √s = 8 TeV recorded with the ATLAS experiment at the Large Hadron Collider. No significant excess beyond Standard Model expectations is observed. The new and existing searches are combined and interpreted in terms of 95% confidencelevel exclusion limits in simplified models, where a single production process and decay mode is assumed, as well as within phenomenological supersymmetric models. © 2016 CERN, for the ATLAS Collaboration. Published by the American Physical Society under the terms of the "http://creativecommons.org/licenses/by/3.0/" Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.
A search for vectorlike quarks and excited quarks in events containing a top quark and a W boson in the final state is reported here. The search is based on 20.3 fbsup−1/sup of protonproton collision data taken at the LHC at a centreofmass energy of 8 TeV recorded by the ATLAS detector. Events with one or two leptons, and one, two or three jets are selected with the additional requirement that at least one jet contains a bquark. Singlelepton events are also required to contain at least one largeradius jet from the hadronic decay of a highpTW boson or a top quark. No significant excess over the expected background is observed and upper limits on the crosssection times branching ratio for different vectorlike quark and excitedquark model masses are derived. For the excitedquark production and decay to Wt with unit couplings, quarks with masses below 1500 GeV are excluded and couplingdependent limits are set. © 2016, The Author(s).
Searches for pairproduced scalar leptoquarks are performed using 20 fb$$1$$1 of proton–proton collision data provided by the LHC and recorded by the ATLAS detector at $$=8$$s=8 TeV. Events with two electrons (muons) and two or more jets in the final state are used to search for first (second)generation leptoquarks. The results from two previously published ATLAS analyses are interpreted in terms of thirdgeneration leptoquarks decaying to $$b_tau barbbarnu _tau $$b??b???? and $$t_tau bartbarnu _tau $$t??t???? final states. No statistically significant excess above the Standard Model expectation is observed in any channel and scalar leptoquarks are excluded at 95 % CL with masses up to $$m_mathrm LQ1$$mLQ1 1050 GeV for firstgeneration leptoquarks, $$m_mathrm LQ2$$mLQ2 1000 GeV for secondgeneration leptoquarks, $$m_mathrm LQ3$$mLQ3 625 GeV for thirdgeneration leptoquarks in the $$b_tau barbbarnu _tau $$b??b???? channel, and 200 $$ m_mathrm LQ3 $$mLQ3 640 GeV in the $$t_tau bartbarnu _tau $$t??t???? channel. © 2015, CERN for the benefit of the ATLAS collaboration.
Devices to provide oneway data transfer are known as oneway gateways and used in various security applications. The main problem to be solved by oneway gateways is to make secure communication between network segments with different security levels to maintain multilevel security policy. Although oneway gateways are utilized in lot of information systems, there is no solution, including 'air gap', to assure oneway transfer in fact and they are not resistant against data leakage via covert channels. We analyzed state of the art technologies and products supporting oneway data transfer, worked out the requirements for oneway gateway with assured data transmitting. We designed the algorithm and protocol of assured data transfer and proposed the detailed device scheme. Then we build the program modelling the interaction between communication parties and the oneway gateway. This program was tested and some recommendations of its implementation were given. © 2016 IEEE.
The Default Mode Network (DMN) is a brain system that mediates internal modes of cognitive activity, showing higher neural activation when one is at rest. The aim of the current work is to find a connectivity pattern between the four DMN key regions without any a priori assumptions on the underlying network architecture. For this purpose functional magnetic resonance imaging (fMRI) data from 30 healthy subjects (1000 time points from each one) was acquired and Transfer Entropy (TE) between fMRI timeseries was calculated. The significant results at the group level were obtained by testing against the surrogate data. For initial 500, final 500 and total 1000 time points we found stable causal interactions between mPFC, PCC and LIPC. For some scanning intervals there are also connections from RIPC to mPFC and PCC. These results are in part conforming to earlier studies and models of effective connectivity within the DMN. © Springer International Publishing Switzerland 2016.
Background: A new way of spam sending was discovered. Old spam techniques not effective now, spammers find new ways. Analysis: The analysis shows that spammers find new ways to bypass very efficient tools to catch spam like DNSBL, SPF and some others. Findings: New discovered approach uses cheap domain names and cheap hosting services to imitate legal mail servers. Conclusion: New antispam tools needed to fight against new spam sending wave.
The technologies used to steal passwords are developing day by day. A new technology has become popular in Russia. It gives hackers the opportunity to make money on corporate wars and the intentions of certain people to get access to other persons' information. Today, the password stealing technology has been put in mass production: the pricing has been set, and anyone can place an order for another person's mailbox to be hacked. Current research gives opportunity to develop new protection techniques. © 20062016 Asian Research Publishing Network (ARPN).
Many special forces in Russia use APCO P25 encoding while radio talks. Using google speech or yandex speechkit while decoding radio talks can give huge advantage. Search engines can index decoded text or knowledge base can be created. Copyright © 2016 Institute of Advanced Engineering and Science. All rights reserved.
The article provides analysis of the existing methods of situational adaptation and spatial data models used in groundbased and onboard geographic information systems (GIS); examines their advantages and disadvantages. A new method based on a model in which spatial data are represented as a set of successive approximations is suggested; it allows to adapt them by sampling at the required level of detail. The results of the simulation based on the data generated using the proposed method, are shown. The efficiency of its application for onboard geographic information systems and solutions is proved. It is concluded that the method is suitable to use for solving realtime resourceintensive GIStasks on the onboard equipment with limited computational power. © 2016 Indian Society of Remote Sensing
The problem of choosing the cluster or a cluster node for task execution is important for the overall performance of a distributed system. This paper presents a complex approach to the planning of computations on heterogeneous distributed systems  a set of clusters and NoSQL storage systems. Dynamic scheduling algorithm depends on: the intercluster network parameters, characteristics of cluster interconnect, compute nodes utilization, coprocessors computing capabilities, etc. In this work Hadoop YARN, CUDA technology and NoSQLsystem Apache Cassandra has been used as the experimental platform. © 2016 IEEE.
This paper presents an agentbased model of a transparent market economic system. The community of investors and producers is considered. The agentsmessengers realize the information exchange in the community. The computer simulation demonstrates the natural behavior of the considered economic system. © Springer International Publishing Switzerland 2016.
Neuronal cultures in vitro plated on the multielectrode arrays are very promising as an experimental model to study basic principles of learning that can later motivate development of new artificial cognitive architectures. But it is still an open question if patterns of spontaneous activity in neuronal cultures can be interpreted as memory traces and if these traces can be modified in a learninglike manner. We studied experimentally in vitro development of spontaneous bursting activity in neuronal cultures as well as how this activity changes after open or closed loop stimulation. Results demonstrate that bursting activity of neural networks in vitro selforganize into a few number of stereotypic patterns which remain stable over many days. External electrical stimulation increases a number of simultaneously present activity patterns with majority of bursts still classified as belonging to the dominant cluster. © Springer International Publishing Switzerland 2016.
A system of equations of twofluid magnetohydrodynamics is studied. An ordinary differential equation describing traveling waves in an ideal cold quasineutral plasma is obtained in the case of quasistationary electromagnetic field. The Painlevé analysis of this equation is carried out and the general solution of the equation is constructed in terms of the Weierstrass elliptic function. Solitary and periodic wave solutions for the components of magnetic field are found and analyzed. © 2016 Elsevier B.V.
In state of the art information systems some special digital signature schemes are utilized since traditional cryptographic primitives do not allow to solve a number of topical security tasks. The following signature schemes are widespread nowadays: threshold signatures, blind signatures, group signatures, ring signatures, etc. Failstop signature schemes are also quite investigated but are not used in practice yet. Special digital signature schemes are mostly based on wellknown cryptographic algorithms, e.g. RSA, DSA, ElGamal. However, there are no similar modifications of Russian Digital Signature Standard GOST R 34.102012 used in many commercial applications. In order to fill a gap we propose and validate secure threshold, blind and failstop signature schemes based on GOST R 34.102012 algorithm. The obtained cryptographic primitives can be used in ecommerce to improve the security of information systems by using strong basic algorithm. © 2016 IEEE.
The decays (Formula presented.) and (Formula presented.) are studied with the ATLAS detector at the LHC using a dataset corresponding to integrated luminosities of 4.9 and 20.6 fb1 of pp collisions collected at centreofmass energies (Formula presented.) TeV and 8 TeV, respectively. Signal candidates are identified through (Formula presented.) and (Formula presented.) decays. With a twodimensional likelihood fit involving the (Formula presented.) reconstructed invariant mass and an angle between the (Formula presented.) candidate momenta in the muon pair rest frame, the yields of (Formula presented.) and (Formula presented.), and the transverse polarisation fraction in (Formula presented.) decay are measured. The transverse polarisation fraction is determined to be (Formula presented.) = 0.38 0.23 0.07(Formula presented.), and the derived ratio of the branching fractions of the two modes is (Formula presented.), where the first error is statistical and the second is systematic. Finally, a sample of (Formula presented.) decays is used to derive the ratios of branching fractions (Formula presented.) and (Formula presented.) = 10.4 3.1 1.5 0.6(Formula presented.), where the third error corresponds to the uncertainty of the branching fraction of (Formula presented.) decay. The available theoretical predictions are generally consistent with the measurement. © 2015, CERN for the benefit of the ATLAS collaboration.
Phase and element composition, microhardness of Ti/steel and Nb/steel systems treated by compression plasma flows have been investigated in this work. Auger electron spectroscopy, Xray diffraction, scanning electron microscopy, energydispersion Xray microanalysis and Vickers microhardness measurements were used for sample characterization. The findings showed that treatment of a "coating/steel" system by compression plasma flows generated in nitrogen atmosphere allowed alloying of the surface layer of steel by the coating element and nitriding it simultaneously. The variation of the pulses number (16) resulted in change of the alloying element concentration and formation of a number of phases in the alloyed layer: Fe2Ti, a supersaturated solid solution αFe(Ti,C) in the Ti alloyed layer and a supersaturated solid solution αFe(Nb,C) in the Nb alloyed layer. The formation of Ti(C,N) and Nb(C,N) carbonitrides with fcc crystal structure at the surface was also found. The change of phase composition and quenching effects resulted in substantial increase of microhardness. © 2016 Elsevier Ltd.
The paper is devoted to the development and quality assessment of lightweight pseudorandom number generators (PNRG). The design principles of lightweight PRNG (LWPNRG) are described. The requirements for LWPNRG quality are formulated. This paper gives an example of the transformation of a classical generator into LWPNRG by means of modifying the function of feedback (OFB). We propose methods of assessing the quality of pseudorandom numbers formed by lightweight generator. The results of statistical tests of the developed LWPNRG are also given. © 2016 IEEE.
This article comprises example of typical analysis of cases that may occur in any scientific or technological area. The submitters for informationanalytical researches are various decisionmaking bodies, project managers, companies' and corporations' management, governmental and international organizations. The vast majority of decisionmaking systems are hierarchically structured. Therefore, the results of case analysis are allocated from the bottom to the top of hierarchy's levels in relation to the importance and criticality and reach the highest management levels and even government leaders. That forms the indispensable requirements to the analytical reports: Brevity, visualization, clarity, conclusiveness. A visual representation of the Express analysis results is both an argumentation framework for decisionmaking and decisionmaking process accelerator. The authors form operational group that collectively performs case analysis as part of Multiagent informational and analytical system on scientific and technological areas in the National Research Nuclear University MEPhI. Suggested methodology of express case analysis might be of the interest for experts on system analysis that perform similar kind of studies.
In this paper are considered questions which connected with building of the hybrid user model in scientific recommender systems. Offered model is consistent with conceptual model of the presentation scientific Common European Research Information Format data. The authors propose an approach using semantic networks. The model considers the main entities of a physical data model, received from generally available sources. During creation of model approaches from area of marketing were used, in particular psychographic approach. Quantitative experiment for profiles of the users of the “International congress conference ‘Information technologies in education’” portal. Results of experiment have confirmed adequacy of the offered models. The offered detail level of model and methods of its representation are directed to further improving of a pertinent of all personalisation algorithms. This study was financially supported according to Federal Target Program “Research and development on priority directions of scientific technological complex of Russia for 20142020” (grant No. RFMEFI57614X0068). © 2016, Econjournals. All rights reserved.
There are many alternative humancomputer interfaces that are in active development in current time. For example, a user already can send commands to robotic device via braincomputer interface. Unfortunately, this control channel isn't reliable enough to handle critical devices, but it can still be useful to clarify commands from other control channels. The robotic device operator can be influenced by various factors, such as distraction, as result, incorrect input of control command may occur (especially, if we use some "nontraditional" interfaces as gestures recognition or verbal control). It can entail disastrous consequences as harm inflicting to the robotic device, its environment or the operator himself. In this article we are going to examine the emotional state of the robotic device operator, by obtaining the information from braincomputer interface. It's supposed that the use of information about operators emotional state is going to give positive results in quality of recognizing his or her commands and, therefore, give better control of robotic device overall. © 2016 IEEE.
A generator of turbulent electron beams in an independent mode and in the mode of amplification of an external singlefrequency signal is experimentally investigated. The formation of higher harmonic components in the spectrum of output radiation of the generator is shown experimentally. The phenomenological model of the turbulent electron flow is constructed on the basis of a chain of interacting “electron vortices” described by the modified nonlinear VanderPol differential equations. The modes of independent dynamics and the mode of amplification of an external harmonic signal are considered. The results of numerical modeling and experimental investigations are compared. The qualitative correspondence of the behavior of the dependences obtained from the experimental investigation of the generator of turbulent electron beams and the results obtained from numerical modeling is shown. © 2016, Pleiades Publishing, Ltd.
