Electronic modeling

Vol 45, No 6 (2023)

CONTENTS

Mathematical modeling and Computation Methods

 
3-14
 

Z.Kh. Borukaiev, V.A. Evdokimov, K.B. Ostapchenko
Construction of the Multi-Agent Environment Architecture of the Pricing Process Simulation Model in the Electricity Market


15-30
 

F. Korobeynikov
Using the Wald Maximin Criterion for Risk Analysis of Hard-To-Predict Threats in the Context of Resilience


31-40

Informational Technologics

 
E. Faure, M. Makhynko, A. Shcherba, D. Faure, B. Stupka
A Frame Synchronization Method Based on Tuples of Pairwise Distinct Elements


41-64
  I.V. Izonin, R.O. Tkachenko, O.L. Semchyshyn
An Ensemble Method for the Analysis of Small Biomedical Data based on a Neural Network Without Training


65-76

Computational Processes and Systems

 

А.M. Kapiton, О.S. Dziuban, Т.M. Franchuk, I.L. Yatsenko
Analysis of Innovative Methods of Computer Data Loss Prevention


77-84

Parallel calculations

 
L.I. Mochurad, A.A. Dereviannyi, O.R. Tkachuk

Parallelization of the Fluid Behavior Modeling Algorithm in Real Time


85-101

Application of Modeling Methods and Facilities

 
102-116

A PARALLEL ALGORITHM FOR SOLVING SYSTEMS OF VOLTERRA INTEGRAL EQUATIONS OF THE SECOND KIND

V.O. Tykhokhod, V.A. Fedorchuk

Èlektron. model. 2023, 45(6):03-14

https://doi.org/10.15407/emodel.45.06.003

ABSTRACT

The problem of increasing the effectiveness of the study of integral models of dynamic systems is considered. A parallel algorithm for solving a system of Volterra linear integral equations of the second kind based on the quadrature method of numerical integration is proposed. The algorithm was implemented in the MATLAB computer mathematics system in the form of an m-function. The program uses the MATLAB Distributed Computing Toolbox infrastructure to manage workflows and distribute computations between them on multi-core processors. Computational experiments were conducted on a model example using the Symbolic Math Toolbox package for symbolic calculations and a comparison of the execution of parallel calculations with the execution time of the implementation of a sequential algorithm. The results showed a significant increase in the speed of research of integral models on multi-core processors when using the proposed algorithm and its computer implementation.

KEYWORDS

system of Volterra linear integral equations, parallel algorithms, MATLAB.

REFERENCES

  1. Verlan, A.F., & Sizikov, V.S. (1986). Integral Equations: Methods, Algorithms, Programs. Naukova Dumka.
  2. Karpenko, Y.Y. (2008). Parallel solution of Fredholm integral equations of the first kind by the Tikhonov regularization method using MPI technology. Matematychne ta kompiuterne modeliuvannia. Series: Technical sciences. No. 1.
  3. Capobiancoa, G., & Cardoneb, A. (2008). A parallel algorithm for large systems of Volterra integral equations of Abel type. Journal of Computational and Applied Mathematics. (220), 749-
    https://doi.org/10.1016/j.cam.2008.05.026 
  4. Conte, D., & Paternoster, B. (2016). Parallel methods for weakly singular Volterra integral equations on GPUs. Applied Numerical Mathematics. (114), 30- 
    https://doi.org/10.1016/j.apnum.2016.04.006
  5. Nersessian, А., & Poghosyan, А., & Barkhudaryan R. (2005). On a Parallel Algorithm for Integral Equations. Computer Science and Information Technologies: materials of the conference CSIT-2005 (Yerevan, 19-23 September 2005). Pр. 457-460.
  6. Goroshko, I.O., & Tykhokhod, V.O. (2007). Computer implementation of solving systems of Volterra integral equations in the study of multiply connected dynamic objects. Elektronnoe modelirovanie. 29(3), 101-107.

