82 results
Search Results
2. On solutions of the Chazy equation
- Author
-
Kiryl G. Atrokhau and Elena V. Gromak
- Subjects
chazy equation ,chazy system ,painlevé property ,elliptic functions ,Mathematics ,QA1-939 - Abstract
The Chazy system determines the necessary and sufficient conditions for the absence of movable critical points of solutions of the particular third order differential equation that was considered by Chazy in one of the first papers on the classification of higher-order ordinary differential equations with respect to the Painlevé property. The solution of the complete Chazy system in the case of constant poles has been already obtained. However, the question of integrating the Chazy equation remained open until now. In this paper, we prove that in the case of constant poles, under some additional conditions, this equation is integrated in elliptic functions.
- Published
- 2021
- Full Text
- View/download PDF
3. On some properties of the lattice of totally σ-local formations of finite groups
- Author
-
Vasilly G. Safonov and Inna Nikolaevna Safonova
- Subjects
finite group ,formation σ-function ,formation of finite groups ,totally σ-local formation ,lattice of formations ,Mathematics ,QA1-939 - Abstract
Throughout this paper, all groups are finite. Let $σ=\{σ_i{}|i\in I\}$ be some partition of the set of all primes $\Bbb{P}$. If $n$ is an integer, $G$ is a group, and $\mathfrak{F}$ is a class of groups, then $σ(n)=\{σ_i{}|σ_i{}\cap \pi(n)\ne \emptyset\}$, $σ(G)=σ(|G|)$, and $σ(\mathfrak{F})=\cup _G{}_\in{}_\mathfrak{F}σ(G)$. A function $f$ of the form $f\colon σ\to$ {formations of groups} is called a formation σ-function. For any formation $σ$-function $f$ the class $LF_σ(f)$ is defined as follows: $LF_{\sigma}(f)=(G$ is a group $|G=1$ или $G\ne1$ and $G/O_σ{}'_i{}_,{}_σ{}_i{}(G)\in f(σ_i{})$ for all $σ_i{}\in σ(G))$. If for some formation $σ$-function $f$ we have $\mathfrak{F}=LF_{\sigma}(f)$, then the class $\mathfrak{F}$ is called $σ$-local definition of $\mathfrak{F}$. Every formation is called 0-multiply $σ$-local. For $n$ > 0, a formation $\mathfrak{F}$ is called $n$-multiply $σ$-local provided either $\mathfrak{F}=(1)$ is the class of all identity groups or $\mathfrak{F}=LF_{\sigma}(f)$, where $f(σ_i{})$ is $(n – 1)$-multiply $σ$-local for all $σ_i{}\in σ(\mathfrak{F})$. A formation is called totally $σ$-local if it is $n$-multiply $σ$-local for all non-negative integer $n$. The aim of this paper is to study properties of the lattice of totally $σ$-local formations. In particular, we prove that the lattice of all totally $σ$-local formations is algebraic and distributive.
- Published
- 2020
- Full Text
- View/download PDF
4. Chinese remainder theorem secret sharing in multivariate polynomials
- Author
-
Gennadii V. Matveev
- Subjects
secret sharing ,equiresidual ideals ,equiprojectable sets ,chinese remainder theorem ,Mathematics ,QA1-939 - Abstract
This paper deals with a generalization of the secret sharing using Chinese remainder theorem over the integers to multivariate polynomials over a finite field. We work with the ideals and their Gröbner bases instead of integer moduli. Therefore, the proposed method is called GB secret sharing. It was initially presented in our previous paper. Now we prove that any threshold structure has ideal GB realization. In a generic threshold modular scheme in ring of integers the sizes of the share space and the secret space are not equal. So, the scheme is not ideal and our generalization of modular secret sharing to the multivariate polynomial ring is more secure.
- Published
- 2019
- Full Text
- View/download PDF
5. Multi-server queueing system with reserve servers
- Author
-
Valentina I. Klimenok
- Subjects
queuing system ,reserve servers ,batch markovian arrival process ,phase type distribution ,stationary distribution ,performance characteristics ,Mathematics ,QA1-939 - Abstract
In this paper, we investigate a multi-server queueing system with an unlimited buffer, which can be used in the design of energy consumption schemes and as a mathematical model of unreliable real stochastic systems. Customers arrive to the system in a batch Markovian arrival process, the service times are distributed according to the phase law. If the service time of the customer by the server exceeds a certain random value distributed according to the phase law, this server receives assistance from the reserve server from a finite set of reserve servers. In the paper, we calculate the stationary distribution and performance characteristics of the system.
- Published
- 2019
- Full Text
- View/download PDF
6. On some classes of sublattices of the subgroup lattice
- Author
-
Alexander N. Skiba
- Subjects
group ,subgroup lattice ,modular lattice ,formation fitting set ,fitting formation ,Mathematics ,QA1-939 - Abstract
In this paper G always denotes a group. If K and H are subgroups of G, where K is a normal subgroup of H, then the factor group of H by K is called a section of G. Such a section is called normal, if K and H are normal subgroups of G, and trivial, if K and H are equal. We call any set S of normal sections of G a stratification of G, if S contains every trivial normal section of G, and we say that a stratification S of G is G-closed, if S contains every such a normal section of G, which is G-isomorphic to some normal section of G belonging S. Now let S be any G-closed stratification of G, and let L be the set of all subgroups A of G such that the factor group of V by W, where V is the normal closure of A in G and W is the normal core of A in G, belongs to S. In this paper we describe the conditions on S under which the set L is a sublattice of the lattice of all subgroups of G and we also discuss some applications of this sublattice in the theory of generalized finite T-groups.
- Published
- 2019
- Full Text
- View/download PDF
7. Properties and applications of G-orbits polynomial invariants of errors in reverse codes
- Author
-
Alexander V. Kushnerov and Valery A. Lipnitski
- Subjects
error correcting codes ,code minimal distance ,reverse codes ,bch codes ,norm method of error correction ,Mathematics ,QA1-939 - Abstract
In this paper is described a twostep procedure for polynomialnorm error correction with reverse error correcting codes. Such codes of length n traditionally are defined by check matrix HR = (βi,β−i)T, 0 ≤ i ≤ n – 1, β = α(2m−1)/n and α is primitive element of GF(2m). Also in paper you can find a description of error correction algorithm and an example based on reverse code of length 89.