Efficient use all of the available computing devices is an important issue for heterogeneous computing systems. The ability to choose a CPU or GPU processor for a specific task has a positive impact on the performance of GPGPUsystems. It helps to reduce the total processing time and to achieve the uniform system utilization. In this paper, we propose a scheduler that selects the executing device after prior training, based on the size of the input data. The article also contains the plots and time characteristics that demonstrate improvement in overall execution time, depending on the input data. The program modules were developed in C++ using CUDA libraries. © 2016 IEEE.
The article considers scientific visualization method for images with obviously marked texture characteristics. Similar image type particular property is that it is very difficult for a man to give some impartial estimation for them. Metallography, medicine, wood structure and aerial photography image examples are given as texture image patterns. Haralick matrix was chosen as main characteristic for texture image visual estimation. Different algorithm calculation modifications are suggested. They allow to take into consideration the scale and the turning angle for analyzed texture images by pixel location changes. Haralick matrix visualization algorithms were developed. They allow to demonstrate the Haralick matrix at the monitor in visual form. Gamma  correction image enhancement methods are used for more highquality visual perception of formed images. Texture image characteristic visualization program complex was developed based on simple and modified Haralick matrixes with image quality enhancement possibility. This program complex was tested for real metallography image examples. Received results give chance to assume that visualization method application by the analysis of information, which is difficult to perceive, will be very effective for practical tasks solving in various areas.
Face detection is the first and important problem for face recognition. Face detection can be used both as an independent task for some practical applications, such as face registration, and preliminary part of face recognition, face expression analysis etc. Most suggested face detection algorithms have assumed that the face and (or) background have some constraints. But these constraints made suggested algorithms incapable to application to more general cases. This article proposes fast twolevel multiple face detection algorithm, which has less constraints because of different factors (view dependences, inconstancy, lighting etc.). It consists of two independent parts: location and verification. For location part the approach was supposed, based on forming multiple detected points of some facial elements. These points are used for preliminary face location. For verification part the approach was supposed, based on mutual areas analysis, line’s elements extracting, estimation of mutual brightness and brightness changing. To evaluate developed algorithm the software was prepared, implementing this algorithm. Testing results have demonstrated a high probability of face detection. © 2016, Research India Publications.
In this paper we present a construction of multiparametric families of twodimensional metrics with a polynomial first integral of arbitrary degree in momenta. Such integrable geodesic flows are described by solutions of some semiHamiltonian hydrodynamictype system. We give a constructive algorithm for the solution of the derived hydrodynamictype system, i.e. we found infinitely many conservation laws and commuting flows. Thus we were able to find infinitely many particular solutions of this hydrodynamictype system by the generalized hodograph method. Therefore infinitely many particular twodimensional metrics equipped with first integrals polynomial in momenta were constructed.
This paper is devoted to a method of creation the semantic map for Russian language. We consider different approaches for cognitive maps construction which were made for other languages and compare them to the developing algorithm. We also show the main features of Russian words structure and highlight the important of them for the further usage in the concept of semantic map. We introduce the settheoretical model of the Russian words which will be used in further researches. © Springer International Publishing Switzerland 2016.
Venture capital is the crucial factor in the effectiveness of economic transition from national economy to the innovative path of development. In Russia, the need for the development of venture capital is circumvented primarily by an acute deficit of sources of capital for the development of the innovation process. This article discloses the specifics of the development of the current Russian venture capital market. It is shown that despite the generated infrastructure support for the venture business and a record of success stories of venture projects behind it, the domestic venture capital market is faced with a number of problems, made apparent by the reduction in (capital) volumes in recent years. Many of these problems may be explained by a low demand for innovation on the part of the real sector1 of the economy, the lack of effective functional linkages among organizations supporting the venture business, low informational transparency and a fairly restricted access. Comparison of the dynamics of the world venture capital markets and that of Russia shows that over the past two years,while there was an increase in the volume of world venture capital, the Russian venture market demonstrates the tendency to contract. This is partly due to the influence of international sanctions, economically isolating Russia from the outside world, as well as to restricting access to foreign capital amid lower oil prices. The international sanctions affected the venture capital market with outflows of investors, the devaluation of portfolios of many Russian venture funds, the prevalence of investments given to projects at later stages of realization. It is of note that the external economic environment also caused an increase in the search by the Russian venture market for better quality projects, reduced cost of design and sources, which eased the access to resources, including human. The analysis of the existing problems of the Russian venture capital market by the ecosystem approach has shown that its sustainable development will be achieved only in case of system interaction of all parties in the development of the entrepreneurial environment, congruent with the specific characteristics of the Russian economy. The article enumerates the prospects of development of the Russian Venture Market that are believed to be evident in the development of the mechanisms of the private and public partnerships and the system interaction of all the parties in the context of the transformation of the institutional environment that meets the needs of business of Russia. © 2016 CA and CC Press AB.
We consider the gas transport in organicrich shales, consisting of a nanoporous organic material, microporous inorganic matrix, and a system of secondary fractions. The proposed model incorporates free gas diffusion and filtration, as well as the effect of adsorption and diffusion of desorbed gas. We treat an organicrich shale matrix as a dual porosity system consisting of organic (kerogen) nanopores and inorganic micropores. An organic phase appears as small inclusions scatered in the inorganic phase. The contrast of the properties and spatial scales between the matrix and inclusions brings in a multiscale feature which is important for fluid storage and transport. The double porosity model is derived as a system of coupled parabolic equations; the interchange of the fluid between the matrix and the inclusions is taken into account. We apply a multiscale analysis to mass balance and constitutive equations. We derive a homogenized macroscopic problem for the distribution of an amount of free gas in an effective medium for the given initial and boundary conditions. The problem contains a source term that represents the flow of desorbed gas from kerogen into the inorganic material. The properties of the effective medium depend on the size and spatial distribution of the inclusions, as well as on properties of both inclusions and matrix. © 2016 by Begell House, Inc.
Nonlinear wave processes described by a fifthorder generalized KdV equation derived from the FermiPastaUlam (FPU) model are considered. It is shown that, in contrast to the KdV equation, which demonstrates the recurrence of initial states and explains the FPU paradox, the fifthorder equation fails to pass the Painlev, test, is not integrable, and does not exhibit the recurrence of the initial state. The results of this paper show that the FPU paradox occurs only at an initial stage of a numerical experiment, which is explained by the existence of KdV solitons only on a bounded initial time interval.
The paper presents mathematical model of spike activity of a neuronal culture which exhibits bursting behavior—synchronized spontaneous packs of population activity. Neuron in the developed neural network model is a modification of Leaky IntegrateandFire neuron. The neuron model acquires a new quality due to the introduction of two new neuron state variables—“resource” and “strength”. The new learning mechanism for synaptic weights is proposed. It assumes dependence of weight corrections from the intensity of spike activity of presynaptic neurons for a previous time interval. The model experiment shows the ability of the neural network based on the proposed model of neurons, to produce bursting activity. Setting of neuron model parameters makes it possible to obtain bursts with various characteristics. The results of model simulation are presented. The prospects for applying the model to study the mechanisms of learning in neuronal cultures in vitro are discussed. © Springer International Publishing Switzerland 2016.
The paper presents an analytical model to study the performance and availability of queueing systems with finite queue and two service phases. The first phase has the exponential distribution of service time, while the second one has the hyperexponential distribution. The analytical results obtained are verified using discreteevent simulation. A few numerical examples for varying the service rates and arrival rates are given. The results presented in the paper can be used for analysis of the intrusion detection and prevention systems (IDPS). © 2016 IEEE.
The paper deals with equations describing the unsteady axisymmetric laminar boundary layer on an extensive body of revolution as well as axisymmetric jet flows. Such equations are shown to reduce to a single nonlinear thirdorder PDE with variable coefficients. winftz/inf+winfz/infwinfxz/infwinfx/infwinfzz/inf=νzwinfzzz/inf+F(t,x),where w is a modified stream function. We describe a number of new generalized and functional separable solutions to this equation, which depend on two to four arbitrary functions of a single argument (a few solutions depend on an arbitrary function of two arguments). We use three methods to construct the exact solutions: (i) direct method for symmetry reductions, (ii) direct method of functional separation of variables (a special form of solutions with six undetermined functions is preset and particular solutions to an auxiliary ODE are used), and (iii) method of generalized separation of variables. Most of the solutions obtained are expressed in terms of elementary functions, provided that the arbitrary functions are also elementary. Such solutions, having relatively simple form and presenting significant arbitrariness, can be especially useful for testing numerical and approximate analytical methods for nonlinear hydrodynamictype PDEs and solving certain model problems. The direct method of functional separation of variables used in this paper can also be effective for constructing exact solutions to other nonlinear PDEs. © 2015 Elsevier B.V.
The paper studies unsteady NavierStokes equations with two space variables. It shows that the nonlinear fourthorder equation for the stream function with three independent variables admits functional separable solutions described by a system of three partial differential equations with two independent variables. The system is found to have a number of exact solutions, which generate new classes of exact solutions to the NavierStokes equations. All these solutions involve two or more arbitrary functions of a single argument as well as a few free parameters. Many of the solutions are expressed in terms of elementary functions, provided that the arbitrary functions are also elementary; such solutions, having relatively simple form and presenting significant arbitrariness, can be especially useful for solving certain model problems and testing numerical and approximate analytical hydrodynamic methods. The paper uses the obtained results to describe some model unsteady flows of viscous incompressible fluids, including flows through a strip with permeable walls, flows through a strip with extrusion at the boundaries, flows onto a shrinking plane, and others. Some blowup modes, which correspond to singular solutions, are discussed. © 2015 Elsevier Ltd. All rights reserved.
We analyze experimental thermophysical properties of liquid metals and alloy melts and show that the kinematic viscosity is essentially dependent on temperature, whereas the density, thermal conductivity, and specific heat capacity are only weakly dependent on temperature. Based on this fact, we formulate a mathematical model for nonisothermal laminar flows of liquid metals and melts with variable viscosity. We derive asymptotic equations of motion for low Prandtl numbers (liquid metals are characterized by Pr≃10sup2/sup<1) and different Reynolds numbers and obtain a number of exact and approximate analytical solutions expressible in elementary functions or representable in closed form. We look at a few specific fluid and thermodynamic problems and show that the dependence of viscosity on temperature significantly affects the drag coefficient in nonisothermal flows as compared to isothermal flows. We outline a few semiempirical approximations of ν(T) and show that the powerlaw formula ν=ν0(T0/T)k provides a very good accuracy for several liquid metals (including sodium and mercury). The asymptotic models, equations and formulas presented in the paper can be used to state and solve new nonisothermal hydrodynamic problems for liquid metal and melt flows. © 2016 Elsevier Ltd.
The paper deals with equations describing the unsteady axisymmetric boundary layer of powerlaw nonNewtonian fluids on a body of revolution. The axisymmetric boundarylayer equation for the stream function is shown to reduce to a single thirdorder PDE of the formwtz+wz wxzwx wzz=κrn+1(x)wzzn1wzzz+F(t,x),where n is a rheological parameter of the fluid; the function r(x), determining the shape of the body, is assumed arbitrary. For this nonlinear PDE, we describe onedimensional reductions as well as a number of new generalized and functional separable solutions, which depend on two to five arbitrary functions. The solutions are obtained with the direct method of functional separation of variables by using particular solutions to an auxiliary ODE and systems of firstorder PDEs. Many of the solutions are expressed in terms of elementary functions, which, together with significant arbitrariness, makes them especially useful for solving certain model problems and testing numerical and approximate analytical methods in fluid dynamics. Apart from powerlaw fluids, the paper looks at threeparameter polynomial and generalized Sisko models of nonNewtonian fluids. The unsteady plane boundarylayer equations for the general nonNewtonian fluid model are shown to admit a reduction to an ODE. The paper presents new exact solutions to the plane boundarylayer equations for powerlaw fluids as well as some other rheologically complex fluids. © 2016 Elsevier Ltd. All rights reserved.
The study deals with parametrically defined ordinary differential equations, practically unaddressed in the literature. It finds the general solutions for three classes of first and secondorder nonlinear ODEs of this kind. The solutions are further used to construct new exact solutions to the equations of an unsteady axisymmetric boundary layer with pressure gradient on a body of revolution of arbitrary shape. Also the paper suggests a short list of essential problems for nonlinear ODEs and PDEs defined parametrically that need to be addressed in the future. © 2015 Elsevier B.V. All rights reserved.
The paper discusses application of the algorithm based information processes modeling and Qmachine learning to the task of virtual machines auto configuration. Usage of virtual machines is one the most common solution nowadays for almost every companies. Although using of virtual machines simplifies settings of hardware landscape and allows physical servers decentralization they may cause performance decrease. To overcome this issue, we propose using method of virtual machines auto configuration. The method is based on the following premises: tracking real business process held by virtual machines, using algorithms of machine learning to investigate optimal configuration, and virtual machine configuration by independent process. (C) 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BYNCND license (http://creativecommons.org/licenses/byncnd/4.0/). Peerreview under responsibility of KES International
The aim of this work was to describe localization of active brain of different types of thinking—spatial and verbal. The method of functional magnetic resonance imaging (fMRI) was used. Seven righthanded healthy volunteers aged from 19 to 30 participated in the experiment. In the experiment, the subject was brought against 6 types of tasks (about 30 of each type) distributed from the figurative to the semantic thought. The results obtained in the statistical parametric and covariance analysis is that interactions of neural networks that are activated to perform the categorization of mental tasks are different. This makes it possible to use this approach to develop a model of “Cognovisor”. © Springer International Publishing Switzerland 2016.