Full text: PDF

 

CONSTRUCTION OF THE MULTI-AGENT ENVIRONMENT ARCHITECTURE OF THE PRICING PROCESS SIMULATION MODEL IN THE ELECTRICITY MARKET

Z.Kh. Borukaiev, V.A. Evdokimov, K.B. Ostapchenko

Èlektron. model. 2023, 45(6):15-30

https://doi.org/10.15407/emodel.45.06.015

ABSTRACT

The question of building the architecture of the multi-agent environment of the simulation model of the pricing process, as a space of heterogeneous interconnected organizational, informational, technological and economic interactions of the simulated agents of the pricing process, is considered.Using the example of a complex organizational and technical system (COTS) of the electricity micro-market in local electric power systems, the set of agents surrounding them and ensuring the vital activity of the COTS of pricing is formalized, consisting of classified internal agents and environmental agents with a definition of their functional purpose. It was established that a set of partially observable influence factors of subjects of the electricity micro-market external environment are additionally formalized in the multi-agent pricing system as communication agents with stochastic, dynamic. but with discrete fixation of distinct states of observation processes in this environment. As a result, the simulation model of the pricing process is presented as a heterogeneous distributed multi-agent system.

KEYWORDS

simulation model, local electric power system, multi-agent system, electricity micro-market, pricing process.

REFERENCES

  1. Mokhor, V.V. and Evdokimov, V.A. (2020), “Creation of a multi-agent simulation model of pricing processes in the electricity market”, Elektronne Modelyuvannya, Vol. 42, no. 6, pp. 3-17, available at: https://doi.org/10.15407/emodel.42.06
  2. Kyrylenko, A.V. ed. (2016), Intelligent electric power systems: elements and modes, Institut elektrodinamiki, Kyiv, Ukraine, available at: https://www.ied.org.ua/files/book3.pdf.
  3. Denisyuk, S.P., Bazyuk, T.M., Fedosenko, M.M. and Yarmolyuk, O.S. (2017), Power supply systems with an active consumer: models and modes, AVERS, Kyiv, Ukraine. 182
  4. Kyrylenko, O.V., Denysyuk, S.P., Tankevich, S.E. and Bazyuk, T.M. (2016), “Information and regulatory support for the organization of multi-agent management of the electric power system with an active consumer”, Information technology and computer engineering, no. 1, pp. 29-34.
  5. Saukh, S.E. and Borysenko, A.V. (2023), “Mathematical model of a flexible micro grid integrated into the country grid”, Tekhnichna Elektrodynamika, no. 2, pp. 61-68, available at: https://doi.org/10.15407/techned2023.02.061
  6. Macal, C. and North, M. (2010), “Tutorial on agent-based modelling and simulation”, Journal of Simulation, no. 4, pp. 151–162, available at: https://doi.org/10.1057/jos.2010.3
  7. Zhou, Z., Chan, W.K. and Chow, J.H. (2007), “Agent-based simulation of electricity markets: a survey of tools”, Artificial Intelligence Review, Vol. 28, pp. 305-342, available at: https://doi.org/10.1007/s10462-009-9105-x
  8. Leigh Tesfatsion. ACE Research Area: Electric Power System Design 2023: https://www2.econ.iastate.edu/tesfatsi/aelect.htm (accessed 10.08.2023).