- Published
- 2019
8. Perfect verification of modular scheme
- Author
-
Gennadii V. Matveev and Vladislav V. Matulis
- Subjects
polynomial modular scheme ,secret sharing ,verification ,secret ,partial secret ,finite field ,Mathematics ,QA1-939 - Abstract
Secret sharing schemes are used to distribute a secret value among a group of users so that only authorized set of them can reconstruct the original secret correctly. The modular secret sharing scheme (MSSS) we are studying is based on the Chinese Remainder Theorem. In this scheme the secrets s(x), S(x), s1(x),…, sk(x) are defined as follows s(x) = S(x) = mod m(x), si(x) = S(x) mod mi(x), i = 1, 2, …, k. All the secrets and moduli are chosen from polynomial ring Fp[x], and the reconstruction of secret s(x) is carried out by applying the above-mentioned Chinese Remainder Theorem. The verification of any secret sharing scheme is understood as the protocol of verification by the participants of their partial secrets and (or) the protocol for verifying the legitimacy of the actions of the dealer. In this paper, we introduce a perfect verification protocol of MSSS. It means that none information leaks under distribution and verification. Two verification protocols are introduced in this paper. The first one is simpler and it depends on assumption about dealer honesty. If there is no such assumption verification is more complex. Both protocols are based on one work by J. Benalo and generalize the protocol proposed earlier by M. Vaskovsky and G. Matveev in two ways. First, the general, not only the threshold access structure is verified, and secondly, the dealer is not necessarily honest. Earlier, N. Shenets found the perfection condition of MSSS. Thus, if these conditions аre met, both the MSSS and its verification protocol are perfect.
- Published
- 2018
9. Introduction of the Kullback – Leibler information function by means of partitions of the probability space
- Author
-
Edvard E. Sokal
- Subjects
kullback – leibler information function ,t-entropy ,Mathematics ,QA1-939 - Abstract
In the paper we study the equivalence problem of two definitions of the Kullback – Leibler information function. It is commonly defined by integration of the logarithm of the density of one probability measure with respect to another. On the other hand, recently a concept of t-entropy of a dynamical system (that is a generalization of the information function) is actively explored, and this concept is defined by means of measurable partitions of the phase space. In the paper we investigate in which situations the two definitions are equivalent and in which ones they are not. In particular, the equivalence holds if both measures are finite.
- Published
- 2018
10. Detection of human body parts on the image using the neural networks and the attention model
- Author
-
Viktoria V. Sorokina and Sergey V. Ablameyko
- Subjects
human body parts detection ,attention model ,convolutional neural network ,smart cropping ,Mathematics ,QA1-939 - Abstract
Human body parts detection is a challenging task, which has a lot of applications. In this paper, we propose an algorithm to detect human body parts on images using the OpenPose neural network and the attention model. The novelty of the proposed algorithm is that it is based on a convolutional neural network that uses non-parametric representation to associate the body parts with people in an image in combination with the attention model that learns to focus on specific regions of the input image. The algorithm is part of the Smart Cropping system developed by the authors with the aim to cut necessary pieces of clothing in images and prepare e-commerce catalogues.
- Published
- 2022
- Full Text
- View/download PDF
11. Mathematical modelling of salt ion transfer in the three-dimensional desalting channel of an electrodialysis apparatus
- Author
-
Anna V. Kovalenko and Anna V. Ovsyannikova
- Subjects
3d mathematical model of transport ,3d model ,three-dimensional model ,membrane systems ,ion exchange membrane ,mathematical modelling ,electroconvective vortices ,direct numerical simulation ,Mathematics ,QA1-939 - Abstract
A new 3D model of 1:1 salt ion transfer in the desalting channel of an electrodialysis apparatus is presented and investigated in this paper. For the first time a three-dimensional mathematical model of salt ion transfer in the desalting channel taking into account the electroconvection based on the system of Nernst – Planck, Poisson and Navier – Stokes equations with the electric force and the natural boundary conditions is proposed. To solve the boundary value problem, the finite element method is used in the cross-platform numerical analysis software COMSOL Multiphysics in combination with the method of successive approximations, when the electrochemical and hydrodynamic parts of the problem are solved one by one on the current layer. In turn, the electrochemical and hydrodynamic parts of the problem are solved by Newton’s method. As a result of numerical analysis, the fundamental regularities of salt ion transfer in a three-dimensional channel, the emergence and development of electroconvective vortices, including the discovery of new three-dimensional spiral forms of salt ions, are established for the first time. It is shown that electroconvective vortices exist in the form of clusters, within which vortex bifurcations can occur. Thus, the currently existing simplified view of the structure of electroconvective vortices is clarified and developed.
- Published
- 2022
- Full Text
- View/download PDF
12. A method for relaxing state constraints in nonsmooth optimal control problems
- Author
-
Michael P. Dymkov and Siarhey M. Dymkou
- Subjects
optimal control ,state constraints ,nonsmooth optimisation ,approximation ,Mathematics ,QA1-939 - Abstract
In this paper, we consider the optimal control problem described by a system of ordinary differential equations in the presence of state constraints. Theoretical results are obtained concerning the approximation of this problem by a sequence of new optimal control problems with a modified right-hand side of the control system and no state constraints. The issues of the approximation of continuous control systems by their discrete versions are also discussed.
- Published
- 2022
- Full Text
- View/download PDF
13. On meromorphic solutions of the equations related to the first Painlevé equation
- Author
-
Elena V. Gromak
- Subjects
the first painlevé equation ,hierarchies of painlevé equations ,meromorphic solutions ,Mathematics ,QA1-939 - Abstract
In this paper, we consider the generalised hierarchy of the first Painlevé equation which is a sequence of polynomial ordinary differential equations of even order that have a uniform differential-algebraic structure determined by the operator L~n. The first member of this hierarchy for n = 2 is the first Painlevé equation, and the subsequent equations of order 2n – 2 contain arbitrary parameters. They are named as higher analogues of the first Painlevé equation of 2n – 2 order. The article considers the analytical properties of solutions to the equations of the generalised hierarchy of the first Painlevé equation and the related linear equations. It is established that each hierarchy equation has one dominant term, and an arbitrary meromorphic solution of any hierarchy equation cannot have a finite number of poles. The character of the mobile poles of meromorphic solutions is determined. Using the Frobenius method, sufficient conditions are obtained for the meromorphicity of the general solution of the second-order linear equations with a linear potential defined by meromorphic solutions of the first three equations of the hierarchy.