Results of numerical and experimental studies of the characteristics of a directacting onoff valve with spherical cutoff element and permanent magnet are presented. A mathematical model of the flow of a compressible working medium (air) in the flowthrough segment of the valve is presented and numerical modeling with the use of the STARCCM+ CFD package is implemented. Results of the simulation are confirmed by experimental data. A technique of designing pneumatic systems that utilize valves with permanent magnet as the limiter of the maximal flow of the working medium is proposed. © 2015 Springer Science+Business Media New York
A twophase emission detector containing 5 kg of liquid Xe is installed at the horizontal experimental channel of the research nuclear reactor IRT MEPhI to measure the liquid Xe response to nuclei recoils with kinetic energies below 1 keV. Preliminary tests have demonstrated that ≥ 15 μs electron lifetime in liquid Xe and ~ 10 photoelectrons single ionization electron signal are achieved. These parameters are sufficient to detect and identify events at the single electron level.
The Compressed Baryonic Matter (CBM) experimental setup is currently being constructed at the Facility for Antiproton and Ion Research (FAIR) acceleration complex in GSI (Darmstadt, Germany) by an international collaboration that includes a team from JINR. One of the primary goals of this experiment is to study charmonium production in highenergy nuclear collisions. It is meant to track down decays such as J/ψ → μsup+/supμsup−/sup in the online mode. The present paper gives criteria for the effective selection of signal events by using exclusively data on charged muons collected in Muon Chamber (MUCH) coordinate stations. © 2015, Pleiades Publishing, Ltd.
To develop a plasma trap with levitating superconducting magnetic coils it is necessary to carry out the search of their stable levitating states. With this purpose, based upon the superconductor property to conserve the trapped magnetic flux, in the uniform gravitational field the analytical dependence of the potential energy of one or two superconducting rings, having trapped the given magnetic fluxes, in the field of the fixed ring with the constant current from the coordinates of the free rings and the deflection angle of their axes from the common axis of the magnetic system has been obtained in the thin ring approximation. Under magnetic fluxes of the same polarity in coils the existence of the found from the calculations equilibrium levitating states for the manufactured HTSC rings stable relative to the vertical shifts of levitating rings and to the deflection angle of their axes from the vertical has been confirmed experimentally.
The paper proposes traffic filtering based on the use of IPv6 header 'Flow Label' field. The 'label based' mechanism is implemented by access control system with a firewall checking 'labeled' IPpackets by cryptography verification. © 2015 IEEE.
The exponential growth in the number of data sources and data on the Internet leads to necessary selection of optimal searching engines for data collection that corresponds to user’s request. The task to create searching algorithms lies primarily in the decomposition of data types, selection of appropriate information sources and adjustment of searching engines (usage of specific syntax) for collection of large amounts of data from reliable sources. Since 2008 at the department “Analysis of competitive systems” NRNU MEPhI are held activities on setting up specific agentbased searching systems and creation of unique searching algorithms and techniques for analyzing the output technological developments related to advances in the area of scientific and technological sciences. In particular, the resource cluster was collected and thesauruses were compiled on such advanced scientific fields as “Plasma physics”, “Nanotechnology” and “Laser technology”.This article describes the algorithms, approaches and methods of data search retrieval from the Internet that are developing and testing at the department №65 “Analysis of competitive systems” NRNU MEPhI under the “multiagent information and analytical systems in the area of scientific and technology science” MIAS [1]. © 2005  2015 JATIT & LLS.
The paper suggests a solution to the problem of assessing response time (RT) in an operator controlling an important or dangerous system in the process of carrying out their duties. The approach is based on distance, no contact techniques of registering biological parameters and on a personal data base. The authors discuss possibilities and necessity of using direct and indirect methods' of measuring RT in different stages of working with personnel.
The author suggests an approach to solving the problem of distance monitoring of the current emotional state on the basis of contemporary acoustic technologies. The approach involves realization of the principles of spatial filtration with the help of noise clearing for ensuring reliable monitoring in a complicated acoustic environment. The author presents and analyzes results of experimental testing of the approach
Network technology is one of the most rapidly developing areas in computer science. Accordingly, the level of requirements to a specialist in this area is constantly increasing, which in turn requires more time for training specialists in this field. At the same time, basic university courses in this area tend to be rather static and often do not reflect the new technological and scientific advances in this field. Considering shortage of time resources, it requires new forms of training students that intensify the process of training in the networking and telecommunications. One way to implement this process might be through usage of MOOCplatforms that provide students with access to highquality educational content. This article describes an example of such approach in the practice of Russian higher education and its evaluation. © 2015 IEEE.
A twodimensional mathematical model is proposed for a polycrystalline specimen and an electron microscopy experiment with varying measurement parameters, such as the scanning step and the threshold disorientation angle. Experimental results are used to compare specimen texture characteristics and measurements: the grain size distribution, average grain size, variance; disorientation angle distribution, average disorientation angle, variance; and estimates of the orientation distribution function in threedimensional form in a oneparameter representation. All these distributions are tested by applying a chisquare homogeneity test. The most important aspects of the experiment are formulated as propositions.
The modern version (2015) of Simulation Environment of Virtual Electrophysics Labs, including the set of virtual laboratories for basic subsystems of charged particles accelerators research are presented in the article. There is way to provide safe realization of works with options, that require using of hard measures of accident (large electric power, supertension, different types of radiation and so on) and to prevent high expenses. The Simulation Environment can be used, both in educational and in preproject researches, and also for analysis and optimization of operating abilities. © 2015 IEEE.
The possibility of using thermoluminescent detectors for diagnosing plasmas is analyzed. The key characteristics of the thermoluminescent detectors, based on which a smallsized pulse Xray spectrometer was developed and constructed, are studied. The basic experimental results obtained in the investigation of the Xray spectra of plasma objects are presented.
A new way to improve spectral analysis of signals is discovered. Given method reduces the number of multiplications while calculating result, witch in many cases is very important. Especially it is important in realtime systems. © Research India Publications.
Influence of heat, electric field and particle irradiation of powders of boron and tungsten are presented and discussed in the paper. It is shown that the particles of both powders are emitted from their surface when electric field applied normally to the powder surface exceeds some minimal magnitude. Simultaneous influence of electric field and irradiation by hydrogen and argon plasma ions or by hydrogen atoms activates particle emission at the temperatures <1300. K. Hydrogen and argon plasma ion irradiation in the temperature range 13001800. K stimulates a succession of powder modifications with the increase of powder temperature and power of ion irradiation.Driving forces and processes of powder modifications were found to be electric field forces, irradiation enhanced diffusion, interatomic forces, surface tension, sputtering by ion irradiation and ion induced stresses in the newly formed uniform layers.
This paper is concerned with the figures of equilibrium of a selfgravitating ideal fluid with a stratified density and a steadystate velocity field. As in the classical formulation of the problem, it is assumed that the figures, or their layers, uniformly rotate about an axis fixed in space. It is shown that the ellipsoid of revolution (spheroid) with confocal stratification, in which each layer rotates with a constant angular velocity, is at equilibrium. Expressions are obtained for the gravitational potential, change in the angular velocity and pressure, and the conclusion is drawn that the angular velocity on the outer surface is the same as that of the corresponding Maclaurin spheroid. We note that the solution found generalizes a previously known solution for piecewise constant density distribution. For comparison, we also present a solution, due to Chaplygin, for a homothetic density stratification. We conclude by considering a homogeneous spheroid in the space of constant positive curvature. We show that in this case the spheroid cannot rotate as a rigid body, since the angular velocity distribution of fluid particles depends on the distance to the symmetry axis.
We develop the reducing multiplier theory for a special class of nonholonomic dynamical systems and show that the nonlinear Poisson brackets naturally obtained in the framework of this approach are all isomorphic to the LiePoisson e(3)bracket. As two model examples, we consider the Chaplygin ball problem on the plane and the Veselova system. In particular, we obtain an integrable gyrostatic generalisation of the Veselova system. © 2015 IOP Publishing Ltd & London Mathematical Society.
Annotation The article describes one of the approaches to solving the problem of silhouettes shape representation on digital images. The results of the research for developed contourbased method for representing silhouettes in the form of a sequence of parameterized primitives in terms of coverage of feature space. The results were studied by the methods of scientific visualization that made it possible to draw quick and visual conclusions about the behavior of the analyzed data and apply appropriate methods for solving the problems in the experiment. The developed method will be useful for solving practical problems of silhouettes shape representation in various areas of image processing.
A homogenization procedure was implemented to carry out a multiscale asymptotic analysis of Brinkman's filtration of fluid in rigid porous media. As a result we obtained averaged macroscopic equations with the components of the effective permeability tensor as effective coefficients. The derivation of the components of the effective permeability tensor was reduced to the solution of periodic boundary problems in a unit cell. In order to solve this problem we have developed an analyticalnumerical method based on approximation of the solution by the series of shape functions that exactly satisfied the interface conditions on the boundaries between different phases of flow. For some specific elements of a periodic pore structure, the shape functions can be obtained in a closed analytical form. This enables ones to monitor the accuracy of the cell problem solution. We have solved the cell problem in 1D and 3D formulations and provided a comparison of the effective permeability coefficients, computed analytically and numerically for both Brinkman's and Stokes' filtration for different cases of a microscopic pore structure. The results of the cell problem solution have been subsequently used in the integration of the averaged macroscopic equations for determining the distribution of fluid pressure and velocity. © 2015 by Begell House, Inc.
The onedimension RussoSmereka kinetic equation describing the propagation of nonlinear concentration waves in a rarefied bubbly fluid is considered. Stability of the bubbly flow in terms of hyperbolicity of the kinetic equation is studied. It is proved that a hydrodynamical chain associated with the RussoSmereka kinetic equation possesses infinitely many conservation laws. Reductions of the model to finite component systems are derived. Conservative form of the kinetic model is proposed and numerical solution of the Cauchy problem with discontinuous initial data is obtained. © 2015 Elsevier B.V. All rights reserved.
We study the problem of analyzing reliability characteristics of specialized computational devices with combined reservation taking into account fault types and temporal relations. We introduce a reliability criterion as the probability of functionally faultless operation. We propose new reliability models that take into account the distribution function of the time when the fault appears, the time when it is detected and so on. We find precision parameters for modeling results. © 2015, Pleiades Publishing, Ltd.
Different sectors of the economy have recently witnessed increased focus on innovative technologies in evaluating human capacity of an enterprise. The Principal Component Analysis exemplifies modern knowledgebased techniques used to assess quality of specialist training. The current challenge facing by the higher education institutions of the Russian Federation is preparing qualified and competitive in the global labor market personnel, through multidisciplinary education. This paper addresses the issue of occupational guidance at the Institute of Financial and Economic Security of the NRNU MEPhI with regard to relevant divisions of the Federal Financial Monitoring Service, by means of mathematical models. The object of the research is the system of specialist training in the area of financial monitoring. The research subject comprises methods, algorithms identifying contribution of educational disciplines to profilebased preparation of students in the sphere of financial monitoring. The goal of this study is to improve the quality of education in the field of financial monitoring by developing methods and algorithms that determine theoretical and practical contribution of subjects to specialist training. © 2015 ACM.
In last decade, classic ITinfrastructures in modern enterprises have been changed sufficiently by cloud computing. However, cloud approach can be used effectively in other applications. In this paper, we explore applicability of cloud paradigm in mobile robotics. First approach is using some classic cloud architectures, such as InfrastructureasaService, PlatformasaService and SoftwareasaService, with heterogeneous distributed mobile robotic system  for example, it can be used to offload a time consuming computations from mobile platforms to remote nodes or services. Second approach is using some special 'robotic' types of clouds, such as RobotasaService and FunctionasaService to leverage abilities of a single robotics platform in mobile robotic system as services to robotic system's users or other mobile robotic platforms. We explore both approaches and give them some architectural examples. © 2015 IEEE.
The aim of this study was to examine the role of a software tool in diagnosing student's thinking during problem solving in mathematics with 41 college students. Students were asked to select relevant steps, facts and strategies represented on the screen and connect them by arrows, indicating their plan of solution. Only after the diagram was completed, students were allowed to solve the problem. The findings are: (i) forward chaining is significantly more predominant, and backward chaining is significantly less frequent, compared to other possibilities or arrow entering. This result is unexpected, because classical planning methods produce backward chaining in this task. (ii) Students scoring in the middle are more likely to enter convergent pairs of arrows compared to students who scored low or high. This finding enables diagnosing student problem solving. Both findings imply constraints on selection of cognitive architectures used for modeling student problem solving.
We present an effective hydrodynamic theory of electronic transport in graphene in the interactiondominated regime. We derive the emergent hydrodynamic description from the microscopic Boltzmann kinetic equation taking into account dissipation due to Coulomb interaction and find the viscosity of Dirac fermions in graphene for arbitrary densities. The viscous terms have a dramatic effect on transport coefficients in clean samples at high temperatures. Within linear response, we show that viscosity manifests itself in the nonlocal conductivity as well as dispersion of hydrodynamic plasmons. Beyond linear response, we apply the derived nonlinear hydrodynamics to the problem of hotspot relaxation in graphene. © 2015 American Physical Society.
Over the last years a great number of bacterial genomes were sequenced. Now one of the most important challenges of computational genomics is the functional annotation of nucleic acid sequences. In this study we presented the computational method and the annotation system for predicting biological functions using phylogenetic profiles. The phylogenetic profile of a gene was created by way of searching for similarities between the nucleotide sequence of the gene and 1204 reference genomes, with further estimation of the statistical significance of found similarities. The profiles of the genes with known functions were used for prediction of possible functions and functional groups for the new genes. We conducted the functional annotation for genes from 104 bacterial genomes and compared the functions predicted by our system with the already known functions. For the genes that have already been annotated, the known function matched the function we predicted in 63% of the time, and in 86% of the time the known function was found within the top five predicted functions. Besides, our system increased the share of annotated genes by 19%. The developed system may be used as an alternative or complementary system to the current annotation systems.