  9. Yalovets, A.L. (2019), Multi-agent simulation of pursuit on a plane: from theory to software implementation, Naukova dumka, Kyiv, Ukraine. 165 р.
  10. Wooldridge, M. (2002), An Introduction to Multiagent Systems, John Wiley & Sons Ltd. 348
  11. Wooldridge, M. (2000), Reasoning about rational agent, The MIT Press. 227
  12. Franklin, S. and Graesser, C. (1996), “Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents”, Intelligent Agents III, Agent Theories, Architectures, and Languages, ECAI ‘96 Workshop (ATAL) Proceedings, Budapest, Hungary, August 12-13, 1996, Lecture Notes in Computer Science, Vol. 1193, pp. 22-35.
    https://doi.org/10.1007/BFb0013570
  13. Evdokimov, V.A. (2021), “Formulation of the task of building a multi-agent simulation model of pricing processes in the electricity market”, Elektronne Modelyuvannya, 43, no. 3, pp. 47-63.
    https://doi.org/10.15407/emodel.43.03.047
  14. Evdokimov, V.A. (2023), Mathematical and information technology support of the computer system for modeling energy market pricing processes: monograph, European Scientific Platform, Vinnitsa, Ukraine, available at: https://doi.10.36074/Yevdokimov-mono­graph.2023.
  15. Kyrylenko, O.V. (2022), “Measures and means of transforming Ukraine’s energy industry into an intelligent, ecologically safe system: Report at the scientific session of the General Assembly of the National Academy of Sciences of Ukraine on February 17, 2022”, Bulletin of the National Academy of Sciences of Ukraine, no. 3, pp. 18-23, available at: https://doi.org/10.15407/visn2022.03.018.
  16. The National Commission, which carries out state regulation in the spheres of energy and communal services, On the approval of the Market Rules, Resolution No. 307 of March 14, 2018, available at: https://zakon.rada.gov.ua/laws/show/v0307874-18/page#Text (accessed 10.10.2023).
  17. The National Commission, which carries out state regulation in the spheres of energy and communal services, On the approval of the Rules of the day-ahead market and the intraday market, Resolution No. 308 of March 14, 2018, available at: https://zakon.rada.gov.ua/laws/show/v0307874-18/page#Text (accessed 10.10.2023).
  18. The National Commission, which carries out state regulation in the spheres of energy and communal services, On the approval of the Code of commercial accounting of electric ener­gy, Resolution No. 311 of March 14, 2018, available at: https://zakon.rada.gov.ua/laws/show/v0307874-18/page#Text (accessed 10.10.2023).
  19. Russell, S. and Norvig, P. (2007), Artificial intelligence: a modern approach, 2nd ed.: trans. with english, Publishing house "Williams", Moscow, Russia.
  20. The National Commission, which carries out state regulation in the spheres of energy and communal services, On the approval of the Rules of the retail electricity market, Resolution No. 312 of March 14, 2018, available at: https://zakon.rada.gov.ua (accessed 10.10.2023).
  21. Borukaiev, Z.Kh., Yevdokimov, V.A. and Ostapchenko, K.B. (2022), “Computational method of nodal transformation of the pricing process in the electricity market”, Tekh­nichna Elektrodynamika, no. 5, pp. 67-76, available at: https://doi.org/10.15407/techned2022.05.067.

