|
Fundamental Mathematics and Physics
V.V. Varlamov
Group Theoretical Description of Periodic System of Elements.
An axiomatic realization of the group theoretical description is considered
for periodic system of elements. The periodic system is represented as a single quantum
system of structureless states. Masses of elements of the superactinide group are
calculated. A relationship between an algebraic formulation of the single quantum system
and twistor theory is established.
Keywords: Mendeleev periodic system, single quantum system, conformal group, Rumer-Fet
group, twistor structure.
A.K. Guts,
G.B. Goldina,
A.N. Kabanov.
Affine Representations as Lie Groups of Transformations of Three-Dimensional Solvable Lie Groups.
Using the Yamaguchi method, we give the representations as Lie groups of
affine transformations of all three-dimensional solvable Lie groups.
Keywords: affine structures, affine representation, three-dimensional solvable Lie
groups.
Applied Mathematics and Modeling
R.E. Mamedli
Stability of Inhomogeneous Three-Layered Rods at Non-Uniform Temperature Field
in a Nonlinearly Elastic Medium.
We study the problem of three-layered nonhomogeneous rectilinear rods on a
nonlinear elastic foundation under the pressure of compressive loads in this article. It
is assumed that the rod is in the uneven temperature field and the elasticity modules of
the material layers depend on temperature. For the elastic foundation of nonlinear model
is accepted and it is assumed that the hypothesis of plane sections is valid for the
entire thickness of the element of the rod. In general, we achieve the steadiness
equation of the considered rod, and a formula is found for determining the critical load
in the certain case.
Keywords: nonhomogeneous three-layered rod, temperature, stability, critical load.
V.V. Goltyapin,
V.A. Shovin,
E.V. Nadey,
V.I. Sovalkin,
G.I. Nechaeva.
Building of Dispersion Complexes for Estimation of Efficiency of Immunotherapy
of Allergic Bronchial Asthma.
In this article, the efficacy of allergen-specific immunotherapy (ASIT) of
allergic bronchial asthma (BA), comorbid with allergic rhinitis (AP) and atopic
dermatitis (ATD) over a three-year period by means of a single-factor variance analysis
of multigradation features was evaluated.
Keywords:
correlation relation, organized factors, discrete values, variance analysis,
bronchial asthma, allergy, allergen-specific immunotherapy.
V.A. Shovin
Nonlinear Structural Equations and Quadratic Factor Analysis.
The role of the article is to develop a new algorithm (method) of factor
analysis, which includes an advanced model of the relationship of factors and initial
variables, when the model takes into account not only linear terms, but also quadratic
ones, i.e. decomposition to the second power. Such a model belongs to the class of
nonlinear structural models. The calculation algorithm makes it possible to build a
refinement model, to investigate the influence of the nonlinear component in the factor
influence. Also, an appropriate program with a graphical user interface was developed
that can carry out a quadratic factor analysis of new data on the loading of new data.
This article is both applied and fundamental. The program and the corresponding
computational algorithm were tested on real data, which allowed us to compare the
previous calculations for these data for linear factor analysis with the quadratic one
proposed in the paper. Estimates of the parameters of nonlinear structural equations was
implemented by numerical methods for nonlinear optimization with conditions. As a
criterion for the optimal parameters of structural equation was selected to minimize the
residual of structural equation model. The results of the testing of this method for the
quadratic factor analysis model of hypertension was in accordance with other methods of
factor modeling. This method of estimates of the parameters of structural equations was
implemented as software.
Keywords:
hypertension, factor analysis, structural equations.
A.A. Kondyurina,
D.N. Lavrov.
Results of the Wireless Access Point Detection Experiment by Modified Trilateration Method.
The research paper presents the results of an experiment to detect wireless access point in the open space based on the early suggested model.
Keywords: positioning, wireless access point detection, trilateration, Kolmogorov-Smirnov test.
Francisco Zapata,
Olga Kosheleva,
Vladik Kreinovich.
Why Under Stress Positive Reinforcement is More Effective? Why Optimists Study
Better? Why People Become Restless? Simple Utility-Based Explanations.
In this paper, we use the utility-based approach to decision making to
provide simple answers to the following three questions: Why under stress positive
reinforcement is more effective? Why optimists study better? Why people become restless?
Keywords:
utility theory, positive vs. negative reinforcement, optimists vs. pessimists.
Vladik Kreinovich,
Olga Kosheleva,
Mahdokht Afravi,
Genesis Bejarano,
Marisol Chacon.
Economics of Commitment: Why Giving Away Some Freedom Makes Sense.
In general, the more freedom we have, the better
choices we can make, and thus, the better possible economic
outcomes. However, in practice, people often artificially restrict
their future options by making a commitment. At first glance,
commitments make no economic sense, and so their ubiquity seems
puzzling. Our more detailed analysis shows that commitment often
makes perfect economic sense: namely, it is related to the way we
take future gains and losses into account. With the traditionally
assumed exponential discounting, commitment indeed makes no
economic sense, but with the practically observed hyperbolic
discounting, commitment is indeed often economically beneficial.
Keywords:
commitment, economics, discounting, exponential discounting, hyperbolic discounting.
Computer Sciences
S.V. Belim,
S.B. Larionov.
Algorithm of a Learning Set Formation for Image Segmentation Artificial Neural Network.
An algorithm for forming a learning set for an artificial neural network in
the problem of image segmentation is proposed in the article. A distinctive feature is
the use of only one segmented image. Segmentation is performed using a three-layer
perceptron. The method of growing areas is used. The neural network is used to decide
whether the pixel belongs to the segment being formed. Impulse noise is used to form the
learning set. Pixels modified by noise do not belong to any segment. A computer
experiment was conducted in an automatic and interactive mode.