Currently, there is a sharp worldwide increase in the volumes of the transmitted, stored, and processed information. Despite a certain share of superficiality, the term "information explosion" rather precisely describes the existing situation. According to the American research statistics, the volume of information created by the mankind by the year 2007 and stored on the artificial carriers amounted to 295 billion gigabytes (2.95×1020 bytes). These volumes determine the great importance of the "data compression" field of knowledge. The concept of "data compression" (DC) is very broad. Therefore, this article makes an attempt of the DC systematization (classification), which can facilitate the study of the problem as a whole as well as the choice of an appropriate method for solving a particular problem. The most known areas and specific examples of the DC application are concerned. © 2005  2015 JATIT & LLS. All rights reserved.
In the second part of work presents the general decomposition methods for systems of linear partial differential equations that arise in continuum mechanics, in particular, in the theory of elasticity and thermoelasticity and poroelasticity. A systematic approach to the decomposition of the equations of continuum mechanics is proposed. Asymmetrical and symmetrical decomposition methods for various classes of threedimensional linear (and model nonlinear) systems of equations arising in the theory of elasticity, thermoelasticity, and thermoviscoelasticity, the mechanics of viscous and viscoelastic incompressible and compressible barotropic gas are described. These methods are based on the decomposition of systems of coupled equations into several simpler independent equations and the use of two stream functions. It is shown that in the absence of body forces any solution of considered steady and unsteady threedimensional systems is expressed in terms of solutions of two independent equations. The methods of direct decomposition that do not require expansion of the right hand side of the equations into the components are proposed. A generalization of the considered methods to the decomposition of higher orders systems of equations, as well as to special classes of model nonlinear equations are obtained. The examples of the decomposition of specific systems are given. Formulas and split equations given in the work significantly simplify the qualitative study and the interpretation of the most important physical properties of a wide class of coupled systems of equations for continuum mechanics and allow studying their wave and dissipative properties. These results can be used for the exact integration of linear systems of mechanics, as well as for testing of numerical methods for nonlinear equations of continuum mechanics. © PNRPU.
A clustering problem for the coordinate detectors in the Compressed Baryonic Matter (CBM) experiment is discussed. Because of the high interaction rate and huge datasets to be dealt with, clustering algorithms are required to be fast and efficient and capable of processing events with high track multiplicity. At present there are two different approaches to the problem. In the first one each fired pad bears information about its charge, while in the second one a pad can or cannot be fired, thus rendering the separation of overlapping clusters a difficult task. To deal with the latter, two different clustering algorithms were developed, integrated into the CBMROOT software environment, and tested with various types of simulated events. Both of them are found to be highly efficient and accurate. © 2015, Pleiades Publishing, Ltd.
Control systems for wireless endoscopic capsules play a very important role as they help to stop the capsule in the exact part of patient's digestive system for more detailed examination. This paper deals with the draft design for magnet control system of the wireless endoscopic capsule. Calculations for two different crosssections of coil (square and rectangular) are presented. Analysis of copper wire and copper tube usage for control system is made. Previous developments differ from the present article about control system of endoscopic capsule, which is controlled by the external magnet field. An approach, presented in the article, helps to provide more accurate and quick magnet field change, while system fault tolerance increases.
The wireless capsule endoscopy is a method of noninvasive examination of gastrointestinal tract widely used for screening purposes. The review of images taken by capsule usually takes several hours and requires a high degree of concentration by a doctor. To reduce the time and enhance the accuracy of data reviewing the special software for image processing is being developed. It is able to recognize abnormalities of the digestive tract. The study provides the information about the proposed software architecture and its implementation, the function it is to perform, userfriendly report interface development and the proposal for the creation of the digestive diseases' atlas that will provide information useful for both the professional community of physicians and for the developers of software for detection of pathologies and their symptoms in the images of gastrointestinal tract. The study provides the results of the software testing showing 94% accuracy. The research is underway to increase the accuracy of the algorithm to diversify the pathologies that can be identified in the images obtained by the wireless endoscopic capsule and to implement the atlas of diseases. © Medwell Journals, 2015.
The number of mobile devices used daily all around the world is growing every day. Mobile devices have become “smart” and, thus, suffer intrusion attempts. Although different antivirus software is being developed, it does not provide overall security. That is why trusted operating systems appear. Trusted (or secure) operating systems for computers exist and are widely spread. However, there is none for mobile devices. This paper is devoted to the development of a trusted operating system for mobile devices. Authors highlight the differences in security issues of ordinary computers and mobile devices and discuss intruder models used in PC operating systems (OS) and in mobile OS. Generation and analysis of requirements to a secure mobile OS and secure mobile OS architecture are provided. Authors also tell about general scheme of the mobile device’s access to the Internet and provide suggestions to improve current security policy. © 2005  2015 JATIT & LLS. All rights reserved.
The problem of allocating and freeing operative memory in multiprogramming is relevant for all modern operating systems. The algorithms of almost all memory managers (allocators) used, claiming being universal, either lead to decreasing efficiency of memory usage, or require significant CPU time. This article describes the allocator algorithm proposed by the authors that makes it possible to achieve greater efficiency in using memory when blocks of the same size are allocated. An allocation testing method has been described, and the results of comparing the proposed allocator to a standard allocator of a UNIX system GNU C library have been described. © 20052015 JATIT & LLS. All rights reserved.
The object of the research is a modified Bloom filter with counters representing the probabilistic data structure that contains information about the items in a data store. As a result of filter operation falsenegative responses are excluded, however occurrence of falsepositives is possible. The system is developed in Java using jCuda libraries to parallelize the algorithm on GPGPU systems. The article presents the mathematical evaluation of the probability of falsepositives for the modified Bloom filter with counters. A statistical analysis has been made for runs with different parameters: number of hash functions, length of the counter, filter size, number of added elements. The article presents corresponding graphs of the probability distribution of falsepositives. © 2015 IEEE.
This paper observes different methods for network covert channels constructing and describes the scheme of the packet length covert channel. The countermeasure based on random traffic padding generating is proposed. The capacity of the investigated covert channel is estimated and the relation between parameter of covert channel and counteraction tool is examined. Practical recommendation for using the obtained results are given. © 2015, IEEE.
We designed the technique to estimate and limit the capacity of the covert channel based on traffic padding and random increase of packets lengths. It was applied to two types of packet size covert channels namely binary and multisymbol channels. The method to choose the parameter of counteraction tool is given, it takes into account an allowable value of covert channel capacity and error level. The investigation carried out is significant because such type of covert channels could be constructed even if traffic encryption is used. The novelty of the investigation undertaken is that the covert channel capacity is limited preliminary, whereas state of the art methods focus on detecting active IP covert channels. © 2015 by SCITEPRESS  Science and Technology Publications, Lda. All rights reserved.
Nowadays applications for big data are widely spread since IP networks connect milliards of different devices. On the other hand, there are numerous accidents of information leakage using IP covert channels worldwide. Covert channels based on packet size modification are resistant to traffic encryption, but there are some data transfer schemes that are difficult to detect. Investigation of the technique to limit the capacity of covert channels becomes topical as covert channels construction can violate big data security. The purpose of this work is to examine the capacity of a binary packet size covert channel when a traffic padding is generated. © 2015 IEEE.
This paper describes a packet length network covert channel and violators possibilities to build such a channel. Then the technique to estimate and limit the capacity of such channel is presented. The calculation is based on the information theory statements and helps to diminish the negative effects of covert channels in information systems, e.g. data leakage. © 2015 IEEE.
In this paper, we describe binary and multisymbol packet length covert channels. Then we design a technique to estimate and limit their capacity. The method to choose parameters of counteraction tools is given, it takes into account an allowable value of covert channel capacity and error level. The novelty of the investigation undertaken is that the covert channel capacity is limited preliminary, whereas state of the art methods focus on detecting active IP covert channels. © 2015 ACM.
The existing methods of data transmission via covert channels in IP networks and methods to counter them are analyzed and systematized. The focus is placed on direct and indirect covert channels resistant to many methods of detection and elimination. It has been concluded that the studies aimed at limiting the covert channel capacity without a significant reduction of the communication channel capacity are promising. © 2015, Allerton Press, Inc.
This article focuses on the ongoing challenge of countering the use of the Internet by terrorist and extremist organizations. The article considers, in particular, the methodology of the Web content monitoring that aims to address the above issue as well as the first results obtained during its approbation at the Chair of Financial Monitoring of the NRNU MEPHL The prospects for the utilization of the results are also provided. © 2015 ACM.
In this paper we investigate the dynamics of a body with a flat base (cylinder) sliding on a horizontal rough plane. For analysis we use two approaches. In one of the approaches using a friction machine we determine the dependence of friction force on the velocity of motion of cylinders. In the other approach using a highspeed camera for video filming and the method of presentation of trajectories on a phase plane for analysis of results, we investigate the qualitative and quantitative behavior of the motion of cylinders on a horizontal plane. We compare the results obtained with theoretical and experimental results found earlier. In addition, we give a systematic review of the wellknown experimental and theoretical results in this area. © 2015, Pleiades Publishing, Ltd.
This article considers the issues of engineering systems as a particular case of automated control systems information security from unauthorized access to the automation equipment. That includes intruders and threats classification. Next, on the basis of the obtained data, algorithms for the analysis of closed protocols in such systems are developed. Practical research of a typical engineering system protection was also described, for this purpose the data transfer protocol used by the system "Bolid C2000M" was studied. This work is a preliminary step for further development of the device protecting the system from an unauthorized access.
Friction tests of samples of NiCr/FeCr + TiC, NiCr/FeCr + CaF2/graphite + TiC coatings produced on impacts of highly concentrated energy flow pulses on plastering the SHS reagents are carried out. The wearresistant and antifriction properties of samples in conditions of friction with boundary lubrication are studied. © 2015 by Begell House, Inc.
Over the last years a great number of bacterial genomes were sequenced. Now one of the most important challenges of computational genomics is the functional annotation of nucleic acid sequences. In this study we presented the computational method and the annotation system for predicting biological functions using phylogenetic profiles. The phylogenetic profile of a gene was created by way of searching for similarities between the nucleotide sequence of the gene and 1204 reference genomes, with further estimation of the statistical significance of found similarities. The profiles of the genes with known functions were used for prediction of possible functions and functional groups for the new genes. We conducted the functional annotation for genes from 104 bacterial genomes and compared the functions predicted by our system with the already known functions. For the genes that have already been annotated, the known function matched the function we predicted in 63% of the time, and in 86% of the time the known function was found within the top five predicted functions. Besides, our system increased the share of annotated genes by 19%. The developed system may be used as an alternative or complementary system to the current annotation systems. © 2015 Mikhail A. Golyshev and Eugene V. Korotkov.
A study was made of the processes involved in the nucleation and propagation of ChernovLuders bands in low carbon steels. It is found that the deformation bands are nucleated in the deforming sample at stress levels that are significantly lower relative to the upper yield limit. A sharp yield point is found to occur on the deformation curve, with its ascending and descending branches corresponding to the band nucleus "ingrowth". Following the sharp yield point, a mobile ChernovLuders band proper is observed for the yield plateau. The rate of deformation band fronts has been determined for both the band "ingrowth" and the band propagation stage. The occurrence of mobile band front(s) is considered. Thus, the conventional assumption that the deformation front is a boundary separating deformed and nondeformed material regions represents facts only approximately.
Dynamics of laser with timevariable delayed feedback is analyzed in the neighborhood of the equilibrium. For the system, averaged over a rapidly variable, we obtain parameters at which the stationary state is stable. Stabilization of the stationary state due to modulation of the delay can be successful (unsuccessful) in domains adjacent to super (sub) critical Hopf bifurcation boundaries. In a vicinity of the bifurcation points, stable and unstable periodic solutions are asymptotically described in dependence on the modulation frequency.
Modeling porous flow in complex media is a challenging problem. Not only is the problem inherently multiscale but, due to high contrast in permeability values, flow velocities may differ greatly throughout the medium. To avoid complicated interface conditions, the Brinkman model is often used for such flows [O. Iliev, R. Lazarov, and J. Willems, Multiscale Model. Simul., 9 (2011), pp. 13501372]. Instead of permeability variations and contrast being contained in the geometric media structure, this information is contained in a highly varying and highcontrast coefficient. In this work, we present two main contributions. First, we develop a novel homogenization procedure for the highcontrast Brinkman equations by constructing correctors and carefully estimating the residuals. Understanding the relationship between scales and contrast values is critical to obtaining useful estimates. Therefore, standard convergencebased homogenization techniques [G. A. Chechkin, A. L. Piatniski, and A. S. Shamev, Homogenization: Methods and Applications, Transl. Math. Monogr. 234, American Mathematical Society, Providence, RI, 2007, G. Allaire, SIAM J. Math. Anal., 23 (1992), pp. 14821518], although a powerful tool, are not applicable here. Our second point is that the Brinkman equations, in certain scaling regimes, are invariant under homogenization. Unlike in the case of StokestoDarcy homogenization [D. Brown, P. Popov, and Y. Efendiev, GEM Int. J. Geomath., 2 (2011), pp. 281305, E. MarusicPaloka and A. Mikelic, Boll. Un. Mat. Ital. A (7), 10 (1996), pp. 661671], the results presented here under certain velocity regimes yield a BrinkmantoBrinkman upscaling that allows using a single software platform to compute on both microscales and macroscales. In this paper, we discuss the homogenized Brinkman equations. We derive auxiliary cell problems to build correctors and calculate effective coefficients for certain velocity regimes. Due to the boundary effects, we construct a boundary correction for the correctors similar to [O. A. Oleinik, G. A. Iosif'yan, and A. S. Shamaev, Mathematical Problems in Elasticity and Homogenization, Elsevier, Amsterdam, 1992]. Using residuals, we estimate for both porescales, epsilon, and contrast values, delta, to obtain our corrector estimates. We then implement the homogenization procedure numerically on two media, the first being Stokes flow in fractures with Darcylike inclusions and the second being Darcylike flow with Stokesian vuggs. In these examples, we observe our theoretical convergence rates for both porescales and contrast values.
