首页 > 最新文献

Programming and Computer Software最新文献

英文 中文
RuGECToR: Rule-Based Neural Network Model for Russian Language Grammatical Error Correction RuGECToR:基于规则的俄语语法纠错神经网络模型
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-30 DOI: 10.1134/s0361768824700129
I. A. Khabutdinov, A. V. Chashchin, A. V. Grabovoy, A. S. Kildyakov, U. V. Chekhovich

Abstract

Grammatical error correction is one of the core natural language processing tasks. Presently, the open-source state-of-the-art sequence tagging for English is the GECToR model. For Russian, this problem does not have equally effective solutions due to the lack of annotated datasets, which motivated the current research. In this paper, we describe the process of creating a synthetic dataset and training the model on it. The GECToR architecture is adapted for the Russian language, and it is called RuGECToR. This architecture is chosen because, unlike the sequence-to-sequence approach, it is easy to interpret and does not require a lot of training data. The aim is to train the model in such a way that it generalizes the morphological properties of the language rather than adapts to a specific training sample. The presented model achieves the quality of 82.5 in the metric ({{{mathbf{F}}}_{{{mathbf{0}}{mathbf{.5}}}}}) on synthetic data and 22.2 on the RULEC dataset, which was not used at the training stage.

摘要语法纠错是自然语言处理的核心任务之一。目前,GECToR 模型是最先进的开源英语语序标记模型。对于俄语而言,由于缺乏注释数据集,这一问题并没有同样有效的解决方案,这也是当前研究的动机所在。在本文中,我们描述了创建合成数据集并在其上训练模型的过程。GECToR 架构适用于俄语,被称为 RuGECToR。之所以选择这种架构,是因为它不同于序列到序列的方法,易于解释,而且不需要大量的训练数据。其目的是以这样一种方式来训练模型,使其概括语言的形态属性,而不是适应特定的训练样本。所提出的模型在合成数据上的质量指标({{mathbf{F}}}_{{{mathbf{0}}{{mathbf{.5}}}}})达到了 82.5,在 RULEC 数据集上的质量指标(训练阶段没有使用该数据集)达到了 22.2。
{"title":"RuGECToR: Rule-Based Neural Network Model for Russian Language Grammatical Error Correction","authors":"I. A. Khabutdinov, A. V. Chashchin, A. V. Grabovoy, A. S. Kildyakov, U. V. Chekhovich","doi":"10.1134/s0361768824700129","DOIUrl":"https://doi.org/10.1134/s0361768824700129","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Grammatical error correction is one of the core natural language processing tasks. Presently, the open-source state-of-the-art sequence tagging for English is the GECToR model. For Russian, this problem does not have equally effective solutions due to the lack of annotated datasets, which motivated the current research. In this paper, we describe the process of creating a synthetic dataset and training the model on it. The GECToR architecture is adapted for the Russian language, and it is called RuGECToR. This architecture is chosen because, unlike the sequence-to-sequence approach, it is easy to interpret and does not require a lot of training data. The aim is to train the model in such a way that it generalizes the morphological properties of the language rather than adapts to a specific training sample. The presented model achieves the quality of <b>82.5</b> in the metric <span>({{{mathbf{F}}}_{{{mathbf{0}}{mathbf{.5}}}}})</span> on synthetic data and <b>22.2</b> on the RULEC dataset, which was not used at the training stage.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing the Internal Voronoi Diagram of Polygonal Figure Using the Sweepline Method 使用扫线法构建多边形图形的内部沃罗诺伊图
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-30 DOI: 10.1134/s0361768824700105
L. M. Mestetskiy, D. A. Koptelov

Abstract

The problem of constructing the internal Voronoi diagram of a polygonal figure—a polygon with polygonal holes—is considered. A method based on the plane sweep paradigm is proposed. Direct construction of only the internal part of the Voronoi diagram allows us to reduce the amount of computations and increase robustness compared to known solutions. Another factor in reducing the computational complexity is the use of the property of pairwise incidence of linear segments formed by the sides of the polygonal figure. To take these features into account, it is proposed to build a data structure called sweep line status in the form of an ordered set of sites’ areas of responsibility. This structure is implemented as a combination of a balanced tree and a bidirectional list. Computational experiments illustrate the numerical reliability and efficiency of the proposed method.