- Published
- 2022
- Full Text
- View/download PDF
14. On associated solutions of the system of non-autonomous differential equations in the Lebesgue spaces
- Author
-
Anastasia I. Zhuk and Helena N. Zashchuk
- Subjects
algebra of new generalised functions ,differential equations with generalised coefficients ,functions of finite variation ,Mathematics ,QA1-939 - Abstract
Herein, we investigate systems of non-autonomous differential equations with generalised coefficients using the algebra of new generalised functions. We consider a system of non-autonomous differential equations with generalised coefficients as a system of equations in differentials in the algebra of new generalised functions. The solution of such a system is a new generalised function. It is shown that the different interpretations of the solutions of the given systems can be described by a unique approach of the algebra of new generalised functions. In this paper, for the first time in the literature, we describe associated solutions of the system of non-autonomous differential equations with generalised coefficients in the Lebesgue spaces Lp(T).
- Published
- 2022
- Full Text
- View/download PDF
15. Monotonicity of random walks’ states on finite grids
- Author
-
Anna O. Zadorozhnuyk
- Subjects
random walks ,resistance distance ,grids ,Mathematics ,QA1-939 - Abstract
In this paper two ways to order the nodes of a graph with respect to an arbitrary node are considered, both connected to random walks on the graph. The first one is the order according to probabilities of states of a random walk of fixed length started in that arbitrary node. The walks considered here are lazy walks – instead of making a step they are allowed to stay in the same node. A class of graphs, where such order the corresponds to the weak order by geodesic distances, was found. Square and toric n-dimensional grids are shown to be instances of this class. The second way of ordering is resistance distance to a fixed node. For another class of graphs, a pair of vertices with maximal resistance distance between them is established. Grids are again shown to be an example of graphs belonging to this class.
- Published
- 2022
- Full Text
- View/download PDF
16. Space semantic aware loss function for embedding creation in case of transaction data
- Author
-
Maksim Vatkin and Dmitry A. Vorobey
- Subjects
data ,embedding ,vector ,loss function ,autoencoder ,Mathematics ,QA1-939 - Abstract
Transaction data are the most popular data type of bank domain, they are often represented as sparse vectors with a large number of features. Using sparse vectors in deep learning tasks is computationally inefficient and may lead to overfitting. Аutoencoders are widely applied to extract new useful features in a lower dimensional space. In this paper we propose to use a novel loss function based on the metric that estimates the quality of mapping the semantic structure of the original tabular data to the embedded space. The proposed loss function allows preserving the item relation structure of the original space during the dimension reduction transformation. The obtained results show the improvement of the resulting embedding properties while using the combination of the new loss function and the traditional mean squared error one.
- Published
- 2022
- Full Text
- View/download PDF
17. On local invertibility of functions of an h-complex variable
- Author
-
Vladislav A. Pavlovsky and Igor L. Vasiliev
- Subjects
h-holomorphy ,local invertibility ,domain preservation principle ,norm maximum principle ,ring of h-complex numbers ,zero divisors ,Mathematics ,QA1-939 - Abstract
The theory of functions of an h-complex variable is an alternative to the usual theory of functions of a complex variable, obtained by replacing the rules of multiplication. This change leads to the appearance of zero divisors on the set of h-complex numbers. Such numbers form a commutative ring that is not a field. h-Holomorphic functions are solutions of systems of equations of hyperbolic type, in comparison with classical holomorphic functions, which are solutions of systems of equations of elliptic type. A consequence of this is a significant difference between the properties of h-holomorphic functions and the classical ones. Interest in studying the properties of functions of an h-complex variable is associated with the need to search for new methods for solving problems in mechanics and the plane theory of relativity. The paper presents a theorem on the local invertibility of h-holomorphic functions, formulates the principles of preserving the domain and maximum of the norm.
- Published
- 2022
- Full Text
- View/download PDF
18. The birational composition of arbitrary quadratic form with binary quadratic form
- Author
-
Alexandr A. Bondarenko
- Subjects
quadratic form ,birational equivalence ,birational composition ,Mathematics ,QA1-939 - Abstract
Let f(X) and g(Y) be nondegenerate quadratic forms of dimensions m and n respectively over a field K, charK ≠ 2. Herein, the problem of the birational composition of f(X) and g(Y) is considered, namely, the condition is established when the product f(X)g(Y) is birationally equivalent over K to a quadratic form h(Z) over K of dimension m + n? The main result of this paper is the complete solution of the problem of the birational composition for quadratic forms f(X) and g(Y) over a field K when m = 2. The sufficient and necessary conditions for the existence of birational composition h(Z) for quadratic forms f(X) and g(Y) over a field K for m = 2 are obtained. The set of quadratic forms is described which can be considered as h(Z) in this case.
- Published
- 2022
- Full Text
- View/download PDF
19. Methods of intellectual data analysis in COVID-19 research
- Author
-
Oleg V. Senko, Anna V. Kuznetsova, Evgeny M. Voronin, Olga A. Kravtsova, Ludmila R. Borisova, Igor L. Kirilyuk, and Vasiliy G. Akimkin
- Subjects
cluster analysis ,machine learning methods ,statistics ,epidemiological process ,covid-19 ,Mathematics ,QA1-939 - Abstract
The paper presents an original method for solving the problem of finding a connection between the course of the epidemic and socio-economic, demographic and climatic factors. The method was applied to solve this problem for 110 countries of the world using a set of corresponding curves of the COVID-19 growth rate for the period from January 2020 to August 2021. Hierarchical agglomerative clustering was applied. Four large clusters with uniform curves were identified – 11, 39, 17 and 13 countries, respectively. Another 30 countries were not included in any cluster. Using machine learning methods, we identified the differences in socio-economic, demographic and geographical and climatic indicators in the selected clusters of countries of the world. The most important indicators by which the clusters differ from each other are amplitude of temperatures throughout the year, high-tech exports, Gini coefficient, size of the urban population and the general population, index of net barter terms of trade, population growth, average January temperature, territory (land area), number of deaths due to natural disasters, birth rate, coastline length, oil reserves, population in urban agglomerations with a population of more than 1 million etc. This approach (the use of clustering in combination with classification by methods of logical-statistical analysis) has not been used by anyone before. The found patterns will make it possible to more accurately predict the epidemiological process in countries belonging to different clusters. Supplementing this approach with autoregressive models will automate the forecast and improve its accuracy.