We develop a hydrodynamic description of transport properties in graphenebased systems, which we derive from the quantum kinetic equation. In the interactiondominated regime, the collinear scattering singularity in the collision integral leads to fast unidirectional thermalization and allows us to describe the system in terms of three macroscopic currents carrying electric charge, energy, and quasiparticle imbalance. Within this "threemode" approximation, we evaluate transport coefficients in monolayer graphene as well as in doublelayer graphenebased structures. The resulting classical magnetoresistance is strongly sensitive to the interplay between the sample geometry and leading relaxation processes. In small, mesoscopic samples, the macroscopic currents are inhomogeneous, which leads to a linear magnetoresistance in classically strong fields. Applying our theory to doublelayer graphenebased systems, we provide a microscopic foundation for a phenomenological description of giant magnetodrag at charge neutrality and find the magnetodrag and Hall drag in doped graphene.
The article outlines a methodological approach, core specifics and capabilities of radiation identification of microelectronic devices at a specified exposure to ionizing radiation. © 2015 IEEE.
In this article, we examine the possibility of applying the method of flicker noise spectroscopy to identification of anomalies in flux of cosmic rays (CR). Typically, such anomalies appears after intense solar outbursts, when the Sun emits into space giant blobs of plasma also called coronal mass ejection (CME). Identification of such anomalies in the CR flux allows us to detect CME, approaching to Earth. CMEs, powerful enough, can cause significant damage to electrical appliances. The present paper describes basic concepts of the flicker noise spectroscopy and principles of cosmic rays data processing algorithms. © 2015 The Authors.
The paper presents derivation of equation for the mathematical expectation of neutron flux distribution in a nuclear reactor and describes the iterative algorithm for solving the equation. The convergence criterion of the iterative process is defined. Some results of numerical evaluations are presented to illustrate main ideas of the paper. © Research India Publications.
Paper deals with the problem of insider threat visualization. An insider threat classification is adduced, method of visualization of insider threats using system dynamics modeling is considered and forecasting behavioral models for threats of theft of intellectual property for business advantages alone and with accomplices are developed. © 2015, National Research Nuclear University. All rights reserved.
The Future Internet and the Internet of Things (IoT) and clouds as its integral parts need a specialized theory for their information protection from different threats and intruders. The history and main results of research aimed at creating a scientific and methodological foundation of the Information Security Theory in Russia are examined. The discussion considers the formulation of the informal systems theory and approaches for creating the simulation models of information security (IS) maintenance (ISM) processes in conditions of incomplete and insufficiently reliable input data. The structure of a unified IS concept is proposed. Theoretical problems of designing an integrated information protection system's functioning, including IS assessment methodology, methodology of defining requirements to ISM and methodology of creating information protection systems (IPSs) are described. Finally, the results of the IS theory development are summarized and areas of further research are outlined. © 2015 IEEE
The article covers the experience of current information technologies usage during the assessment of talent pool for key positions in Rosatom. In order to visualize experiments results a special program application "Reserv" was created, capable of processing and presenting results of Assessment center, which was taken as a methodology of evaluation, in a convenient for analysis way.
One of the main goals in the Compressed Baryonic Matter (CBM) experiment (GSI, Germany) is to find parameters of charged particle trajectories. An online full event reconstruction is planned to be carried out in this experiment, thus demanding fast algorithms be developed, which make the most of the capabilities of modern CPU and GPU architectures. This paper presents the results of an analysis of the Kalman filterbased track reconstruction for charged particles implemented by using various code parallelization methods. A multicore server located at the Laboratory of Information Technologies, Joint Institute for Nuclear Research (LIT JINR), with two CPU Intel Xeon X5660 processors and a GPU Nvidia GTX 480 video card is used. © 2015, Pleiades Publishing, Ltd.
This paper considers the behavior of solutions from the neighborhood of an equilibrium state of nonlinear twocomponent parabolic problems with diffusion matrixes of one or two eigenvalues to zero. It has been shown that problems related to stability have infinite dimension. Reported here is the development of an algorithm that constructs universal families of nonlinear boundaryvalue problems which do not contain small parameters and whose nonlocal dynamics describes local dynamics of original boundaryvalue problems. In addition, an exhaustive set of universal systems for twocomponent parabolic equations is presented. It is concluded that a hyper multistability phenomenon is one characteristic of these systems. © 2015 World Scientific Publishing Company.
A new asymptotic method for investigating complex relaxation oscillations in a system with delay is offered. By applying it, we can reduce the problem of predator–prey system dynamics to that of onedimensional maps analysis. Some conclusions of a biological nature based on asymptotic analysis are made. © 2015, Allerton Press, Inc.
The dynamics of a system of two logistic delay equations with spatially distributed coupling is studied. The coupling coefficient is assumed to be sufficiently large. Special nonlinear systems of parabolic equations are constructed such that the behavior of their solutions is determined in the first approximation by the dynamical properties of the original system. © 2015, Pleiades Publishing, Ltd.
The behavior of solutions to first and secondorder differential equations with a large statedependent delay is analyzed in a neighborhood of equilibrium. In critical cases, it is shown that their behavior is determined by the global dynamics of a nonlinear parabolic equation with periodic or antiperiodic boundary conditions, which is known as a quasinormal form. Asymptotic formulas are presented that relate the solutions of the quasinormal form and the original equation. © 2015, Pleiades Publishing, Ltd.
The logistic equation supplemented with a summand characterizing delay is considered. The local and nonlocal dynamics of this equation are studied. For equations with delay, we use the standard Andronov—Hopf bifurcation methods and the asymptotic method developed by the author and based on the construction of special evolution equations defining the local dynamics of the equations containing delay. In addition, we study the existence and methods of constructing the asymptotics of nonlocal relaxation cycles. A comparison of the results obtained with those for the Hutchinson equation and some of its generalizations is given. © 2015, Pleiades Publishing, Ltd.
This article presents the results of research for the expert and methodical center of assessment and certification of qualifications of specialists in the nuclear industry established on the basis of the National Nuclear Innovation Consortium. A series of new professional standards for the nuclear industry has shown that the value of social and personal competence is increasing. The objectives of the study were to identify latent personality factors that have a significant impact on the performance of various types of management activities and to create a model for assessing the sociopersonal competence of IT specialists and managers of the nuclear industry. To solve the problem of classification various methods of the cluster analysis were used. The study was performed in 2014 on students of NRNU MEPhI. Cluster analysis in the set of attributes taking into account both individual personality traits and achievements allowed forming five independent classes. For each of the five classes we derived a model of assessment of the level of development of social and personal competence. (C) 2015 The Authors. Published by Elsevier Ltd.
The article is devoted to problems of webservices composition based on semantic descriptions in terms of OWLS. Mathematical model of processes is represented and the task of webservices composition is given. Several types of webservices compositions are reviewed and their settheoretical model is presented. The article contains the example of webservices composition in case of searching weather conditions at the point of aircraft arrival, which includes sequential and conditional types of composition.
This paper is devoted to semantic description of the system that functions in a cloud runtime (like app store) providing business services available on demand (hereinafter, system). Business services are in fact information proceeding units that accept the given parameters and return business data. The described system ensures automatic collaboration between services and grants access to processing resources defined in the business process logic. We describe a business model that allows its users to find solutions of their tasks using published services or their collaborations.
A mathematical method has been developed in order to search for latent periodicity in protein aminoacid and other symbolical sequences using dynamic programming and random matrices. The method allows the detection of the latent periodicity with insertions and deletions at positions that are unknown beforehand. The developed method has been applied to search for the periodicity in the aminoacid sequences of several proteins and in the euro/dollar exchange rate since 2001. The presence of a long period with insertions and deletions in aminoacid sequences is shown. The period length of seven amino acids is observed in the proteins that contain supercoiled regions (a coiledcoil structure) as well as of six, five, or more amino acids. The existence of the period length of 6 and 7 days, as well as 24 and 25 h in the analyzed financial time series is observed; note that this periodicity is detectable only for insertions and deletions. The causes that underlie the occurrence of the latent periodicity with insertions and deletions in aminoacid sequences and financial time series are discussed. © 2015, Pleiades Publishing, Inc.
The basic types of motors (technological drive systems) are graded by their specific power, efficiency, initial cost, speed performance, reliability, precision, protection against fire and explosion, serviceability, thermal behavior, environmental impact, controllability, and ease of interface with a digital control system. A systematic procedure for choosing the rational parameters of a drive system with electric, hydraulic, and pneumatic motors is discussed. © Allerton Press, Inc., 2015.
The problem of optimizing power inputs and dimensions of a power unit of an automated actuator solved before the formation of a control unit is discussed. The solution is based on the introduction of certain conditional behavioristic laws of the actuator, which reflect the main requirements to its dynamics rather completely. Powerunit parameters are selected with the help of criterion ratios found based on the normalized dynamic actuator model. The synthesis process is illustrated by examples of the position and follower actuators.
In the present work forecasting future sales of a company involved in uranium enrichment is considered a problem of allocating company's produce to global regional markets. Based on this concept optimization problem of company's effective portfolio is formulated and solved. Relative total company share in the world is defined by the balance parity between probability distributions of global demand for enriched uranium and enriched uranium manufacture at competitive enterprises. Effective portfolios of company shares in the world regional markets take into account risk and uncertainty and are calculated from probability distribution of company's relative world share, regional market quotas and restrictions, market risk measures and expected market efficiencies. Incorporating fuzzy and probability approaches to portfolio selection allows for accurate market information employment and exhaustive analysis of company potential and market opportunities. © 2015 A. V. Kryanev, R. B. Balashov and D. E. Sliva.
The LotkaVolterra competition system with diffusion is considered. The Painleve property of this system is investigated. Exact traveling wave solutions of the LotkaVolterra competition system are found. Periodic solutions expressed in terms of the Weierstrass elliptic function are also given.
Recently, an asymptotic solution of the Rayleigh equation for an empty bubble in N dimensions has been obtained. Here we give the closedform general analytical solution of this equation. We also find the general solution of the Rayleigh equation in N dimensions for the case of a gasfilled hyperspherical bubble. In addition, we include a surface tension into consideration.
The Lorenz system is considered. The Painlevé test for the thirdorder equation corresponding to the Lorenz model at σ ≠ 0 is presented. The integrable cases of the Lorenz system and the first integrals for the Lorenz system are discussed. The main result of the work is the classification of the elliptic solutions expressed via the Weierstrass function. It is shown that most of the elliptic solutions are degenerated and expressed via the trigonometric functions. However, two solutions of the Lorenz system can be expressed via the elliptic functions. © 2015, Pleiades Publishing, Ltd.
The features of dissipative structure formation, which is described by the periodic boundary value problem for the Kuramoto–Sivashinsky equation, are investigated. A numerical algorithm based on the pseudospectral method is presented. The efficiency and accuracy of the proposed numerical method are proved using the exact solution of the equation under study. Using the proposed method, the process of dissipative structure formation, which is described by the Kuramoto–Sivashinsky equation, is studied. The quantitative and qualitative characteristics of this process are described. It is shown that there is a value of the control parameter for which the dissipative structure formation processes occur. Via cyclic convolution, the average value of the control parameter is found. In addition, the dependence of the amplitude of the formed structures on the value of the control parameter is analyzed. © 2015, Allerton Press, Inc.
Abstract We consider a system of equations for the description of nonlinear waves in a liquid with gas bubbles. Taking into account high order terms with respect to a small parameter, we derive a new nonlinear partial differential equation for the description of density perturbations of mixture in the twodimensional case. We investigate integrability of this equation using the Painlevé approach. We show that traveling wave reduction of the equation is integrable under some conditions on parameters. Some exact solutions of the equation derived are constructed. We also perform numerical investigation of the nonlinear waves described by the derived equation. © 2015 Elsevier Inc.
Nonlinear partial differential equation for description of a laminar, incompressible, Newtonian radial flow in halfsubspace is derived taking into account free slipping at a border. The boundary layer approximation is used and the equation with one free parameter for a steam function is obtained. The general solution for one value of this parameter is found and analysed. Some approximate solutions of the special form are constructed. © 2015 Elsevier Ltd. All rights reserved.
The logistic function is shown to be solution of the Riccati equation, some secondorder nonlinear ordinary differential equations and many thirdorder nonlinear ordinary differential equations. The list of the differential equations having solution in the form of the logistic function is presented. The simple method of finding exact solutions of nonlinear partial differential equations (PDEs) is introduced. The essence of the method is based on comparison of nonlinear differential equations obtained from PDEs with standard differential equations having solution in the form of the logistic function. The wide application of the logistic function for finding exact solutions of nonlinear differential equations is demonstrated. © 2015 Elsevier Inc.
Abstract Numerical computation of the three dimensional problem of the freezing interface propagation during the cryosurgical impact coupled with the multiobjective optimization mechanism is used in order to improve the efficiency and safety of the cryosurgery operations performing. The heat transfer in soft tissue during the thermal exposure to low temperature is described by the Pennes bioheat model. The finite volume method combined with the control volume approximation of the heat fluxes is applied for the cryosurgery numerical modeling on the tumor tissue of a quite arbitrary shape. The flux relaxation approach is used for the stability improvement of the explicit finite difference schemes. The generalized method of effective traversals is proposed for the searching of the Pareto front segments as the multiobjective optimization problem solutions. © 2015 Elsevier B.V.