摘要 研究了多边形--带有多边形孔的多边形--内部沃罗诺伊图的构造问题。本文提出了一种基于平面扫掠范式的方法。与已知的解决方案相比,只直接构建沃罗诺伊图的内部部分可以减少计算量并提高鲁棒性。降低计算复杂度的另一个因素是利用多边形边所形成的线性线段成对入射的特性。考虑到这些特点,建议以站点责任区有序集的形式建立一个名为 "扫线状态 "的数据结构。该结构由平衡树和双向列表组合而成。计算实验说明了所提方法在数值上的可靠性和效率。
{"title":"Constructing the Internal Voronoi Diagram of Polygonal Figure Using the Sweepline Method","authors":"L. M. Mestetskiy, D. A. Koptelov","doi":"10.1134/s0361768824700105","DOIUrl":"https://doi.org/10.1134/s0361768824700105","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The problem of constructing the internal Voronoi diagram of a polygonal figure—a polygon with polygonal holes—is considered. A method based on the plane sweep paradigm is proposed. Direct construction of only the internal part of the Voronoi diagram allows us to reduce the amount of computations and increase robustness compared to known solutions. Another factor in reducing the computational complexity is the use of the property of pairwise incidence of linear segments formed by the sides of the polygonal figure. To take these features into account, it is proposed to build a data structure called <i>sweep line</i> <i>status</i> in the form of an ordered set of sites’ areas of responsibility. This structure is implemented as a combination of a balanced tree and a bidirectional list. Computational experiments illustrate the numerical reliability and efficiency of the proposed method.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"19 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Efficiency Analysis of Hashing Algorithms for Use in zk-SNARK Circuits in Distributed Ledgers 用于分布式账本中 zk-SNARK 电路的哈希算法效率比较分析
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-30 DOI: 10.1134/s0361768824700099
D. O. Kondyrev

Abstract

This paper presents a comparative efficiency analysis of hashing algorithms from a perspective of their use in systems based on the zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK). Hash functions sha256, sha3, poseidon, mimc, and blake2, most commonly used in modern distributed ledgers, are considered. For parameter measurement experiments, an infrastructure using the ZoKrates toolbox is developed. Based on experimental data, the limits of practical applicability of the algorithms to the problem of proving knowledge of a hash preimage with zk-SNARK circuits in distributed ledgers are determined, and related efficiency problems are considered.

摘要 本文从散列算法在基于零知识简洁非交互知识论证(zk-SNARK)的系统中使用的角度,对散列算法的效率进行了比较分析。哈希函数 sha256、sha3、poseidon、mimc 和 blake2 是现代分布式账本中最常用的哈希函数。为进行参数测量实验,开发了一个使用 ZoKrates 工具箱的基础架构。基于实验数据,确定了算法在分布式账本中使用 zk-SNARK 电路证明哈希预图像知识问题上的实际应用限制,并考虑了相关的效率问题。
{"title":"Comparative Efficiency Analysis of Hashing Algorithms for Use in zk-SNARK Circuits in Distributed Ledgers","authors":"D. O. Kondyrev","doi":"10.1134/s0361768824700099","DOIUrl":"https://doi.org/10.1134/s0361768824700099","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>This paper presents a comparative efficiency analysis of hashing algorithms from a perspective of their use in systems based on the zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK). Hash functions sha256, sha3, poseidon, mimc, and blake2, most commonly used in modern distributed ledgers, are considered. For parameter measurement experiments, an infrastructure using the ZoKrates toolbox is developed. Based on experimental data, the limits of practical applicability of the algorithms to the problem of proving knowledge of a hash preimage with zk-SNARK circuits in distributed ledgers are determined, and related efficiency problems are considered.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"27 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem 安全信息传输应用开发:基于后量子算法 CSIDH、Falcon 和 AES 对称密钥密码系统
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-30 DOI: 10.1134/s0361768824700130
Nhu-Quynh Luc, Tat-Thang Nguyen, Chi-Hung Vu, Duc-Huy Quach, Thanh-Toan Dao