- Published
- 2022
- Full Text
- View/download PDF
20. On the embedding of the Ω-saturation of a topological space
- Author
-
Aliaksandr S. Biadrytski and Vladimir L. Timokhovich
- Subjects
saturation of a topological space ,countably-compactification in the sense of morita ,ω-saturation of a topological space ,wallman compactification ,∆-base ,stone – čech compactification ,Mathematics ,QA1-939 - Abstract
The countably-compactification of a topological space X is such its extension Y, that Y is a completely regular and countably-compact space, and any closed countably-compact subset of X is closed in Y. But this extension does not always exist. Due to this, the concept of a saturation of a topological space appeared, which is a generalisation of the countably-compactification: instead of the condition of the countably-compactness of Y, it is necessary that any infinite subset of X has a limit point in Y. Meanwhile, the second condition remains unchanged. Such an extension is already defined for any T1-space. In this paper we consider a specific construction of saturation named as Ω-saturation. It is proved that under some additional (necessary and sufficient) condition to the separation of the initial space X, its Ω-saturation is canonically embedded in the Stone – Čech compactification βX. An analogous result is obtained for the countably-compactification by K. Morita.
- Published
- 2022
- Full Text
- View/download PDF
21. On the power of tests of multidimensional discrete uniformity used for statistical analysis of random number generators
- Author
-
Valeriy A. Voloshko and Anton I. Trubey
- Subjects
power of a test ,serial test ,test of multidimensional discrete uniformity ,contiguous alternatives ,non-central chi-squared distribution ,random number generator ,markov chain ,Mathematics ,QA1-939 - Abstract
In this paper, we obtained the asymptotic power values for the statistical tests of multidimensional discrete uniformity under conditions of contiguous convergence of alternatives. Two versions of the test are considered, namely, with overlapping blocks (included in the NIST SP 800-22 test suit) and with non-overlapping blocks. The null hypothesis H0 is related to the so-called pure randomness of the observed sequence, i. e. independence and the same uniform distribution of its elements. An alternative H1 is assumed to be a Markov chain of some arbitrary fixed finite order.
- Published
- 2022
- Full Text
- View/download PDF
22. Designing a secure fail-safe cloud repository of paperworks of students and employees of educational institutions
- Author
-
Viktor P. Kochyn and Anatolii V. Zherelo
- Subjects
cloud computing ,information systems design ,educational technologies ,secure cloud storage ,virtualisation ,network infrastructure ,Mathematics ,QA1-939 - Abstract
The article discusses the main approaches to the design and development of an automated information system for a secure cloud repository of paperworks of students and employees of educational and research organisations (abstracts, essays, term papers and theses, master’s theses, deposited articles), providing secure storage and secure mobile access to stored data. The research and development of architectural solutions to ensure reliable and secure data storage using cloud technologies are described. The main problems of designing a secure repository and ways to solve them are considered. The cloud repository of written works is built on the basis of the Ceph distributed file system, which uses the NextCloud system and the virtual computing resources of the virtual network infrastructure of the Belarusian State University as a platform for building a cloud interface.
- Published
- 2021
- Full Text
- View/download PDF
23. Contribution of Jonas Kubilius to the metric theory of Diophantine approximation of dependent variables
- Author
-
Victor V. Beresnevich, Vasily I. Bernik, Friedrich Götze, Elena V. Zasimovich, and Nikolai I. Kalosha
- Subjects
j. kubilius ,diophantine approximation ,mahler’s conjecture ,metric number theory ,transcendence and algebraic numbers ,Mathematics ,QA1-939 - Abstract
The article is devoted to the latest results in metric theory of Diophantine approximation. One of the first major result in area of number theory was a theorem by academician Jonas Kubilius. This paper is dedicated to centenary of his birth. Over the last 70 years, the area of Diophantine approximation yielded a number of significant results by great mathematicians, including Fields prize winners Alan Baker and Grigori Margulis. In 1964 academician of the Academy of Sciences of BSSR Vladimir Sprindžuk, who was a pupil of academician J. Kubilius, solved the well-known Mahler’s conjecture on the measure of the set of S-numbers under Mahler’s classification, thus becoming the founder of the Belarusian academic school of number theory in 1962.
- Published
- 2021
- Full Text
- View/download PDF
24. Random walks on Cayley graphs of complex reflection groups
- Author
-
Maksim M. Vaskouski
- Subjects
complex reflection groups ,cayley graphs ,random walks ,expander graphs ,Mathematics ,QA1-939 - Abstract
Asymptotic properties of random walks on minimal Cayley graphs of complex reflection groups are investigated. The main result of the paper is theorem on fast mixing for random walks on Cayley graphs of complex reflection groups. Particularly, bounds of diameters and isoperimetric constants, a known result on fast fixing property for expander graphs play a crucial role to obtain the main result. A constructive way to prove a special case of Babai’s conjecture on logarithmic order of diameters for complex reflection groups is proposed. Basing on estimates of diameters and Cheeger inequality, there is obtained a non-trivial lower bound for spectral gaps of minimal Cayley graphs on complex reflection groups.