Numerical simulation and optimization of cryosurgeries are considered. The Stefan problem that describes thermal processes running in the course of surgery is solved numerically. The finite volume method and enthalpy approach are used. The problem of optimization of the probe positions is solved to improve the surgery efficiency. The optimization problem is solved using nonparametric multiple criteria optimization techniques. © 2015, Pleiades Publishing, Ltd.
We consider a nonlinear ordinary differential equation having solutions with various movable pole order on the complex plane. We show that the pole order of exact solution is determined by values of parameters of the equation. Exact solutions in the form of the solitary waves for the second order nonlinear differential equation are found taking into account the method of the logistic function. Exact solutions of differential equations are discussed and analyzed.
The generalized KuramotoSivashinsky equation is considered. The Painlevé test is applied for studying this equation. It is shown that the generalized KuramotoSivashinsky equation does not pass the Painlevé test but has the expansion of the general solution in the Laurent series. As consequence the equation can have some exact solutions at additional conditions on the parameters of equation. Solitary wave and elliptic solutions of the generalized KuramotoSivashinsky equation are found by means of expansion for solution in the Laurent series. It is shown that solutions obtained describe some structures in the medium with the dissipation and instability. © 2015 Elsevier Ltd.
The fourthorder equation for description of nonlinear waves is considered. A few variants of this equation are studied. Painlevé test is applied to investigate integrability of these equations. We show that all these equations are not integrable, but some exact solutions of these equations exist. Analytic solutions in closedform of the equations are found. © 2015 Elsevier B.V.
We consider the Kortewegde Vries equation with a source. The source depends on the solution as polynomials with constant coefficients. Using the Painleve test we show that the generalized Kortewegde Vries equation is not integrable by the inverse scattering transform. However there are some exact solutions of the generalized Kortewegde Vries equation for two forms of the source. We present these exact solutions.
We study the perturbed BurgersKortewegde Vries equation. This equation can be used for the description of nonlinear waves in a liquid with gas bubbles and for the description of nonlinear waves on a fluid layer flowing down an inclined plane. We investigate the integrability of this equation using the Painlevé approach. We show that the perturbed BurgersKortewegde Vries equation does not belong to the class of integrable equations. Classical and nonclassical symmetries admitted by this equation and corresponding symmetry reductions are constructed. New types of periodic analytical structures described by the BurgersKortewegde Vries equation are found.
We study a generalization of the Kortewegde Vries equation obtained from the FermiPastaUlam problem. We get the fifthorder nonlinear evolution equation for description of perturbations in the mass chain. Using the Painlevé test, we analyze this equation and show that it does not pass the Painlevé test in the general case. However, the necessary condition for existence of the meromorphic solution is carried out and some exact solutions can be found. We present a new approach to look for traveling wave solutions of the generalization of the Kortewegde Vries equation. Solitary wave and elliptic solutions of the equation are found and discussed, compared to the Kortewegde Vries soliton. © 2015 Elsevier B.V.
We study the selforganization process of adiabatic shear bands in OFHC copper and HY100 steel taking into account strain hardening factor. Starting from mathematical model we present a new numerical approach, which is based on CourantIsaacsonRees scheme, that allows one to simulate fully localized plastic flow. To prove the accuracy and efficiency of the following method we give solutions of two benchmark problems. Next we apply the proposed method to investigate such quantitative characteristics of selforganization process of ASB as average stress, temperature, localization time and distance between ASB. Then we compare the obtained results with theoretical predictions by other authors.
Purpose  The purpose of this paper is to investigate the influence of ionflow parameters on surface topography and making numerical simulation at the times when the process of surface erosion becomes strongly nonlinear. Design/methodology/approach  The base of the mathematical model of target ionsputtering is nonlinear evolutionary equation in which the erosion velocity dependence on ion flux is evaluated by means of a Monte Carlo method. The difference between this equation and the one of continuum theory is that the ion flux is not smooth function. Instead, it is a set of separate incident ions. Findings  Some simulations with using independent random points of arrival for the incident ions leads to results uncorrelated with the continuum model at early times. The ripples are not quite developed or observed. This phenomenon is explained by random fluctuations of the target sputtering depth. Sufficiently big values of the random fluctuations destroy the ripple structure on target surface. The simulation with using equally distributed sequence (Holton sequence) of points of arrival for the incident ions leads to results well correlated with the continuum model. Originality/value  The discrete model which goes into the equation of continuum theory within the appropriate asymptotic limit has been proposed. The discretization parameters influence on surface morphology formation has been studied. This paper may be interesting to researchers making the theoretical and numerical analysis of pattern formation on plane target surfaces undergoing ionbeam sputtering. © Emerald Group Publishing Limited.
The quadratic Lienard equation is widely used in many applications. A connection between this equation and a linear secondorder differential equation has been discussed. Here we show that the whole family of quadratic Lienard equations can be transformed into an equation for the elliptic functions. We demonstrate that this connection can be useful for finding explicit forms of general solutions of the quadratic Lienard equation. We provide several examples of application of our approach.
Annotation Knapsack packing vector testing procedures for the parallel exhaustive search algorithm have been analyzed. Graphs of computational complexity to test a single knapsack vector have been obtained via experiment for different values of knapsack element sizes. Diagrams of load balancing have been obtained and analyzed for the case when lexicographic sequence is split into equallength segments.
Fluctuations in financial flows of small manufacturing enterprises often have a certain periodicity, which is associated with the specific production of a particular type of product. The need to take into account this fact determines whether a company has enough competent staff to make informed decisions about the goods production policy. In this regard, the promising areas for financial analysts within such enterprises are the processes of forecasting and decisionmaking. This article describes the existing prediction algorithms, suitable for use on a consolidated source of data. Particular attention is paid to the methods of decisionmaking, allowing for the existing knowledge of experts to form the solutions, based solely on the logic component. According to the considered methods agreed on the desirability of the use of joint forecasting techniques and methods of decisionmaking to optimise financial performance of a particular company as well as a group of companies close to it in terms of key financial and economic indicators. © 2005  2015 JATIT & LLS. All rights reserved.
The work is devoted to the development of decomposition methods for systems of linear partial differential equations that arise in continuum mechanics, in particular, in the theory of elasticity and thermoelasticity and poroelasticity. These methods are based on the decomposition (splitting) of systems of coupled equations into several independent equations. The decomposition significantly simplifies the qualitative study and interpretation of the most important physical properties related to threedimensional equations and allows an effective study of their wave and dissipative properties. Moreover in certain cases the decomposition makes it possible to find exact analytical solutions of the corresponding boundary and initialboundary value problems, and greatly simplifies the application of numerical methods, allowing us to use the appropriate routines for simpler equations and independent subsystems. In the first part of the work various systems of equations, including equations of elasticity theory in the form of Tedone and in the form of BeltramiDonatiMichell are given, their dynamic generalizations are proposed, and various forms of the equations of classical and hyperbolic thermoelasticity as well as the equations poroelasticity are described. A number of historical facts, which are directly related with the considered questions and weakly reflected in Russian literature, are presented. Various types of decomposition and their generalizations are described. The representation of solutions of dynamical systems of equations resulting from the toroidalpoloidal decomposition, as well as the decompositions of GreenLamé, CauchyKovalevskiSomigliana, NaghdiHsuChandrasekharaiah, and Teodorescu types are discussed in details. Special attention is given to their static analogues. A generalization of the representation of Savin for the dynamic equations of elasticity is obtained. The representations in curvilinear coordinates, in particular, the representations of Boussinesq, Timpe, Love, Michell, and Muki types are given. The bibliographical references to the original papers are listed. © PNRPU.
Twocomponent systems with equal concentrations of electrons and holes exhibit nonsaturating, linear magnetoresistance in classically strong magnetic fields. The effect is predicted to occur in finitesize samples at charge neutrality due to recombination. The phenomenon originates in the excess quasiparticle density developing near the edges of the sample due to the compensated Hall effect. The size of the boundary region is of the order of the electronhole recombination length that is inversely proportional to the magnetic field. In narrow samples and at strong enough magnetic fields, the boundary region dominates over the bulk leading to linear magnetoresistance. Our results are relevant for twoand threedimensional semimetals and narrow band semiconductors including most of the topological insulators.
The Majorana representation of spin operators allows for efficient fieldtheoretical description of spinspin correlation functions. Any Npoint spin correlation function is equivalent to a 2. Npoint correlator of Majorana fermions. For a certain class of Npoint spin correlation functions (including "auto" and "pairwise" correlations) a further simplification is possible, as they can be reduced to Npoint Majorana correlators. As a specific example we study the BoseKondo model. We develop a pathintegral technique and obtain the spin relaxation rate from a saddle point solution of the theory. Furthermore, we show for the Ohmic case that fluctuations around the saddle point do not affect the correlation functions as long as the latter involve only a single spin projection. For illustration we calculate the 4point spin correlation function corresponding to the noise of susceptibility. © 2015 Elsevier Inc.
This is a reply to the comment by V F Zhuravlev (see Usp. Fiz. Nauk 185 1337 (2015) [Phys. Usp. 58 1218 (2015)]) on the inadequacy of the nonholonomic model when applied to the rolling of rigid bodies. The model of nonholonomic mechanics is discussed. Using recent results as examples, it is shown that the validity and potential of the nonholonomic model are not inferior to those of other dynamics and friction models. © 2015 Uspekhi Fizicheskikh Nauk, Russian Academy of Sciences.
The issue of mobile devices’ security is now of great interest as they store and process data more valuable for users than the data stored and processed on personal computers. This paper deals with the development of models of a threat of unauthorized access to confidential information of subscribers to cellular networks, namely: mathematical model of the brute force attack, mathematical model of attacks using software exploits, mathematical model of an attack using additional equipment for its implementation, and mathematical model of attacks using instrument bugs and malicious logic. The article also discloses approaches to the protection of confidential information in cellular communication networks. The implementation of mathematical models discussed in the paper will significantly enhance the information security of mobile devices. © 20052015 JATIT & LLS. All rights reserved.
Searching for pseudorandom data is an important stage during forensic analysis. Existing approaches are based on verifying statistical properties of file contents by means of test suites for estimation of pseudorandom sequences. Some approaches are not adapted for work with file system and are time/resource consuming. The others have significant type I or II errors. That is why authors have conducted a research in this field and suggest an approach to estimate statistical properties of file contents by means of their visual representation. The approach was used for development of program for searching pseudorandom data. Its testing shows that type I error is reduced to zero and type II error for popular file formats is less than 1%.
During forensic expertise the searching for random data is an important step. Existing approaches are based on verification of statistical properties of file data by means of test suites that estimate properties of random sequences. Some tests are not adapted to file system and are resource and time consuming, others have significant type I and II error. That is why authors have conducted a research in this field and suggest a new approach to assess statistical properties of data contents by visualisation of it. This approach was used to develop a program which testing shows that type I error in searching for random data is reduced to zero and type II errors for widely spread file formats is less than 1%.
The peculiarities of assessing the level of professional competency formation in information security (IS) are discussed. The approach described uses the levels of mastering of specific disciplines forming this competency. Professional competencies in the field of information security and their levels are defined. The paper explains how these competencies can be formed. Metrics for the level of mastery of the discipline are introduced. The competencies level assessment model is proposed. The model application to the “Business Continuity and Information Security Maintenance” program for Masters at the NRNU MEPhI is shown. Important notes on using the model are given in conclusion. © IFIP International Federation for Information Processing 2015.
ELearning portal (EP) developers are facing many security issues to make it a trusted tool for eLearning. The paper discusses EP usage in blended learning of Masters on the "Business continuity and information security maintenance" (BC&ISM) at the NRNU MEPhI. The motivation of security implementation expedience for EP including a brief overview of typical attacks against EP is given. BC&ISM EP's structure as a protection object is discussed. The key security requirements and functional security subsystem components of a secure BC&ISM EP being able to protect it against the main possible attacks are described. © 2015 ACM.
We consider the problem of data clustering in complex conditions: distributions of features within clusters differ significantly; the available data sample contains invalid examples; feature set may be incomplete for an unambiguous separation of clusters. We advance the previously proposed SVcriterion and offer its generalization for correlated features. A genetic algorithm using the proposed criterion is developed. The algorithm is tested on simulated data. Research has shown the possibility of determining the true number of clusters in the data set. © Allerton Press, Inc.
Development of an algorithm for event detection in eye movement trajectory when viewing pictures remains the goal of research by many specialists. The challenge is to develop an algorithm that depends weakly on the user settings and adjusts automatically to the data recorded by the eyetracker. We propose a new principle of eye movement data processing, which uses a twostage spacetime aggregation of gaze points in the coordinate space and velocity space. This approach results in the construction of microevents from which the target events are formed during the further aggregation procedures. All steps of the algorithm are explained in detail and illustrated by examples.
The article presents analysis and modification of Wu's algorithm for automated visualization systems, in respect to overlaying graphic objects of different formats. Comparative analysis of the rasterization speed and quality of the standard and modified Wu's algorithms as well as recommendations on the use of the algorithms for various map scales are also provided. © 2015, National Research Nuclear University. All rights reserved.
In the paper kinematics of the independent 5rod car suspension mechanism is analyzed to calculate camber and toe angles, lateral and longitudinal displacements that affect the performance of the whole vehicle guiding mechanism. The problem is solved numerically by multidimensional Newton method with regularization. The proposed regularization parameter provides acceptable problem conditioning and proximity to the original problem. © Springer International Publishing Switzerland 2015.
The computer model of planning the rather complex behavior by New Caledonian crows is developed and investigated. The model characterizes the following processes: 1) analysis of predictions of elementary actions, 2) generation of a simple knowledge database that describes the set of initial situations, actions, and results of actions, 3) planning a concrete chain of consecutive actions. The model is inspired by the biological experiment on New Caledonian crows.