Abstract

In this paper, the authors present a technique for developing a secure messaging service called “CryptoMess” which utilizes the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm for secure key exchange and the Advanced Encryption Standard (AES) to protect message content in communication. In addition, the authors have incorporated the Falcon post-quantum digital signature technology to ensure the integrity and authenticity of communications between the sender and the recipient. The novel post-quantum cryptographic algorithms utilized by the authors are still under consideration in the competition to select cryptosystems for use in quantum computing systems organized by the NIST Standards Institute. As a result, the messaging program “CryptoMess” is able to exchange messages between users, providing safety, security, integrity, and authenticity. The authors have included modern post-quantum cryptography techniques, such as the Falcon digital signature system, to guarantee that the product operates safely. The program has a transmitting rate of approximately 209–261 ms and a receiving rate of approximately 168–206 ms. The message signing time is about 260 ms, and the message verification speed is approximately 185 ms. Key generation time is about 741 ms, key encapsulation time is about 1.454 ms, and key decapsulation time is about 1.921 ms. The source code of the “CryptoMess” communications program has been analyzed and tested by the authors using the Fortify Static Code Analyzer tool to ensure that the product has been created safely and securely.

摘要 在本文中,作者介绍了一种名为 "CryptoMess "的安全信息服务开发技术,该技术利用交换超等同源 Diffie-Hellman 算法(CSIDH)进行安全密钥交换,并利用高级加密标准(AES)保护通信中的信息内容。此外,作者还采用了 Falcon 后量子数字签名技术,以确保发送方和接收方之间通信的完整性和真实性。作者采用的新型后量子加密算法仍在美国国家标准与技术研究院(NIST Standards Institute)组织的量子计算系统密码系统选型竞赛中接受审议。因此,信息程序 "CryptoMess "能够在用户之间交换信息,并提供安全性、保密性、完整性和真实性。作者采用了现代后量子加密技术,如猎鹰数字签名系统,以保证产品的安全运行。该程序的发送速率约为 209-261 毫秒,接收速率约为 168-206 毫秒。信息签名时间约为 260 毫秒,信息验证速度约为 185 毫秒。密钥生成时间约为 741 毫秒,密钥封装时间约为 1.454 毫秒,密钥解封装时间约为 1.921 毫秒。作者使用 Fortify 静态代码分析工具对 "CryptoMess "通信程序的源代码进行了分析和测试,以确保该产品的创建安全可靠。
{"title":"Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem","authors":"Nhu-Quynh Luc, Tat-Thang Nguyen, Chi-Hung Vu, Duc-Huy Quach, Thanh-Toan Dao","doi":"10.1134/s0361768824700130","DOIUrl":"https://doi.org/10.1134/s0361768824700130","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>In this paper, the authors present a technique for developing a secure messaging service called “CryptoMess” which utilizes the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm for secure key exchange and the Advanced Encryption Standard (AES) to protect message content in communication. In addition, the authors have incorporated the Falcon post-quantum digital signature technology to ensure the integrity and authenticity of communications between the sender and the recipient. The novel post-quantum cryptographic algorithms utilized by the authors are still under consideration in the competition to select cryptosystems for use in quantum computing systems organized by the NIST Standards Institute. As a result, the messaging program “CryptoMess” is able to exchange messages between users, providing safety, security, integrity, and authenticity. The authors have included modern post-quantum cryptography techniques, such as the Falcon digital signature system, to guarantee that the product operates safely. The program has a transmitting rate of approximately 209–261 ms and a receiving rate of approximately 168–206 ms. The message signing time is about 260 ms, and the message verification speed is approximately 185 ms. Key generation time is about 741 ms, key encapsulation time is about 1.454 ms, and key decapsulation time is about 1.921 ms. The source code of the “CryptoMess” communications program has been analyzed and tested by the authors using the Fortify Static Code Analyzer tool to ensure that the product has been created safely and securely.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"213 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing 机密人工智能的分析评论:在云计算中部署的方法和算法
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-30 DOI: 10.1134/s0361768824700117
E. M. Shiriaev, A. S. Nazarov, N. N. Kucherov, M. G. Babenko