- Published
- 2021
- Full Text
- View/download PDF
25. Statistical sequential hypotheses testing on para meters of probability distributions of random binary data
- Author
-
Alexey Yu. Kharin
- Subjects
random binary data ,simple hypotheses ,statistical sequential test ,error probability ,mathematical expectation of the random number of observations ,«contamination» ,asymptotic expansions ,Mathematics ,QA1-939 - Abstract
An important mathematical problem of computer data analysis – the problem of statistical sequential testing of simple hypotheses on parameters of probability distributions of observed binary data – is considered in the paper. This problem is being solved for two models of observation: for independent observations and for homogeneous Markov chains. Explicit expressions of the sequential tests statistics are derived, transparent for interpretation and convenient for computer realisation. An approach is developed to calculate the performance characteristics – error probabilities and mathematical expectations of the random number of observations required to guarantee the requested accuracy for decision rules. Asymptotic expansions for the mentioned performance characteristics are constructed under «contamination» of the probability distributions of observed data.
- Published
- 2021
- Full Text
- View/download PDF
26. A method for constructing an optimal control strategy in a linear terminal problem
- Author
-
Dzmitry A. Kastsiukevich and Natalia M. Dmitruk
- Subjects
linear system ,disturbance ,optimal control ,control strategy ,algorithm ,Mathematics ,QA1-939 - Abstract
This paper deals with an optimal control problem for a linear discrete system subject to unknown bounded disturbances, where the control goal is to steer the system with guarantees into a given terminal set while minimising the terminal cost function. We define an optimal control strategy which takes into account the state of the system at one future time instant and propose an efficient numerical method for its construction. The results of numerical experiments show an improvement in performance under the optimal control strategy in comparison to the optimal open-loop worst-case control while maintaining comparable computation times.
- Published
- 2021
- Full Text
- View/download PDF
27. Solution of one hypersingular integro-differential equation defined by determinants
- Author
-
Andrei P. Shilin
- Subjects
inregro-differential equations ,hypersingular integrals ,generalised sokhotsky formulas ,differential equations ,riemann boundary problem ,Mathematics ,QA1-939 - Abstract
The paper provides an exact analytical solution to a hypersingular inregro-differential equation of arbitrary order. The equation is defined on a closed curve in the complex plane. A characteristic feature of the equation is that if is written using determinants. From the view of the traditional classification of the equations, it should be classified as linear equations with vatiable coefficients of a special form. The method of analytical continuation id applied. The equation is reduced to a boundary value problem of linear conjugation for analytic functions with some additional conditions. If this problem is solvable, if is required to solve two more linear differential equations in the class of analytic functions. The conditions of solvability are indicated explicitly. When these conditions are met, the solution can also be written explicitly. An example is given.
- Published
- 2021
- Full Text
- View/download PDF
28. Identification of Earth’s surface objects using ensembles of convolutional neural networks.
- Author
-
Evgenii E. Marushko, Alexander A. Doudkin, and Xiangtao Zheng
- Subjects
convolutional neural network ,support vector machine ,neural network ensemble ,earth’s surface image ,remote sensing ,identification ,synthetic aperture radar ,Mathematics ,QA1-939 - Abstract
The paper proposes an identification technique of objects on the Earth’s surface images based on combination of machine learning methods. Different variants of multi-layer convolutional neural networks and support vector machines are considered as original models. A hybrid convolutional neural network that combines features extracted by the neural network and experts is proposed. Optimal values of hyperparameters of the models are calculated by grid search methods using k-fold cross-validation. The possibility of improving the accuracy of identification based on the ensembles of these models is shown. Effectiveness of the proposed technique is demonstrated by the example of images obtained by synthetic aperture radar.
- Published
- 2021
- Full Text
- View/download PDF
29. Algorithm for forest fire smoke detection in video
- Author
-
Rykhard P. Bohush and Sergey V. Ablameyko
- Subjects
forest fire ,image analysis ,background ,covariance descriptors ,support vector machine ,Mathematics ,QA1-939 - Abstract
In this paper, an efficient forest smoke detection algorithm in video sequences obtained from a stationary camera is proposed. The algorithm composed of three basic steps. At the first step, the frame contrast is improved. After that detection of slowly moving areas is performed based on dynamic and static features. For this we use adaptive background subtraction and color segmentation. The detected areas are divided into small blocks. Spatio-temporal analysis is applied to them. Blocks are classified based on covariance descriptors and support vector machine with a radial basis kernel function. Experimental results for processing real video show effectiveness of our algorithm for early forest smoke detection.
- Published
- 2021
- Full Text
- View/download PDF
30. Graphs of intersections of closed polygonal chains
- Author
-
Nikolai P. Prochorov and Ekaterina N. Dul
- Subjects
intersection graph ,intersection graph of closed polygonal chains ,regular graph ,np-completeness ,polynomial-time reduction ,Mathematics ,QA1-939 - Abstract
In the paper such subclass of string graphs as intersection graphs of closed polygonal chains (class of CPC-graphs) was considered, necessary conditions for belonging to that class, forbidden subgraphs and operations with graphs which preserve belonging to the CPC class were found. Considered question about the existence of k-regular CPC-graphs, particularly, pairs (k, n), such that there exists k-regular CPC-graph on n vertexes were found, proved that there are infinitely many k-regular CPC-graphs for any k ∈ N, estimations for the number of k, such that k-regular graph on n vertexes exists, were given. Algorithmic questions in the class of CPC-graphs were investigated. It was proved that independent and dominating set problems, coloring problem and the problem about maximal cycle are NP-hard in the class of CPC-graphs, and problem of recognition of the CPC-graphs belongs to the PSPACE class.
- Published
- 2021
- Full Text
- View/download PDF
31. Deformable Voronoi model for the research of the plane stress-strain state
- Author
-
Victor V. Chaiko and Oleg L. Konovalov
- Subjects
numerical experiment ,discrete element modelling ,microstructural parameters ,stress-strain state ,deformable voronoi ,Mathematics ,QA1-939 - Abstract
The paper considers an approach to modelling geomechanical processes based on the internal forces method. In particular, the problem of non-invariance of the method to rotations is investigated. An original modification of the method based on additional central forces determined by deformations of adjacent Voronoi cells is proposed. An analytical relationship between the parameters of the microstructural model and the elastic properties of the simulated material is obtained. The results of numerical experiments to verify this relationship and the accuracy of modelling the stress-strain state are presented.