The article describes remote laboratory practical work based on studying specialised languages. The method of developing a specialised language, the results of its implementation in the training support complex, the architecture of that complex and the changes introduced to the method after undergoing such a practical check were described. Individualisation of the learning environment is achieved by using a family of languages with different syntax, which allows for the individualisation of the environment for a specific user, or for the provision of each student with his or her own version of the task, not only of the statement of the problem, but also in means solutions. © Research India Publications.
As mobile devices are getting an integral part of our everyday life they store and process data that can be of great importance for the user. Another problem with the development of mobile Internet and means of wireless communication is tracking. All the movements and activities of the mobile phone owner can be secretly tracked by both – criminals and mobile service providers. The article addresses the issues of online service market occupation and stationing servers in the USA; disorienting of users and hidden settings of a mobile phone; thirdparty data collection applications; malware and secret modules in open systems; foreign components and maintenance; passing data security; system integration; indirect equipment identification and data remainence. The described in the paper overview can be used to improve existing mobile security means, eliminating the vulnerabilities and ensuring more detailed protection from intruders. © 2005  2015 JATIT & LLS. All rights reserved.
In general, the tests for assessing the quality of the pseudorandom number generators (PRNG) are very time consuming. The paper is devoted to the problem of PRNGs assessment tests acceleration. Our approach based on the using resources of graphics cards and technology nVIDIA CUDA. This paper gives examples of parallelization of several tests from A Statistical Test Suite for Random and Pseudorandom Number Generators for cryptographic applications of the National Institute of Standards and Technology. The results of the experiments show that the approach can significantly reduce the time of PRNGs testing. © 2015 IEEE.
The task of payment card fraud detection using account information is considered. We apply to two approaches for organization of neural networks interaction: neural network committee and clustering approach. Finally, these two methods are compared. © 2015, Allerton Press, Inc.
Exact generalized separable solutions are derived for the nonlinear delay reactiondiffusion equations ut = kuxx + F(u,w), where u = u(x, t), w = u(x, t − τ), and τ is the delay time. All of the considered equations depend on one or two arbitrary functions of one argument. The following solutions are found: periodic solutions with respect to time and space variable, solutions that describe the nonlinear interaction between a standing wave and a traveling wave, solutions to generalized Fisher equations with delay, and certain other solutions. Conditions for the instability of some solutions are specified. Exact solutions are also presented for more complex reactiondiffusion equations with several different delay times and equations in which delay arbitrarily depends on the time τ = τ(t). The derived exact solutions contain free parameters (in some cases, there can be any number of these parameters) and can be used to solve certain problems and test approximate analytical and numerical methods for solving these or more complex nonlinear delay equations.
Exact generalized separable solutions are derived for the nonlinear delay reactiondiffusion equations ut = kuxx + F(u,w), where u = u(x, t), w = u(x, t − τ), and τ is the delay time. All of the considered equations depend on one or two arbitrary functions of one argument. The following solutions are found: periodic solutions with respect to time and space variable, solutions that describe the nonlinear interaction between a standing wave and a traveling wave, solutions to generalized Fisher equations with delay, and certain other solutions. Conditions for the instability of some solutions are specified. Exact solutions are also presented for more complex reactiondiffusion equations with several different delay times and equations in which delay arbitrarily depends on the time τ = τ(t). The derived exact solutions contain free parameters (in some cases, there can be any number of these parameters) and can be used to solve certain problems and test approximate analytical and numerical methods for solving these or more complex nonlinear delay equations.
A number of new exact solutions (with the generalized and functional separation of variables) of unsteady equations of a planar and asymmetric boundary layer of powerlaw nonNewtonian fluids are described. To find the solutions, the Crocco transformation reducing the order of the equations considered and simpler point transformations are used. Two theorems allowing one to generalize exact solutions of the unsteady axisymmetric boundary layer equations including additional arbitrary functions into them are proven. © 2015, Pleiades Publishing, Ltd.
A nonstationary axisymmetric boundarylayer equation with a pressure gradient, which is written for the stream function, has been studied. It has been shown that this equation can be reduced to a twodimensional boundarylayer equation with variable viscosity that depends on a longitudinal coordinate. A series of new exact generalized and functional separable solutions that admit representation in elementary functions has been described. All of the solutions contain several (two to five) arbitrary functions. Formulas have been given that make it possible to generalize exact solutions to nonstationary axisymmetric boundarylayer equations by introducing additional arbitrary functions. The results are valid for any shape of a body of revolution (or a circular tube with a variable section) in a fluid flow. © 2015, Pleiades Publishing, Ltd.
The following onedimensional nonlinear delay reactiondiffusion equations are considered: Equation ID MediaObject /MediaObject /Equation, where u=u(x,t), w=u(x,ttau), and tau is the delay time. New classes of these equations are described that depend on one or two arbitrary functions of one argument and that have exact simple separable, generalized separable, and functional separable solutions. The functional constraints method is used to seek solutions. Exact solutions are also presented for the more complex threedimensional delay reactiondiffusion equations Equation ID MediaObject /MediaObject /Equation. All of the derived solutions are new, contain free parameters, and can be used to solve certain problems and test approximate analytical and numerical methods for solving these or more complex nonlinear delay equations.
The present study describes main features of the joint use of Radar Images (RI) and highresolution digital maps and other georeferenced images of the terrain. The main ways to implement the combination of images are described and the major factors affecting the accuracy of image alignment using the parameters of the navigation system and radar are estimated. A method for the automatic alignment of image data and processing of the results to refine the alignment and correction of parameters for the source location is proposed. Each of the stages of the proposed methodology is closely analysed: The formation of reference images, dispelling geometric distortions, filtering, segmentation and delineation of radar image and the implementation of the search reference images on processed radar images. The results of the implementation of the proposed algorithms using radar and optical images of the terrain are presented. The formulas for the correction of the parameters of the navigation system by measuring the discrepancy between the prior and posterior position of reference images based on a series of measurements are given.
The problems of detecting components and predicting dynamical processes are considered. Schemes for predicting chaotic time series that are based on detecting their regular, anomalous, and chaotic components followed by applying one of the described prediction methods to the regular component are presented. Regular components are detected using robust linear splines and singular spectrum analysis. Provided examples show that the presented schemes allow predicting dynamical processes with acceptable accuracy.
The problem of trust and methodological approaches to resolve it for one of the most widespread types of open information systems  an eLearning environment (ELE)  are discussed. For that purpose the state of trust implementation in distance learning (DL) is analyzed and its peculiarities are shown. An information security (IS) threats model for ELE is proposed. The methodological foundations of trust building for ELE are described. The results obtained allow to determine the goals and objectives for further research, including in particular the formulation of the task of developing a formalized (unified) model of building trust for learning management system (LMS) information resources using an integrated (complex) approach to IS insurance.
Constant monitoring of the state of the core ensures safe operation of a nuclear reactor. This article examines the reconstruction of the energy release in the core of a nuclear reactor on the basis of the indications of height sensors. Situations where some sensors fail are not rare. Any reduction in the number of sensor indications increases the error. However, the missing measurement information can be reconstructed by mathematical methods, and replacement of the failed sensors can be avoided. The simplest algorithm for reconstruction missing indications consists in approximating the height distribution by harmonic functions. However, the coefficients of these functions are found to be correlated. It is suggested that a set of natural functions determined by means of statistical estimates obtained from archival data be constructed. The procedure proposed makes it possible to reconstruct the field even with a significant loss of measurement information. © 2015 Springer Science+Business Media New York
The new direction of investigation, namely, modeling of cognitive evolution is described. The cognitive evolution is evolution of animal cognitive abilities. Fundamental scientific problems that can be analyzed by means of modeling of cognitive evolution are outlined. Backgrounds of models of cognitive evolution, which are developed in two areas of investigations: (1) models of autonomous agents and (2) biological experiments on cognitive properties of animals, are characterized. The sketch program for future investigations of cognitive evolution is proposed. Interdisciplinary relations of modeling of cognitive evolution are characterized.
This article describes the approach for younger models (8bit) of the microcontrollers where the focal point of the embedded systems development is the application software. Controllers play role here as a matching hardware components with complicated, but typical functionality. The description of the HAL (hardware abstraction layer) as a way to ensure the portability of code is developed in accordance to small resources of the junior models. The information is provided regarding the experimental justification of the approach, also some issues related to the language aspect of such approach development are disclosed. © Research India Publications.
The problems of intellectualization in the process development of integrated expert systems on the basis of the taskoriented methodology and the ATTECHNOLOGY instrumental software complex are considered. The experience from carrying out intellectual planning for the synthesis of architectural layouts of prototypes in integrated expert systems, a usagebased intelligent scheduler, reusable components, typical project procedures, and other components of the intellectual software environment in the ATTECHNOLOGY complex is described. © 2015, Allerton Press, Inc.
The many approaches to semantic mapping developed recently demand a precise measuring device that would, on the one hand, be sensitive to human subjective experiences (and therefore must involve a human in the loop), and on the other hand, allow comparative study and validation of consistency of individual semantic maps. The idea explored in this work is to measure the ability of a human subject to learn a given semantic map, and in this sense to be able to "make sense" of the map, as estimated based on a given set of test words. The paradigm includes allocating previously unseen test words in the map coordinates. The quantitative measure is the Pearson's correlation between actual map coordinates of test words and coordinates assigned by subjects. The preliminary study indicates that the proposed measure is sufficiently sensitive to discriminate individual semantic maps from each other and to rank them by their learnability, related to their internal consistency. Potential applications include evaluation of methods for automated semantic map construction, as well as diagnostics of semantic dementia, affective and personality disorders.
This paper is concerned with investigating singular hyperbolic flows. It is shown that an eigenfunction cannot be continuous on an ergodic component containing a fixed point. However, it is continuous on a certain set (after a modification on a nullset). The following alternative is established: either there exists an eigenfunction on an ergodic component or the flow is mixing on this component. Sufficient conditions for mixing are given. © 2015 Russian Academy of Sciences (DoM), London Mathematical Society, Turpion Ltd.
Languages such as XSLT are used to transform XML documents based on their syntactical structure. The emergence of Semantic Web technologies brings new languages such as RDF and OWL which are able to represent the semantics of data. Currently there is no data transformation language which is capable of using this semantic information. In this paper a language is described which is aimed at transforming the RDF data. Like XSLT, it is based on templates. The transformation is driven by ontologies. Among the features of this language is the ability to check the validity of template systems, which guarantees that the transformation will terminate successfully without raising any errors. In order to prove this property the formal model of the language is studied.
We propose an architecture that helps to integrate data accessible via cloud application APIs. The central part of the platform is the domain ontology which is based on type theory. Typing is used to automate the building of integration solutions as well as for automatic verification of program code and compatibility between components.
Modern malware (viruses, worms, and Trojan horses) are increasingly applying integrated approach inherently and combining multiple technologies to counter the actions of antivirus software and information security tools. Lack of specific classification of directions of counteraction and their approaches creates no clear idea of the degree of threat. This leads to solutions that cannot fully eliminate a threat. This article considers the first ever case of classifying counteraction methods to antivirus actions. The classification presented identified two main approaches of influencing antivirus actions: targeted and nontargeted attack. After analysing the methods, we classified false positive virus alarms based on which it is shown that false positives are systemic in nature. © 2005  2015 JATIT & LLS. All rights reserved.
The contemporary malware versions (such as viruses, worms, Trojan horses) are more and more frequently employing a complex approach in hacking, and simultaneously unify several technologies, which would allow to resist antivirus software and data protection means. The absence of classification of trends in resisting antiviruses, and the absence of methods to estimate the stability of antiviruses against targeted attacks, both create inadequate conception of the extent of the threat, which in turn, leads to insufficient solutions for the elimination of the threat. This article gives the classification of modern trends in resisting antiviruses, describes the methodology and a prototype of a system for assessing the stability of antivirus software against targeted attacks, and presents the results of a series of experiments that confirm the effectiveness of the proposed approach. © Research India Publications.
Today's weboriented programming languages are simple in nature, thus increasingly used in developing websites. However, simplicity has also weakened data security in the content management systems of these sites. © 20062015 Asian Research Publishing Network (ARPN).
During deep analysis of antivirus software, some undocumented features were discovered. Using special technique safe virus signatures was added to files, without modification information about digital signature of files. Result shown in that article describes backdoor in Microsoft Security Essentials cause of high trust to files with genuine digital signatures. © 2015 International Information Institute.
One of the key steps at the decision of scientific problems in the field of information security is to create actual model of security threats and model of intruders. This paper describes a new method for the visual representation of the model of security threats and model of intruders, which simplifies the work of researchers at this stage, without reducing the quality of the results. The main advantages of the proposed method are described. The scheme of software system that allows to implement the developed technique for constructing and displaying the threat model in information security in cloudbased information system is described too. © 2015, National Research Nuclear University. All rights reserved.
New classes of exact solutions to nonlinear hyperbolic reaction—diffusion equations with delay are described. All of the equations under consideration depend on one or two arbitrary functions of one argument, and the derived solutions contain free parameters (in certain cases, there can be any number of these parameters). The following solutions are found: periodic solutions with respect to time and space variable, solutions that describe the nonlinear interaction between a standing wave and a traveling wave, and certain other solutions. Exact solutions are also presented for more complex nonlinear equations in which delay arbitrarily depends on time. Conditions for the global instability of solutions to a number of reaction—diffusion systems with delay are derived. The generalized Stokes problem subject to the periodic boundary condition, which is described by a linear diffusion equation with delay, is solved. © 2015, Pleiades Publishing, Ltd.