Abstract

The technologies of artificial intelligence and cloud computing systems have recently been actively developed and implemented. In this regard, the issue of their joint use, which has been topical for several years, has become more acute. The problem of data privacy preservation in cloud computing acquired the status of critical long before the necessity of their joint use with artificial intelligence, which made it even more complicated. This paper presents an overview of both the artificial intelligence and cloud computing techniques themselves, as well as methods to ensure data privacy. The review considers methods that utilize differentiated privacy; secret sharing schemes; homomorphic encryption; and hybrid methods. The conducted research has shown that each considered method has its pros and cons outlined in the paper, but there is no universal solution. It was found that theoretical models of hybrid methods based on secret sharing schemes and fully homomorphic encryption can significantly improve the confidentiality of data processing using artificial intelligence.

摘要 人工智能和云计算系统技术最近得到了积极的发展和应用。因此,几年来一直备受关注的二者联合使用问题变得更加尖锐。云计算中的数据隐私保护问题早在其与人工智能联合使用的必要性出现之前就已成为关键问题,这使得问题变得更加复杂。本文概述了人工智能和云计算技术本身以及确保数据隐私的方法。综述考虑了利用差异化隐私的方法、秘密共享方案、同态加密以及混合方法。研究结果表明,论文中概述的每种方法都有其优缺点,但没有通用的解决方案。研究发现,基于秘密共享方案和完全同态加密的混合方法理论模型可以显著提高利用人工智能处理数据的保密性。
{"title":"Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing","authors":"E. M. Shiriaev, A. S. Nazarov, N. N. Kucherov, M. G. Babenko","doi":"10.1134/s0361768824700117","DOIUrl":"https://doi.org/10.1134/s0361768824700117","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The technologies of artificial intelligence and cloud computing systems have recently been actively developed and implemented. In this regard, the issue of their joint use, which has been topical for several years, has become more acute. The problem of data privacy preservation in cloud computing acquired the status of critical long before the necessity of their joint use with artificial intelligence, which made it even more complicated. This paper presents an overview of both the artificial intelligence and cloud computing techniques themselves, as well as methods to ensure data privacy. The review considers methods that utilize differentiated privacy; secret sharing schemes; homomorphic encryption; and hybrid methods. The conducted research has shown that each considered method has its pros and cons outlined in the paper, but there is no universal solution. It was found that theoretical models of hybrid methods based on secret sharing schemes and fully homomorphic encryption can significantly improve the confidentiality of data processing using artificial intelligence.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"51 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KIAM Astrodynamics Toolbox for Spacecraft Orbital Motion Design 用于航天器轨道运动设计的 KIAM 天体动力学工具箱
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-05-22 DOI: 10.1134/s0361768824010092
M. G. Shirobokov, S. P. Trofimov

Abstract

The KIAM Astrodynamics Toolbox, a new software library for designing spacecraft orbital motion, is introduced. The toolbox is developed at the Keldysh Institute of Applied Mathematics of the Russian Academy of Sciences in Fortran and Python languages and, therefore, combines computational speed and program design flexibility. The library can be useful for space flight mechanics specialists, as well as for students in relevant educational programs.

摘要 介绍了用于设计航天器轨道运动的新软件库 KIAM 天体动力学工具箱。该工具箱由俄罗斯科学院凯尔迪什应用数学研究所使用 Fortran 和 Python 语言开发,因此兼具计算速度和程序设计灵活性。该库对空间飞行力学专家以及相关教育课程的学生都很有用。
{"title":"KIAM Astrodynamics Toolbox for Spacecraft Orbital Motion Design","authors":"M. G. Shirobokov, S. P. Trofimov","doi":"10.1134/s0361768824010092","DOIUrl":"https://doi.org/10.1134/s0361768824010092","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The KIAM Astrodynamics Toolbox, a new software library for designing spacecraft orbital motion, is introduced. The toolbox is developed at the Keldysh Institute of Applied Mathematics of the Russian Academy of Sciences in Fortran and Python languages and, therefore, combines computational speed and program design flexibility. The library can be useful for space flight mechanics specialists, as well as for students in relevant educational programs.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"34 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Primitive Elements of Free Non-associative Algebras over Finite Fields 有限域上自由非关联代数的基元
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-05-22 DOI: 10.1134/s0361768824020117
M. V. Maisuradze, A. A. Mikhalev