- Published
- 2021
- Full Text
- View/download PDF
32. Application of formal methods in the design of a single window system
- Author
-
Raman E. Sharykin
- Subjects
mathematical modelling ,stochastic systems ,statistical analysis ,model specification ,document circulation ,single window systems ,Mathematics ,QA1-939 - Abstract
This paper proposes an approach that demonstrates the development of single window document circulation systems at the early stage of their design, based on the use of formal methods in the specification of a system, the specification of metrics for its analysis and the estimation of metrics values. An example of a single window document circulation system is modeled formally within the framework of the distributed object-based stochastic hybrid systems (DOBSHS) model using the SHYMaude specification language. Several metrics are proposed to evaluate the system. These metrics are specified formally using the QuaTEx language. The system is analyzed statistically using the MultiVeStA tool, which analyzes a single window document circulation system, represented as a rewriting logic Maude specification obtained by the translation of the SHYMaude system specification. In the process of the statistical analysis, the number of employees required for the effective system functioning is determined. The resulting value is used as a starting value in an extended system, in which there is an officer number management maintaining the length of the application queue in the desired range. A statistical study of the extended system reveals a drawback that is eliminated by adjusting the system, showing how this approach can be used to study and refine systems of this type at the early stage of designing the system model itself.
- Published
- 2021
- Full Text
- View/download PDF
33. Optimisation problem for some class of hybrid differential-difference systems with delay
- Author
-
Michael P. Dymkov
- Subjects
differential-difference system ,delayed argument ,time optimal control problem ,Mathematics ,QA1-939 - Abstract
In the paper, the linear differential-difference dynamic systems with delayed arguments are considered. Such systems have a lot of application areas, in particular, processes with repetitive and learning structure. We apply the method of the separation hyperplane theorem for convex sets to establish optimality conditions for the control function to drive the trajectory to zero equilibrium state in the fastest possible way. For the special case of the integral control constraints, the proposed method is detailed to establish an analytical form of the optimal control function. The illustrative example is given to demonstrate the obtained results with the step-by-step calculation of the basic elements of the optimal control.
- Published
- 2021
- Full Text
- View/download PDF
34. Linear semidefinite programming problems: regularisation and strong dual formulations
- Author
-
Olga I. Kostyukova and Tatiana V. Tchemisova
- Subjects
linear semidefinite programming ,strong duality ,normalised immobile index set ,regularisation ,constraint qualifications ,Mathematics ,QA1-939 - Abstract
Regularisation consists in reducing a given optimisation problem to an equivalent form where certain regularity conditions, which guarantee the strong duality, are fulfilled. In this paper, for linear problems of semidefinite programming (SDP), we propose a regularisation procedure which is based on the concept of an immobile index set and its properties. This procedure is described in the form of a finite algorithm which converts any linear semidefinite problem to a form that satisfies the Slater condition. Using the properties of the immobile indices and the described regularization procedure, we obtained new dual SDP problems in implicit and explicit forms. It is proven that for the constructed dual problems and the original problem the strong duality property holds true.
- Published
- 2020
- Full Text
- View/download PDF
35. Statistical forecasting of the dynamics of epidemiological indicators for COVID-19 incidence in the Republic of Belarus
- Author
-
Yuriy S. Kharin, Valery A. Valoshka, Oksana V. Dernakova, Vladimir I. Malugin, and Alexey Yu. Kharin
- Subjects
forecasting, probability model, time series, point forecast, interval forecast, covid-19 ,Mathematics ,QA1-939 - Abstract
The paper is devoted to the urgent problem of statistical forecasting for the dynamics of the main epidemiological indicators for the COVID-19 pandemic in the Republic of Belarus based on the observed time series. To solve this problem, five methods are proposed: forecasting method based on «moving trends»; local-median forecasting method; forecasting method based on discrete time series; forecasting method based on the vector econometric error correction model; method of sequential statistical analysis. Algorithms for computation of point and interval forecasts for the main epidemiological indicators have been developed. The numerical results of computer forecasting are presented on the example of the Republic of Belarus.
- Published
- 2020
- Full Text
- View/download PDF
36. Hidden Markov model for malicious hosts detection in a computer network
- Author
-
Yakov V. Bubnov and Nick N. Ivanov
- Subjects
hidden markov model ,computer network ,advanced persisted threat ,timeseries classification ,Mathematics ,QA1-939 - Abstract
The problem of malicious host detection in a computer network is reviewed. Activity of computer network hosts is tracking by a noisy detector. The paper suggests method for detection malicious hosts using activity timeseries classification. The approach is based on hidden Markov chain model that analyses timeseries and consecutive search of the most probable final state of the model. Efficiency of the approach is based on assumption that advanced persisted threats are localised in time, therefore malicious hosts in a computer network can be detected by virtue of activity comparison with reliable safe hosts.
- Published
- 2020
- Full Text
- View/download PDF
37. D-optimal experimental designs for linear multiple regression under heteroscedastic observations
- Author
-
Valery P. Kirlitsa
- Subjects
d-optimal experimental designs ,linear multiple regression ,heteroscedastic observations ,Mathematics ,QA1-939 - Abstract
The problem of construction of «continuous» (number of observations is not fixed) and «exact» (number of observations is fixed) D-optimal experimental designs for linear multiple regression in the case when variance of errors of observations depends on regressor value is studied in this paper. Families of functions that determine heteroscedastic observations are found for which it is possible to construct «continuous» and «exact» D-optimal experimental designs. «Continuous» D-optimal experimental designs under four different types of heteroscedasticity are constructed for linear multiple regression with three regressors.
- Published
- 2020
- Full Text
- View/download PDF
38. Hausdorff operators on homogeneous spaces of locally compact groups
- Author
-
Adolf R. Mirotin
- Subjects
hausdorff operator ,locally compact group ,homogeneous space ,atomic hardy space ,lebesgue space ,bounded operator ,Mathematics ,QA1-939 - Abstract
Hausdorff operators on the real line and multidimensional Euclidean spaces originated from some classical summation methods. Now it is an active research area. Hausdorff operators on general groups were defined and studied by the author since 2019. The purpose of this paper is to define and study Hausdorff operators on Lebesgue and real Hardy spaces over homogeneous spaces of locally compact groups. We introduce in particular an atomic Hardy space over homogeneous spaces of locally compact groups and obtain conditions for boundedness of Hausdorff operators on such spaces. Several corollaries are considered and unsolved problems are formulated.