Keywords: image segmentation, neural network, impulse noise.
S.V. Lejhter,
S.N. Chukanov.
The Matching of Images Based on the Construction of the Hamilton Equations.
The problem of comparing the template and the terminal images is considered.
To analyze deformations of a image, the group of diffeomorphisms is considered. The
problem is solved on the basis of the method for constructing a minimized functional
characterizing the evolution of the diffeomorphic image transformation from the template
to the terminal image, and the penalty for deviating the image path from the required
trajectory. The formulation of the problem based on the construction and solution of
Hamilton's equations for the group of diffeomorphisms of particles --- points of landmark
of the image is given. An algorithm for solving Hamilton's equations for a diffeomorphic
transformation is developed based on the stochastic gradient descent method.
Keywords:
pattern recognition, stochastic gradient descent, Hamilton equation,
diffeomorphic transformation.
S.V. Guss,
D.N. Lavrov.
Approaches to Implementing a Secure Delivery Network Protocol for Multipath Data Transfer.
The paper considers the problem of increasing the reliability of data
transmission in a network with flickering nodes. Some comments are given on the
development of algorithms for dividing the data flow and recovering lost data. We propose
general considerations related to the implementation of the protocol for multipath
routing in self-organizing dynamic networks.
Keywords:
routing, secret sharing, data recovery, bandwidth, network fault tolerance.
Martine Ceberio,
Vladik Kreinovich.
How to Store Tensors in Computer Memory: An Observation.
In this paper, after explaining the need to use tensors in computing, we
analyze the question of how to best store tensors in computer memory. Somewhat
surprisingly, with respect to a natural optimality criterion, the standard way of storing
tensors turns out to be one of the optimal ones.
Keywords:
tensors, computing, computer memory.
Olga Kosheleva,
Vladik Kreinovich.
Why Deep Learning Methods Use KL Divergence Instead of Least Squares: A Possible Pedagogical Explanation.
In most applications of data processing, we select the parameters that
minimize the mean square approximation error. The same Least Squares approach has been
used in the traditional neural networks. However, for deep learning, it turns out that an
alternative idea works better --- namely, minimizing the Kullback-Leibler (KL)
divergence. The use of KL divergence is justified if we predict probabilities, but the
use of this divergence has been successful in other situations as well. In this paper, we
provide a possible explanation for this empirical success. Namely, the Least Square
approach is optimal when the approximation error is normally distributed --- and can lead
to wrong results when the actual distribution is different from normal. The need to have
a robust criterion, i.e., a criterion that does not depend on the corresponding
distribution, naturally leads to the KL divergence.
Keywords:
deep learning, Kullback-Leibler divergence.
Andrew Pownuk,
Vladik Kreinovich.
How Interval Measurement Uncertainty Affects the Results of Data Processing:
A Calculus-Based Approach to Computing the Range of a Box.
In many practical applications, we are interested in the values of the
quantities \(y_1,\ldots,y_m\) which are difficult (or even impossible) to measure directly.
A natural idea to estimate these values is to find easier-to-measure related quantities
\(x_1,\ldots,x_n\) and to use the known relation to estimate the desired values \(y_j\).
Measurements come with uncertainty, and often, the only thing we know about the actual
value of each auxiliary quantity \(x_i\) is that it belongs to the interval
\([\underline x_i,\overline x_i]=[\widetilde x_i-\Delta_i,\widetilde x_i+\Delta_i]\), where
\(\widetilde x_i\) is the measurement result, and \(\Delta_i\) is the upper bound on the
absolute value of the measurement error \(\widetilde x_i-x_i\). In such situations, instead
of a single value of a tuple \(y=(y_1,\ldots,y_m)\), we have a range of possible values. In
this paper, we provide calculus-based algorithms for computing this range.
Keywords:
data processing, interval uncertainty, indirect measurements, calculus.
Information Security
N.I. Sinadsky,
A.V. Agafonov.
Testing Network Security Devices Automation Using Evolutionary-Genetic Approach.
The article describes approach for automation of testing the immunity of
network security devices against denial of service attacks using genetic algorithms.
Keywords:
testing, network security devices, denial of service, genetic algorithm.
N.F. Bogachenko.
The Analysis of Problems of Access Control Administration in Large-Scale
Information Systems.
In the article general questions of access control management for resources
of large-scale information systems (LSIS) from positions of formal mathematical models
are considered. The properties inherent in LSISs and the requirements imposed on its
security policy, which implements the methods and rules of access control, are analyzed.
The task is to develop new models, methods and algorithms for managing access control in
LSIS.
Keywords:
access control, security policy, administration, automation.
A.N. Mironenko.
The Method of Static Analysis of the Source Code of Android Applications for the Presence of Malicious Code.
This work is devoted to the protection of mobile devices on the Android
operating system from software with malicious functionality. The work presents a brief
classification of malicious effects on mobile devices, as well as methods for analyzing
software supposedly malicious. In addition, we offer a method of static analysis, which
searches the source code for malware inserts. The proposed method is based on the use of
mathematical complexity metrics.
Keywords:
malicious code, computer virus, static analysis, complexity metrics, Android.
A.N. Mironenko.
The Method of Applying \((t, n)\) --- Threshold Scheme in Steganography.
The work is devoted to the development of the method of information
concealment in a raster image using steganography together with cryptography. The
suggested method allows to solve the problem of message recovery if the image containing
the hidden data was damaged. The basic idea is that the data with the help of
steganography is not placed in the image entirely, but using the \((t, n)\) --- threshold
scheme, the insertion of each part occurs independently. A software has been developed to
test the proposed method. A series of experiments confirming the possibility of applying
the proposed method is carried out.
Keywords:
åhreshold scheme, steganography, LSB, Shamir's secret sharing.