Abstract

The representation of elements of free non-associative algebras as a set of multidimensional tables of coefficients is defined. An operation for finding partial derivatives for elements of free non-associative algebras in the same form is considered. Using this representation, a criterion of primitivity for elements of lengths 2 and 3 in terms of matrix ranks, as well as a primitivity test for elements of arbitrary length, is derived. This test makes it possible to estimate the number of primitive elements in free non-associative algebras with two generators over a finite field. The proposed representation allows us to optimize algorithms for symbolic computations with primitive elements. Using these algorithms, we find the number of primitive elements of length 4 in a free non-associative algebra of rank 2 over a finite field.

摘要 定义了自由非联立代数的元素表示为一组多维系数表。考虑了用同样形式求自由非联立代数方程元素偏导数的操作。利用这种表示法,得出了长度为 2 和 3 的元素在矩阵秩方面的初等性标准,以及任意长度元素的初等性检验。通过这个检验,我们可以估算出有限域上有两个生成器的自由非关联代数中的基元数。利用所提出的表示法,我们可以优化使用基元进行符号计算的算法。利用这些算法,我们找到了有限域上秩为 2 的自由非协元代数中长度为 4 的基元数。
{"title":"Primitive Elements of Free Non-associative Algebras over Finite Fields","authors":"M. V. Maisuradze, A. A. Mikhalev","doi":"10.1134/s0361768824020117","DOIUrl":"https://doi.org/10.1134/s0361768824020117","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The representation of elements of free non-associative algebras as a set of multidimensional tables of coefficients is defined. An operation for finding partial derivatives for elements of free non-associative algebras in the same form is considered. Using this representation, a criterion of primitivity for elements of lengths 2 and 3 in terms of matrix ranks, as well as a primitivity test for elements of arbitrary length, is derived. This test makes it possible to estimate the number of primitive elements in free non-associative algebras with two generators over a finite field. The proposed representation allows us to optimize algorithms for symbolic computations with primitive elements. Using these algorithms, we find the number of primitive elements of length 4 in a free non-associative algebra of rank 2 over a finite field.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"13 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Software Dynamic Analysis Methods 软件动态分析方法概览
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-05-22 DOI: 10.1134/s0361768824010079
V. V. Kuliamin

Abstract

A review of software dynamic analysis methods is presented, mainly focusing on the methods supported by tools targeted on software security verification and applicable to system software. Fuzzing, runtime verification and dynamic symbolic execution techniques are considered in detail. Dynamic taint data analysis methods and tools are excluded since gathering technical details on them is complicated. The review of fuzzing and dynamic symbolic execution is focused mostly on the techniques to solve various problems that arise during operation of the tools rather than the particular tools that amount to a number greater than 100. In addition, the fuzzing counteraction techniques are considered.

摘要 综述了软件动态分析方法,主要侧重于软件安全验证工具支持的适用于系统软件的方法。其中详细介绍了模糊分析、运行时验证和动态符号执行技术。由于收集动态污点数据分析方法和工具的技术细节比较复杂,因此不包括这些方法和工具。对模糊处理和动态符号执行的审查主要集中在解决工具运行过程中出现的各种问题的技术,而不是数量超过 100 的特定工具。此外,还考虑了模糊对抗技术。
{"title":"A Survey of Software Dynamic Analysis Methods","authors":"V. V. Kuliamin","doi":"10.1134/s0361768824010079","DOIUrl":"https://doi.org/10.1134/s0361768824010079","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>A review of software dynamic analysis methods is presented, mainly focusing on the methods supported by tools targeted on software security verification and applicable to system software. Fuzzing, runtime verification and dynamic symbolic execution techniques are considered in detail. Dynamic taint data analysis methods and tools are excluded since gathering technical details on them is complicated. The review of fuzzing and dynamic symbolic execution is focused mostly on the techniques to solve various problems that arise during operation of the tools rather than the particular tools that amount to a number greater than 100. In addition, the fuzzing counteraction techniques are considered.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"68 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multigroup Classification of Firing Pin Impressions with the Use of a Fully Connected Neural Network 利用全连接神经网络对撞针凹痕进行多组分类
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-05-22 DOI: 10.1134/s0361768824010031
V. A. Fedorenko, K. O. Sorokina, P. V. Giverts