- Published
- 2020
- Full Text
- View/download PDF
39. Asymptotic properties of M-estimator for GARCH(1, 1) model parameters
- Author
-
Uladzimir S. Tserakh
- Subjects
garch model ,parameter estimation ,consistency ,asymptotic distribution ,m-estimator ,Mathematics ,QA1-939 - Abstract
GARCH(1, 1) model is used for analysis and forecasting of financial and economic time series. In the classical version, the maximum likelihood method is used to estimate the model parameters. However, this method is not convenient for analysis of models with residuals distribution different from normal. In this paper, we consider M-estimator for the GARCH(1, 1) model parameters, which is a generalization of the maximum likelihood method. An algorithm for constructing an M-estimator is described and its asymptotic properties are studied. A set of conditions is formulated under which the estimator is strictly consistent and has an asymptotically normal distribution. This method allows to analyze models with different residuals distributions; in particular, models with stable and tempered stable distributions that allow to take into account the features of real financial data: volatility clustering, heavy tails, asymmetry.
- Published
- 2020
- Full Text
- View/download PDF
40. On one rational integral operator of Fourier – Chebyshev type and approximation of Markov functions
- Author
-
Pavel G. Patseika, Yauheni A. Rouba, and Kanstantin A. Smatrytski
- Subjects
markov function ,integral rational operator of fourier type ,chebyshev – markov rational function ,majorant of uniform approximation ,asymptotic estimate ,best approximation ,exact constant ,Mathematics ,QA1-939 - Abstract
The purpose of this paper is to construct an integral rational Fourier operator based on the system of Chebyshev – Markov rational functions and to study its approximation properties on classes of Markov functions. In the introduction the main results of well-known works on approximations of Markov functions are present. Rational approximation of such functions is a well-known classical problem. It was studied by A. A. Gonchar, T. Ganelius, J.-E. Andersson, A. A. Pekarskii, G. Stahl and other authors. In the main part an integral operator of the Fourier – Chebyshev type with respect to the rational Chebyshev – Markov functions, which is a rational function of order no higher than n is introduced, and approximation of Markov functions is studied. If the measure satisfies the following conditions: suppμ = [1, a], a > 1, dμ(t) = ϕ(t)dt and ϕ(t) ἆ (t − 1)α on [1, a] the estimates of pointwise and uniform approximation and the asymptotic expression of the majorant of uniform approximation are established. In the case of a fixed number of geometrically distinct poles in the extended complex plane, values of optimal parameters that provide the highest rate of decreasing of this majorant are found, as well as asymptotically accurate estimates of the best uniform approximation by this method in the case of an even number of geometrically distinct poles of the approximating function. In the final part we present asymptotic estimates of approximation of some elementary functions, which can be presented by Markov functions.
- Published
- 2020
- Full Text
- View/download PDF
41. Combined algorithm for bone age determination based on hand X-rays analysis
- Author
-
Alexander M. Nedzved, Ivan I. Kosik, and Ryhor M. Karapetsian
- Subjects
bone age ,x-ray ,radiograph ,image processing ,activation map ,convolutional neural network ,automation of diagnostics ,Mathematics ,QA1-939 - Abstract
In this paper, we investigate the urgent problem associated with bone age determination using hand X-rays. A combined algorithm for the recognition of radiographs is proposed, which uses simultaneous two neural network models, based on Xception and DenseNet169. The method allows to generalize the knowledge of different medical experts and increases the accuracy of bone age prediction in general.
- Published
- 2020
- Full Text
- View/download PDF
42. Influence of boundary constraints on the appearance of asymmetrical equilibrium states in circular plates under normal pressure
- Author
-
Svetlana M. Bauer and Eva B. Voronkova
- Subjects
circular plate ,buckling ,heterogeneity ,Mathematics ,QA1-939 - Abstract
Unsymmetrical buckling of nonuniform circular plates with elastically restrained edge and subjected to normal pressure is studied in this paper. The unsymmetric part of the solution is sought in terms of multiples of the harmonics of the angular coordinate. A numerical method is employed to obtain the lowest load value, which leads to the appearance of waves in the circumferential direction. The effect of material heterogeneity and boundary on the buckling load is examined. It is shown that if the outer edge of a plate is elastically restrained against radial deflection, the buckling load for unsymmetrical buckling is larger than for a plate with a movable edge. The elasticity modulus decrease away from the center of a plate leads to sufficient lowering of the buckling pressure if the outer edge can move freely in the radial direction.
- Published
- 2020
- Full Text
- View/download PDF
43. Analysis of the RSA-cryptosystem in abstract number rings
- Author
-
Nikita V. Kondratyonok
- Subjects
rsa-cryptosystem ,abstract number ring ,dedekind ring ,factorization ,ideal ,Mathematics ,QA1-939 - Abstract
Quantum computers can be a real threat to some modern cryptosystems (such as the RSA-cryptosystem). The analogue of the RSA-cryptosystem in abstract number rings is not affected by this threat, as there are currently no factorization algorithms using quantum computing for ideals. In this paper considered an analogue of RSA-cryptosystem in abstract number rings. Proved the analogues of theorems related to its cryptographic strength. In particular, an analogue of Wiener’s theorem on the small secret exponent is proved. The analogue of the re-encryption method is studied. On its basis the necessary restrictions on the parameters of the cryptosystem are obtained. It is also shown that in numerical Dedekind rings the factorization problem is polynomial equivalent to factorization in integers.
