Reference:
Revnivykh A.V., Velizhanin A.S..
Methods for automated formation of a disassembled listing structure
// Cybernetics and programming.
2019. № 2.
P. 1-16.
DOI: 10.25136/2644-5522.2019.2.28272 URL: https://en.nbpublish.com/library_read_article.php?id=28272
Abstract:
The subject of the research is the method of splitting a disassembled code into logical blocks in automatic mode, searching for software vulnerabilities without using source code (using a binary file or its equivalent, obtained by reverse engineering).The object of the research is the existing code analyzers and features of their functionality.The aim of the study is to consider the possibility of splitting a disassembled code into logical blocks in automatic mode and some of the possible difficulties associated with this.Formulation of the problem. The complexity of analyzing large software products at the level of machine code necessitates the automation of this process. The research methodology is based on a combination of theoretical and empirical approaches using the methods of static and dynamic analysis, comparison, generalization, algorithmization, modeling, synthesis. Key findings. Splitting the code into blocks by sequential in line-by-line analysis of machine code in some cases can lead to misinterpretation. In addition, the analysis of the code according to the conclusions of the functions also does not guarantee the correctness of the determination of the boundaries of the functions. However, in general, the matrix method can be applied to analyze the dependencies of functions on the blocks of code thus selected.The scientific novelty is connected with the determination of promising vectors for the study of software code for vulnerability, the rationale for the approach (building the transition matrix from integer values), which may be the initial stage of preparation for the automated analysis of the disassembled code.
Keywords:
Matrix method, Adjacency matrix, IDA Pro utility, FASM compiler, Disassembling, Code analyses, Vulnerabilities, Information security, Code blocks, Matrix building algorithm
Reference:
Astakhova N., Demidova L., Nikulchev E..
Application of multiobjective pptimization for time series groups forecasting
// Cybernetics and programming.
2016. № 5.
P. 175-190.
DOI: 10.7256/2306-4196.2016.5.20414 URL: https://en.nbpublish.com/library_read_article.php?id=20414
Abstract:
In article the approach to forecasting of time series groups with use of technologies of the cluster analysis and the principles of multiobjective optimization has been offered. The description of time series – centroids of clusters with use of the forecasting models on the base of the strictly binary trees and the multiobjective modified clonal selection algorithm in case of which the implementation of two quality indicators of models – the affinity indicator based on calculation of an average forecasting relative error and the tendencies discrepancy indicator are involved in selection process of the best forecasting models has been developed. Accounting of quality two indicators of the forecasting model is realized with use of the Pareto-dominance principles applied when forming new populations of the forecasting models in the multiobjective modified clonal selection algorithm. Within the solution of a problem of multiobjective optimization when forming new population of the forecasting models for maintenance of its high variety it is offered to consider values of the crowding distance of the forecasting models. Prospects of application of the general forecasting models created on the base of the strictly binary trees for forecasting of the time series entering one cluster are shown. The results of experimental studies confirming the efficiency of the offered approach to short-term and mid-term forecasting of time series groups within the solution of a problem of multiobjective optimization are given.
Keywords:
tendencies discrepancy indicator, affinity indicator, multiobjective optimization, clonal selection algorithm, strictly binary tree, forecasting model, time series, average error rate, Pareto-dominance, crowding distance
Reference:
Giniyatullin V.M., Arslanov I.G., Bogdanova P.D., Gabitov R.N., Salikhova M.A..
Ways of implementing ternary logic functions
// Cybernetics and programming.
2014. № 2.
P. 1-31.
DOI: 10.7256/2306-4196.2014.2.11918 URL: https://en.nbpublish.com/library_read_article.php?id=11918
Abstract:
The source data is represented by three-dimensional truth table for 3-demensional functions of binary, ternary and mixed logics. The calculation of values of logic function is performed by geometric interpretations, disjunctive / conjunctive normal forms, non-fully connected artificial neural networks and perceptrons with hidden layer. The article reviews in detail the intermediate results of calculations in all given ways. The authors study properties of mixed logic functions: binary-ternary and 3-2 logics in cases of one, two and three dimensions. The article shows mutually equivalent implementations of logic functions in the form of DNF and non-fully connected artificial neural network. The authors perform replacement of continuous activation function on ternary threshold function. The study uses the methods of DNF constructing; direct synthesis of ANN weight matrices, perceptron is trained using Back Propagation algorithm, some conclusions are made by the laws of mathematical inductions. The paper shows that: Minimizations of neuron quantity in the perceptron hidden layer implicitly leads to the use of multiple-valued logics; Some functions of binary-ternary logics may be used for generating disjunctive forms; There is a decisive way of converting DNF to ANN and vice versa; In the one-dimension 3-2 logics there only 8 functions and all of them are listed; The suggested ANN structure can implement any other function of ternary logics of any dimensions.
Keywords:
three-valued logic, 3-2 logic, binary-ternary logic, perfect disjunctive form, activation function, separating hyperplane, perceptron, XOR problem, neural network training, Back Propagation algorithm
Reference:
Novakova N.E., Goryachev A.V., Goryachev A.A., Vasil'ev A.A., Monakhov A.V..
Project management system in computer-aided design
// Cybernetics and programming.
2013. № 4.
P. 1-13.
DOI: 10.7256/2306-4196.2013.4.8301 URL: https://en.nbpublish.com/library_read_article.php?id=8301
Abstract:
In the project activities related to the creation of complex technical objects, apply automation design. The design process seems different models depending on the purpose of the application of these models adopted forms or rules of their construction. The concept of a formal representation of the design process, described in the works of Yoshikawa, was further developed in the theory of computer-aided design. During the design stages of release, project procedures and project operations. Stage consists of design procedures, each of which in turn includes a number of project operations. Project operation is a separate step in the design. Each design proce- Mr. completed design decision. In practice, the design of controlled-use network model, which is an organizational tool for project management. The main elements of the network model are: work, and the way the event. In the model, a network schedule, the complex design procedures depicted as a directed graph, which reflects its logical sequence and duration of the relationship. Gantt Chart is the most obvious way of presenting the project schedule.
Keywords:
directed graph, network model, project, computer aided design, route design, project management, CAD, project activity, Gantt chart, design stages
Reference:
Malashkevich I.A., Malashkevich V.B..
The use of fortran linear algebra libraries in the delphi environment
// Cybernetics and programming.
2013. № 1.
P. 1-8.
DOI: 10.7256/2306-4196.2013.1.8314 URL: https://en.nbpublish.com/library_read_article.php?id=8314
Abstract:
The article presents the components and header modules written in Object Pascal, allowing to easy include libraries with such functions and procedures for numerical solution of linear-algebra as BLAS, LAPACK, ARPACK etc. written in FORTRAN. Using these libraries in modern programming languages such as C ++ or Object Pascal is hard due to significant problems associated with the methods of passing parameters to subroutines, as well as to the method of representation of an array in memory. Another serious problem is the numbering of the elements that start from 1 in FORTRAN. In Object Pascal considering this condition may require careful analysis and the modification of the algorithm for solving the problem. This greatly increases the complexity of programming and leads to hidden, difficult to detect algorithmic errors. To provide transparent access the routines of FORTRAN-libraries while programming in Object Pascal in Delphi environment the authors developed two classes of objects for representing one-dimensional arrays TVector and two-dimensional arrays TMatrix.
Keywords:
programming, TMatrix, TVector, Object Pascal, delphi, linear algebra, library, fortran, algorithm, subroutine