Abstract

This paper discusses the use of a fully connected neural network to classify images of firing pin impressions. The purpose of this work is to investigate the effectiveness of clone images of firing pin impressions in improving the quality of training of fully connected neural networks. Another purpose of the work is to estimate the accuracy of multigroup classification of firing pin impressions left by different firearms by using a neural network. The scientific novelty of this work is in the use of augmentation for creating images of firing pin impressions to increase the number of objects in the training dataset and to artificially improve the feature diversity of objects of each class. The conducted investigation shows that the accuracy of classification of the analyzed objects reaches approximately 84% for a fixed value of the classification criterion and 94–98% when the classification is carried out based on three maximum signals on output neurons. The work is of interest to developers of automated ballistic identification systems.

摘要 本文讨论了使用全连接神经网络对撞针印记图像进行分类的问题。这项工作的目的是研究克隆撞针印图像在提高全连接神经网络训练质量方面的有效性。这项工作的另一个目的是利用神经网络估算对不同枪支留下的撞针印进行多组分类的准确性。这项工作的科学创新之处在于使用增强技术创建撞针印记图像,以增加训练数据集中的对象数量,并人为地提高每一类对象的特征多样性。调查显示,在分类标准值固定的情况下,分析对象的分类准确率约为 84%,而根据输出神经元上的三个最大信号进行分类时,准确率为 94-98%。这项工作对自动弹道识别系统的开发者很有意义。
{"title":"Multigroup Classification of Firing Pin Impressions with the Use of a Fully Connected Neural Network","authors":"V. A. Fedorenko, K. O. Sorokina, P. V. Giverts","doi":"10.1134/s0361768824010031","DOIUrl":"https://doi.org/10.1134/s0361768824010031","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>This paper discusses the use of a fully connected neural network to classify images of firing pin impressions. The purpose of this work is to investigate the effectiveness of clone images of firing pin impressions in improving the quality of training of fully connected neural networks. Another purpose of the work is to estimate the accuracy of multigroup classification of firing pin impressions left by different firearms by using a neural network. The scientific novelty of this work is in the use of augmentation for creating images of firing pin impressions to increase the number of objects in the training dataset and to artificially improve the feature diversity of objects of each class. The conducted investigation shows that the accuracy of classification of the analyzed objects reaches approximately 84% for a fixed value of the classification criterion and 94–98% when the classification is carried out based on three maximum signals on output neurons. The work is of interest to developers of automated ballistic identification systems.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"14 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic-Numerical Implementation of the Model of Adiabatic Guided Modes for Two-Dimensional Irregular Waveguides 二维不规则波导绝热导模模型的符号-数值实现
IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-05-22 DOI: 10.1134/s0361768824020063
D. V. Divakov, A. A. Tyutyunnik, D. A. Starikov

Abstract

In this work, a symbolic-numerical solution of Maxwell’s equations is constructed, describing the guided modes of a two-dimensional smoothly irregular waveguide in the zeroth approximation of the model of adiabatic waveguide modes. The system of linear algebraic equations obtained in this approximation is solved symbolically. The dispersion relation is solved numerically using the parameter continuation method.

摘要 在这项工作中,构建了麦克斯韦方程的符号-数值解,以绝热波导模式模型的零近似来描述二维平滑不规则波导的导波模式。在此近似中得到的线性代数方程组用符号求解。利用参数延续法对频散关系进行了数值求解。
{"title":"Symbolic-Numerical Implementation of the Model of Adiabatic Guided Modes for Two-Dimensional Irregular Waveguides","authors":"D. V. Divakov, A. A. Tyutyunnik, D. A. Starikov","doi":"10.1134/s0361768824020063","DOIUrl":"https://doi.org/10.1134/s0361768824020063","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>In this work, a symbolic-numerical solution of Maxwell’s equations is constructed, describing the guided modes of a two-dimensional smoothly irregular waveguide in the zeroth approximation of the model of adiabatic waveguide modes. The system of linear algebraic equations obtained in this approximation is solved symbolically. The dispersion relation is solved numerically using the parameter continuation method.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"4 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Programming and Computer Software
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1