- Published
- 2020
- Full Text
- View/download PDF
44. Generalized blocked Floyd – Warshall algorithm
- Author
-
Nikolai A. Likhoded
- Subjects
parallel algorithms ,shortest paths ,graphs ,floyd – warshall algorithm ,block algorithm ,gpu ,Mathematics ,QA1-939 - Abstract
One of the most commonly used on practice all-pairs shortest paths algorithms on weighted graphs is Floyd – Warshall algorithm. Blocked version serves as a basis for obtaining effective parallel algorithms to be implemented on multicore central processing units, on computers with distributed memory, on graphics processing units (GPU). Increasing computation granularity in blocked versions of algorithm leads to a more efficient usage of caches and more efficient organization of parallel computations. In this paper we introduce generalization of blocked Floyd – Warshall algorithm. Computing blocks execution order was reorganized in such a way that array elements which participate in communication operations, both reading and writing, are pushed out of fast-access memory less often. This means that in GPU implementation slow global memory is used less often, compared with the original blocked algorithm.
- Published
- 2019
- Full Text
- View/download PDF
45. Extensions of nonclosable operators and multiplication of distributions
- Author
-
Anatolij B. Antonevich and Cemal Dolicanin
- Subjects
extension of operator ,closed operator ,multiplication of distributions ,Mathematics ,QA1-939 - Abstract
In the paper some new constructions of extensions of nonclosable operators is proposed and several examples of applications are given. One of particular cases of the problem under consideration is the question on multiplication of distributions, a solution to which can be given by introduction of the so-called new generalized functions. It was demonstrated that the main obstacle for multiplication of distributions is nonclosablility of classical multiplication and the construction of new generalized functions is based on the ideas similar to that used under construction of the extension of nonclosable operators.
- Published
- 2019
- Full Text
- View/download PDF
46. Tonal languages speech synthesis using an indirect pitch markers and the quantitative target approximation methods
- Author
-
Ta Yen Thai, Hoang Ngo Huy, Dao Van Tuyet, Sergey V. Ablameyko, Nguyen Van Hung, and Doan Van Hoa
- Subjects
pitch markers ,cumulative signal ,xu model ,qta ,polynomial approximation ,Mathematics ,QA1-939 - Abstract
Synthesizing tones plays an important role in text-to-speech systems of tonal languages. To accomplish this, the two important steps are to determine the pitch markers of voice utterances and synthesize F0 trajectories for lexical tones. In this paper, we propose two efficient algorithms, one of them is to locate the pitch markers at the peaks of the cumulative signal of each voiced part of the input utterance and the other is to generate F0 trajectories of tones with quantitative target approximation (qTA) parameters of Xu model. The experimentation has shown that the proposed algorithms present pitch markers with high accuracy which has enabled us to generate tones with complex shapes.
- Published
- 2019
- Full Text
- View/download PDF
47. Bunch technique for semionline with two groups of items
- Author
-
Vladimir M. Kotov and Natallia S. Bogdanova
- Subjects
bunch technique ,semionline ,partition ,scheduling ,worst case performance ,Mathematics ,QA1-939 - Abstract
Bunch technique for semionline with two groups of items is proposed in this paper. Algorithm to solve this problem is to distribute items from the first group bunch approach and after that apply LS-algorithm to assign items from the se cond group. In order to prove the estimation of our algorithm is introduced different types of bunches to distribute all items from the first group such a way that only one of the entered types of bunches are obtained. During the second stage we use LS with worst case performance is at most 17/9.
- Published
- 2019
- Full Text
- View/download PDF
48. Rational mnemofunctions on R
- Author
-
Tatsiana G. Shahava
- Subjects
mnemofunction ,analytical representation of distribution ,algebra of rational mnemofunctions ,Mathematics ,QA1-939 - Abstract
The subspace of rational distributions was considered it this paper. Distribution is called rational if it has analytical representation f = (f+, f-) where functions f+ and f- are proper rational functions. The embedding of the rational distributions subspace into the rational mnemofunctions algebra on was built by the mean of mapping Ra(f)=fε(x)=f+(x+iε)-f-(x-iε). A complete description of this algebra was given. Its generators were singled out; the multiplication rule of distributions in this algebra was formulated explicitly. Known cases when product of distributions is a distribution were analyzed by the terms of rational mnemofunctions theory. The conditions under which the product of arbitrary rational distributions is associated with a distribution were formulated.
- Published
- 2019
- Full Text
- View/download PDF
49. Quasinormal Fitting classes of finite groups
- Author
-
Anna V. Martsinkevich
- Subjects
fitting class ,quasinormal fitting class ,the lockett conjecture ,local fitting class ,Mathematics ,QA1-939 - Abstract
Let P be the set of all primes, Zn a cyclic group of order n and X wr Zn the regular wreath product of the group X with Zn. A Fitting class F is said to be X-quasinormal (or quasinormal in a class of groups X ) if F ⊆ X, p is a prime, groups G ∈ F and G wr Zp ∈ X, then there exists a natural number m such that G m wr Zp ∈ F. If X is the class of all soluble groups, then F is normal Fitting class. In this paper we generalize the well-known theorem of Blessenohl and Gaschütz in the theory of normal Fitting classes. It is proved, that the intersection of any set of nontrivial X-quasinormal Fitting classes is a nontrivial X-quasinormal Fitting class. In particular, there exists the smallest nontrivial X-quasinormal Fitting class. We confirm a generalized version of the Lockett conjecture (in particular, the Lockett conjecture) about the structure of a Fitting class for the case of X-quasinormal classes, where X is a local Fitting class of partially soluble groups.
- Published
- 2019
- Full Text
- View/download PDF
50. On spectra of upper Sergeev frequencies of linear differential equations
- Author
-
Aliaksei S. Vaidzelevich
- Subjects
linear differential equation ,spectrum of the upper sergeev frequencies of zeros ,spectrum of the upper ,Mathematics ,QA1-939 - Abstract
It is known that the spectra (ranges) of upper and lower Sergeev frequencies of zeros, signs, and roots of a linear differential equation of order greater than two with continuous coefficients belong to the class of Suslin sets on the nonnegative half-line of the extended real line. Moreover, for the spectra of upper frequencies of third-order equations this result was inverted under the assumption that the spectra contain zero. In the present paper we obtain an inversion of the above statement for equations of the fourth order and higher. Namely, for an arbitrary zero-containing Suslin subset S on the non-negative half-line of the extended real line and a positive integer number n greater than three a n order linear differential equation is constructed, which spectra of the upper Sergeev frequencies of zeros, signs, and roots coincide with the set S.
- Published
- 2019
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.