The paper deals with nonlinear delay reactiondiffusion equations of the form u(t) = au(xx) + F(u, (u) over bar), where u = u(x, t) and (u) over bar = u(x, t  tau), with tau denoting the delay time. We present a number of travelingwave solutions of the form u = w(z), z = kx+lambda t, that can be represented in terms of elementary functions. We consider equations with quadratic, powerlaw, exponential and logarithmic nonlinearities as well as more complex equations with the kinetic function dependent on one to four arbitrary functions of a single argument. All of the solutions obtained involve free parameters and so may be suitable for solving certain model problems as well as testing numerical and approximate analytical methods for delay reactiondiffusion equations and more complex nonlinear delay PDEs. (C) 2015 Elsevier Ltd. All rights reserved.
In order to develop a plasma trap with levitating superconducting magnetic coils, it is necessary to search for their stable levitating states. An analytical expression for the potential energy of a single superconducting ring that captures a fixed magnetic flux in the field of a fixed ring with constant current versus the coordinate of the free ring on the axis of the system, deviation angle of its axis from the axis of the system, and radial displacement of its plane is derived for uniform gravity field in the thin ring approximation. The calculated stable levitation states of the superconducting ring in the field of the ring with constant current are proven in experiments. The generalization of such an approach to the levitation of several rings makes it possible to search for stable levitation states of several coils that form a magnetic system of a multipole trap. © 2015, Pleiades Publishing, Ltd.
Integration of large heterogeneous data collections, gathered usually for making decisions on information security (IS) management issues, requires a preliminary stepunification of their data models. It is provided by mapping the source data models into the canonical information model. Information and semantics of data definition languages (DDL) and semantics of the operations of data manipulation languages (DML) have to be preserved by the mapping. This research is devoted to the unification of the graph data models (GDM)the important kind of the existing various data models. The distinguishing features of modern GDM are discussed as well as their application in the information security (IS) area. The issues of proof of DDL and DML semantics preserving by the mapping of the GDM into the objectframe canonical model are briefly considered. Future work steps in applying research results to different IS management areas are indicated in conclusion. © 2015 IEEE.
Many people die eveiy day because of heart attack as they have not timely received the medical help. Some suggestions to develop a miniature device implanted in human mouth for day and night monitoring of patient’s saliva structure are represented in this study. The main requirements to the device are indicated. A sensor (for example, implanted in a tooth) periodically takes samples of saliva and analyzes it for the presence of biological markers indicating exacerbation of cardiovascular diseases. The device automatically informs a patient or medical stuff about possible risk. Developing technologies can be used for noninvasive diagnostics of diseases and dysfunctions based on data about biomarkers in the human saliva and provision of early medical intervention. © Medwell Journals, 2015.
Triplet periodicity (TP) is a distinctive feature of the protein coding sequences of both prokaryotic and eukaryotic genomes. In this work, we explored the TP difference inside and between 45 prokaryotic genomes. We constructed two hypotheses of TP distribution on a set of coding sequences and generated artificial datasets that correspond to the hypotheses. We found that TP is more similar inside a genome than between genomes and that TP distribution inside a real genome dataset corresponds to the hypothesis which implies that a common TP pattern exists for the majority of sequences inside a genome. Additionally, we performed gene classification based on TP matrixes. This classification showed that TP allows identification of the genome to which a given gene belongs with more than 85% accuracy. © 2015 by De Gruyter 2015.
This paper presents a mechanism with six degrees of freedom decoupled translational and rotational movements, which is a significant advantage over similar mechanisms that do not have a solution. For this mechanism analytically solved direct and inverse kinematics problem, which was made possible thanks to the chosen design of the mechanism. © 2015 r.
This study focuses on the method of determining the weights required to form an integrated assessment of any of the alternative courses of action (objects) in the decisionmaking process. Some features of the analytic hierarchy process are reviewed and the results of simulations that determine the limits of its applicability in solving practical problems are presented. The necessity of attracting a pool of experts in the case of a small amount used for comparison criteria is justified. Detailed methods can serve as a tool for evaluation of the consolidated group during the examination. Some of the methods are further modified by the researchers in order to adapt them to the problems of expertise in biomedical nanotechnologies. © Medwell Journals, 2015.
This paper develops topological methods for qualitative analysis of the behavior of nonholonomic dynamical systems. Their application is illustrated by considering a new integrable system of nonholonomic mechanics, called a nonholonomic hinge. Although this system is nonholonomic, it can be represented in Hamiltonian form with a LiePoisson bracket of rank two. This LiePoisson bracket is used to perform stability analysis of fixed points. In addition, all possible types of integral manifolds are found and a classification of trajectories on them is presented. © 2015 World Scientific Publishing Company.
In the present work, we describe an approach to reconstruction of dynamic connectomes. The experimental part of the study consisted in analysis of the resting state of brain with sample of 30 healthy human subjects. Proposed method allows reconstruction of dynamic connectomes what makes it applicable for development of classifiersdecoders of mental states.
An approach to automated construction of executable business process models based on formal goal description is proposed. The methodology is founded on the type theory notions which on the one hand give means for logical goal description and its refinement and on the other hand enable to bind this description to the executable program expressed as a composition of computational objects. The proposed methodology covers the whole procedure of the business process construction and enables to minimize the need to involve the IT workforce. Copyright 2015 ACM.
This study deals with the method for binary data lossless compression within the unknown statistics of message source. The method helps to restore the data binary chain dead true. The application of the method helps to significantly save the memory volume of the data storage devices to increase the data line capacity, etc. © Medwell Journals, 2015.
The following study discusses the problem of linking data compression function and information security. There is a definition for coding and its modification, mathematical apparatus for its realization is presented including code words numeration, diagrams of superabundance decrease when increasing source blocks length are shown, five groups of coding parameters are shown (which population is a key) without which decoding is impossible. © Medwell Journals, 2015.
The aim of this study is to develop an approach to evaluation of a biologically inspired, causal model of cognition that exposes the mechanistic requirements for achieving fluid intelligence and makes testable predictions of neurophysiological measures. In order to build humanlevelefficient tools for data analysis, it is necessary to have a theory of how concepts are represented in the human brain. This theory should specify (a) the structure and semantics of concept representations in the human brain, and (b) types, formats and specific patterns of neuronal activity instantiating these representations. The key to a biologicallyinformed human brain model begins with the mapping of (a) to (b), i.e., of the emotional Biologically Inspired Cognitive Architecture (eBICA) to informative features and characteristics of brain activity. The result is a detailed description of the information processing level of the dynamics of emotional evaluation of other agents and relationships with them in the process of joint activities, and the role of this evaluation in decisionmaking and generation of behavior based on the selected emotional cognitive architecture.
Tendencies of development and application of modern artificial intelligence approaches and methods for intelligent control are analyzed. Intelligent control systems – from classic regulators to intelligent control systems based on dynamic integrated expert systems, construction problems are considered. © Research India Publications.
We consider the WDVV associativity equations in the fourdimensional case. These nonlinear equations of third order can be written as a pair of sixcomponent commuting twodimensional nondiagonalizable hydrodynamictype systems. We prove that these systems possess a compatible pair of local homogeneous Hamiltonian structures of Dubrovin–Novikov type (of first and third order, respectively). © 2015 Springer Science+Business Media Dordrecht
This work is devoted to one of the possible approaches to the development of a system comparing texts encountered in solving the problem of comparing texts regulatory developments. The proposed method allows to find regulatory documents, fragments of which are similar to the query entered by the user. The analysis of the state of developments in the field of fuzzy fulltext search, which implies that it is possible to allocate the following search methods implemented in a retrieval system of different types: information retrieval systems and data retrieval. For solving the problem of text search by similarity, introduced the concept of "comparison", which boils down to finding documents in information retrieval database, which to some extent is similar to the original search pattern. The basis of the proposed method based on a assumption that the similarity of documents is determined by the closeness of their images in the form of texts without performing semantic study of their content. As a result, the dimension of the tasks is reduced by several orders of magnitude and enters the realm of the possible for a public computer equipment (personal computers). Developed the overall structure of the search algorithm. To solve the problem of searching for similar texts built search dictionary, podlogar and the domain forming chains in the problem of fuzzy fulltext search. This allowed to get a set of domain forming chains of words suitable to assess the relevance of the investigated text search template. © 2015, National Research Nuclear University. All rights reserved.
An algorithm is proposed for performing neutronphysical calculations of a reactor using digital signal processing methods. It is shown that the algorithm’s combined use of the classical methods of numerical analysis and highfrequency digital filters makes it possible to calculate accurately and rapidly the neutron macrofield on a coarse grid and to organize the neutronphysical calculations in a new way, greatly reducing the number of iterations on a fine grid. Computer modeling shows that even for a onedimensional reactor the proposed rational combination of the computational results on coarse and fine grids gives a severalfold reduction of the computing time. © 2015 Springer Science+Business Media New York
The energyproduction losses versus the reserved reactivity excess as a function of the probability of accidental shutdown of the reactor are presented. A formulation of the optimization problem of power control during the period of threat under forcemajeure circumstances is examined. The efficacy of optimization and the character of the optimal regimes as a function of the duration of the period of threat are presented.
The described computer program is designed for the analysis of archival data and the visualization of various parameters of the nuclear power RBMK unit. The reactor core includes 1884 channels. Each channel has varying properties and measured parameters. The program allows presenting the archive data about the condition of the unit as cartograms, tracking the history of parameters changes as graphs and writing the required data in a text file. The program also provides opportunities to compare various parameters and to represent the result of the comparison as cartograms or text data allowing identifying the areas for research. For preliminary calculations with archival data, there is a special script editor called Boo. The data to display is taken from the "SKALAMICRO" system remote storage, text files, burst can detection system database. The input data is stored in the same format in a PostgreSQL database, which supports the remote connection to the archive. © 2015, National Research Nuclear University. All rights reserved.
The paper presents two analytical models to study the performance and availability of queueing systems with the hypo exponential service time and finite queue. The analytical results obtained are verified using discreteevent simulation. A few numerical examples for varying number of service stages, service rates and arrival rates are given. The results presented in the paper can be used for analysis of MapReduce and multistage big data processing. © 2015 IEEE.
This paper discusses the peculiarities and problems of teaching the historical aspects of Information Security Science (ISS) to the students of the “Information Security” specialization. Preferential attention is given to the ISS area with the longest history, namely cryptography. We trace exactly what ideas of fundamental importance for modern cryptography were formed in each of the historical periods, how these ideas can help students in mastering the training courses’ material, and how to communicate these ideas to students in the best way. The conclusions are based on the results of studies conducted over a few years at the “Cybernetics and Information Security” Faculty of the NRNU MEPhI, where our ideas are implemented in the educational process. We teach the history of cryptography in a few educational courses for Specialists in IS and Masters in Business Continuity and IS Maintenance in the form of introductory and individual lectures and seminars. Specific recommendations on the use of the historical facts considered during the classes are given. © IFIP International Federation for Information Processing 2015.
The paper presents an analytical model to study the performance and availability of queueing systems with finite queue and a lot of service phases. The first phase has the exponential distribution of service time, while the second one has the hyperErlangian distribution. The analytical results obtained are verified using discreteevent simulation. A few numerical examples for varying the service rates and arrival rates are given. The results presented in the paper can be used for analysis of the Next Generation Firewalls (NGFWs). © 2015 ACM.
The necessity of using Distance Learning (DL) for teaching cryptology is analyzed. The modern features of applying different DL approaches to solve this task are extracted. The NRNU MEPhI’s experience in creating massoriented DL project called Cryptowiki.net is described; its structure and assignments implemented by the students of cryptologic courses are shown. The related works are presented. Cryptowiki.net’s difference from the analogs is stressed out. The main findings of the research are formulated in conclusion. © IFIP International Federation for Information Processing 2015.
We present a new method for constructing exact solutions to nonlinear systems of coupled delay reactiondiffusion equations of the form ut=k1uxx+F(u,u¯,w,w¯), wt=k2wxx+G(u,u¯,w,w¯),where u=u(x,t), w=w(x,t), u¯=u(x,tτ), and w¯=w(x,tτ), and τ is the delay time. The method relies on using generalized and functional separable solutions, obtained for single delay reactiondiffusion equations (called generating equations), to construct exact solutions of more complex systems of coupled delay equations. All of the systems considered contain two or more arbitrary functions of two or three arguments. We show that the generating equations method can also be used for (i) nonlinear reactiondiffusion systems with timevarying delay τ=τ(t), (ii) delay reactiondiffusion systems with varying transfer coefficients, (iii) multicomponent delay reactiondiffusion systems, (iv) multidimensional delay reactiondiffusion systems, and (v) nonlinear delay systems of higherorder PDEs. The results may be suitable for solving certain model problems and testing approximate analytical and numerical methods for some classes of similar and more complex nonlinear coupled delay systems.
The paper deals with equations describing the unsteady axisymmetric boundary layer on a body of revolution. The shape of the body is assumed to be arbitrary. The axisymmetric boundarylayer equation for the stream function is shown to reduce to a plane boundarylayer equation with a streamwisecoordinatedependent viscosity of the form w(tz)+w(z)w(xz)w(x)w(zz)=nu r(2)(x)w(zzz)+F(t,x). We describe a number of new generalized and functional separable solutions to this nonlinear equation, which depend on two to five arbitrary functions. The solutions are obtained with a new method (direct method of functional separation of variables) based on using particular solutions to an auxiliary ODE. Many of the solutions are expressed in terms of elementary functions, provided that the arbitrary functions are also elementary. Two theorems are stated that enable one to generalize exact solutions of unsteady axisymmetric boundarylayer equations by including additional arbitrary functions. Furthermore, we specify a von Misestype transformation that reduces the unsteady axisymmetric boundarylayer equation to a nonlinear secondorder PDE. We also present several new exact solutions to the plane boundarylayer equation and solve a boundary layer problem for a nonuniformly heated flat plate in a unidirectional fluid flow with temperature dependent viscosity. The method proposed in this paper can also be effective for constructing exact solutions to many other nonlinear PDEs. (C) 2015 Elsevier Ltd. All rights reserved.