Full text: PDF

 

USING THE WALD MAXIMIN CRITERION FOR RISK ANALYSIS OF HARD-TO-PREDICT THREATS IN THE CONTEXT OF RESILIENCE

F. Korobeynikov

Èlektron. model. 2023, 45(6):31-39

https://doi.org/10.15407/emodel.45.06.031

ABSTRACT

The application of the Wald’s criterion for risk analysis and management within the context of ensuring resilience for mission-critical information systems, operations, and organizations in conditions of uncertainty is considered. The proposed method facilitates addressing risks associated with stochastic and HILF (high impact, low frequency) threats, the probability of which is challenging to predict. This approach is grounded in assessing potential damages and the cost of countermeasures concerning these types of threats. Notably, the focus is directed towards examining the worst possible outcomes of the evaluated threats, reducing the need for accurate probability forecasting. Utilizing the maximin criterion allows for surpassing the constraints of the standard risk matrix, which is employed to determine the risk level by juxtaposing the threat’s probability category with the severity of its implications. Consequently, information security systems can attain heightened levels of efficiency, which, subsequently, bolsters the resilience of the organizations they safeguard.

KEYWORDS

resilience, security, risk management, HILF, stochastic threats, Wald’s criterion, maximin.

REFERENCES

  1. Procedure for the implementation of the information security system in government agencies, enterprises, organizations whose information and communication systems process information, the requirement for protection of which is established by law and does not constitute a state secret (2021) НД ТЗІ 3.6-004-21. Administration of the State Special Communications Service of Ukraine.
  2. Masys, A.J., Ray-Bennett, N., Shiroshita, H., & Jackson, P. (2014). High Impact/Low Frequency Extreme Events: Enabling Reflection and Resilience in a Hyper-connected World. Procedia Economics and Finance, 18, 772-779. https://doi.org/10.1016/S2212-5671(14)01001-6.
  3. Murray, N.J., Keith, D.A., Bland, L.M., Nicholson, E., Regan, T.J., Rodríguez, J.P., & Bedward, M. (2017). The use of range size to assess risks to biodiversity from stochastic threats. Diversity and Distributions, 23(5), 474-483. https://doi.org/10.1111/ddi.12533.
  4. NIST Special Publication 800-160, Volume 2. Developing cyber-resilient systems: A systems security engineering approach. (2021). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-160v2r1
  5. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. (2018). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.CSWP.04162018
  6. ISO/IEC 27001:2022. International Organization for Standardization. Information security management systems. Requirements. (2022) https://www.iso.org/standard/27001
  7. Korobeynikov, F. (2023). Resilience Paradigm Development in The Security Domain. Electronic Modeling, 45(4), 88-111. https://doi.org/10.15407/emodel.45.04.088.
  8. Linkov, I., Bridges, T., Creutzig, F., Decker, J., Fox-Lent, C., Kröger, W., Lambert, J.H., Levermann, A., Montreuil, B., Nathwani, J., Nyer, R., Renn, O., Scharte, B., Scheffler, A., Schreurs, M., & Thiel-Clemen, T. (2014). Changing the resilience paradigm. Nature Climate Change, 4(6), 407-409. https://doi.org/10.1038/nclimate2227.
  9. International Organization for Standardization. (2018). Risk management — Guidelines (ISO 31000:2018). https://www.iso.org/standard/65694.html.
  10. (2012). Goddard Procedural Requirements P.6 SAFETY (GPR 7120.4D). https://lws.larc.nasa.gov/pdf_files/GPR%207120.4D%20Adm%20Ext_07282020.pdf.
  11. Office of the Deputy Assistant Secretary of Defense for Systems Engineering. (2017). DoD Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs. https:// com/wp-content/uploads/2017/07/DoD-Risk-Issue-and-Opportunity-Management- Guide-Jan-2017.pdf
  12. Sniedovich, M. (2016). Wald’s mighty maximin: a tutorial. International Transactions in Operational Research, 23(4), 625-653. https://doi.org/10.1111/itor.12248

Full text: PDF

 

A FRAME SYNCHRONIZATION METHOD BASED ON TUPLES OF PAIRWISE DISTINCT ELEMENTS

E. Faure, M. Makhynko, A. Shcherba, D. Faure, B. Stupka

Èlektron. model. 2023, 45(6):41-64

https://doi.org/10.15407/emodel.45.06.041

ABSTRACT

The further development of the frame synchronization method is presented, which uses as a synchronization word the permutation of the elements of the set of integers of the segment [0; M - 1], was further developed. It is proposed to use a tuple of M-η pairwise distinct elements of the set of integers of the segment [0; M - 1] as a syncword. The elements of this set are encoded with a fixed-length binary code and the minimum binary Hamming distance between the syncword and all its circular shifts is the maximum. The paper established that the maximum value of the minimum Hamming distance for tuples of 15 pairwise distinct elements of the set of integers for M = 16 is equal to 30. A comparative assessment of the frame synchronization effectiveness was performed based on tuples of 15 elements, as well as on permutations of length 16 and 8. A computer simulation model of the frame synchronization system in a binary symmetric communication channel was built. Synchronization indicators were determined with parameters calculated for bit error probability 0,4 and 0,495, as well as requirements for a minimum probability of correct synchronization of 0,9997 and a maximum probability of false synchronization of 3E-4. The effectiveness of using tuples of pairwise distinct elements in frame synchronization systems has been confirmed. The efficiency indicator depends on communication channel bit error probability.

KEYWORDS

frame synchronization, frame structure, short packet, intense noise, transmission reliability.

REFERENCES

  1. (2018). IEEE Standard for Ethernet (IEEE Std 802.3-2018 Revis.). Pp. 1-5600. https://doi.org/10.1109/IEEESTD.2018.8457469
  2. Peterson, L.L. (2022). Computer Networks (6th ed.). L. L. Peterson, B. S. Davie. Morgan Kaufmann, Elsevier. https://doi.org/10.1016/C2018-0-01477-2
  3. Adamy, D. (2014). Practical Communication Theory (2nd ed.). Institution of Engineering and Technology. https://doi.org/10.1049/SBEW516E
  4. Cheng, C.-H., & Tsui, J. (2021). An Introduction to Electronic Warfare; From the First Jamming to Machine Learning Techniques. River Publishers. https://doi.org/10.1201/9781003337171
  5. Bloessl, B., & Dressler, F. (2018). mSync: Physical Layer Frame Synchronization without Preamble Symbols. IEEE Transactions on Mobile Computing, 17(10), 2321-2333. https://doi.org/10.1109/TMC.2018.2808968
  6. Faure, E.V. (2016). Factorial coding with data recovery. Bulletin of Cherkasy State Technological University, 1(2), 33-39. https://doi.org/10.24025/2306–4412.2.2016.82932
  7. Al-Aazzeh, J., Ayyoub, B., Faure, E., et al. (2020). Telecommunication systems with multiple access based on data factorial coding. International Journal on Communications Antenna and Propagation, 10(2), 102-113. https://doi.org/10.15866/irecap.v10i2.17216
  8. Mahmood, N.H., Böcker, S., Moerman, I., et al. (2021). Machine type communications: key drivers and enablers towards the 6G era. EURASIP Journal on Wireless Communications and Networking, 1, 134. https://doi.org/10.1186/s13638-021-02010-5
  9. Durisi, D., Liva, G., Polyanskiy, Y., et al. (2022). Short-Packet Transmission. In I. Marić, S. Shamai (Shitz), & O. Simeone (Eds.), Information Theoretic Perspectives on 5G Systems and Beyond. Cambridge University Press.
  10. Xie, J., Chang, Z., Guo, X., & Hamalainen, T. (2023). Energy Efficient Resource Allocation for Wireless Powered UAV Wireless Communication System with Short Packet. IEEE Transactions on Green Communications and Networking, 7(1), 101-113. https://doi.org/10.1109/TGCN.2022.3218314
  11. Yang, Y., & Hanzo, L. (2023). Permutation-Based Short-Packet Transmissions Improve Secure URLLCs in the Internet of Things. IEEE Internet of Things Journal, 10(12), 11024-11037. https://doi.org/10.1109/JIOT.2023.3243038
  12. Schneier, B. (1996). Applied cryptography: protocols, algorithms, and source code in C. Wiley.
  13. Shcherba, A., Faure, E., & Lavdanska, O. (2020). Three-Pass Cryptographic Protocol Based on Permutations. In 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. IEEE, pp. 281-284. https://doi.org/10.1109/ATIT50783.2020.9349343
  14. Faure, E., Shcherba, A., Makhynko, M., et al. (2023). Concept for Using Permutation-Based Three-Pass Cryptographic Protocol in Noisy Channels. In Systems, Decision and Control in Energy V. Springer International Publishing. https://doi.org/10.1007/978-3-031-35088-7_7
  15. Al-Azzeh, J., Faure, E., Shcherba, A., Stupka, B. (2022). Permutation-based frame synchronization method for data transmission systems with short packets. Egyptian Informatics Journal, 23(3), 529–545. https://doi.org/10.1016/j.eij.2022.05.005
  16. Faure, E.V., Shvydkyi, V.V., Shcherba, A.I., et al. (2020). Method of Cyclic Synchronization Based on Permutations. Bulletin of Cherkasy State Technological University, 4, 67-76. https://doi.org/10.24025/2306-4412.4.2020.222439
  17. Knuth, D.E. (2008). The Art of Computer Programming: Introduction to combinatorial algorithms and Boolean functions. Addison-Wesley.
  18. Schmidt, K.-U. (2016). Sequences with small correlation. Designs, Codes and Cryptography, 78(1), 237-267. https://doi.org/10.1007/s10623-015-0154-7
  19. Faure, E., Shcherba, A., Stupka, B., et al. (2021). Permutation-Based Frame Synchronisation Method for Short Packet Communication Systems. In 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland. IEEE, pp. 1073-1077. https://doi.org/10.1109/IDAACS53288.2021.9660996
  20. Waggener, W.N. (1995). Pulse code modulation techniques: with applications in communications and data recording. Van Nostrand Reinhold.
  21. Al-Aazzeh, J., Faure, E., Makhynko, M., et al. (2023). Efficiency Assessment of the Permutation-Based Frame Synchronization Method. International Journal on Communications Antenna and Propagation, 13(4).
  22. Heap, B.R. (1963). Permutations by Interchanges. The Computer Journal, 6(3), 293-294. https://doi.org/10.1093/comjnl/6.3.293
  23. Bodner, J. (2021). Learning Go: an idiomatic approach to real-world Go programming. O’Reilly.

Full text: PDF