Alexandra Alekseevna Pasinkova, Olga Leonidovna Vikentyeva
{"title":"Application of Design Patterns in the Development of the Architecture of Monitoring Systems","authors":"Alexandra Alekseevna Pasinkova, Olga Leonidovna Vikentyeva","doi":"10.15514/ispras-2023-35(3)-10","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(3)-10","url":null,"abstract":"This article explores the relevance of using design patterns in the development of the architecture of monitoring systems. The increasing complexity of modern monitoring systems has made it challenging to maintain and evolve them. The use of design patterns can address these challenges by providing reusable solutions to common problems in monitoring system architecture. This article reviews the literature on monitoring systems and design patterns and identifies appropriate design patterns for monitoring system architecture. The article also analysis the requirements for monitoring systems and demonstrates how design patterns can be used to meet these requirements. The results show that the use of design patterns can improve the maintainability, flexibility, reliability, compatibility and scalability of monitoring systems. This article is relevant to software architects, developers, and system administrators who are involved in the development and maintenance of monitoring systems.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135262536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Symcrete” memory Model with Lazy Initialization and Objects of Symbolic Sizes in KLEE","authors":"Sergey Antonovich Morozov, Aleksandr Vladimirovich Misonizhnik, Dmitry Aleksandrovich Mordvinov, Dmitry Vladimirovich Koznov, Dmitry Arkadevich Ivanov","doi":"10.15514/ispras-2023-35(3)-7","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(3)-7","url":null,"abstract":"Dynamic symbolic execution is a well-known technique for testing applications. It introduces symbolic variables – program data with no concrete value at the moment of instantiation – and uses them to systematically explore the execution paths in a program under analysis. However, not every value can be easily modelled as symbolic: for instance, some values may take values from restricted domains or have complex invariants, hard enough to model using existing logic theories, despite it is not a problem for concrete computations. In this paper, we propose an implementation of infrastructure for dealing with such “hard-to-be-modelled” values. We take the approach known as symcrete execution and implement its robust and scalable version in the well-known KLEE symbolic execution engine. We use this infrastructure to support the symbolic execution of LLVM programs with complex input data structures and input buffers with indeterminate sizes.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135262760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irina Aleksandrovna Korobova, E. Ryatina, Anna Aleksandrovna Khorosheva
{"title":"On Problems in 2D Viscous Flows Simulation at Higher Values of the Reynolds Numbers by Vortex Methods Using the VM2D Code","authors":"Irina Aleksandrovna Korobova, E. Ryatina, Anna Aleksandrovna Khorosheva","doi":"10.15514/ispras-2023-35(2)-14","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(2)-14","url":null,"abstract":"Vortex methods of computational fluid dynamics are an efficient tool in engineering practice for estimating hydrodynamic loads acting on bodies placed in a flow. Their usage allows for solving of coupled hydroelastic problems with relatively small computational cost. In many applications, the cross flow around structural elements with large elongation is considered, that allows one to use the flat cross-sections method providing the acceptable accuracy. Thus, flat flows simulation around airfoils is required. Modern modifications of vortex particle methods make it possible to simulate flows of a viscous incompressible medium. Based on the method of viscous vortex domains in 2017-2022 the VM2D code have been developed in Bauman University and Ivannikov Institute for System Programming. This code allows for flow simulating around airfoils with acceptable accuracy at low Reynolds numbers, while for higher Reynolds numbers, correct results are observed only for airfoils with sharp edges and corner points, and only in regimes where the most intensive flow separation takes place at these points. The reason for the error in the results for other regimes is seen in incorrect modeling of the flow separation on smooth airfoil surface line at high Reynolds numbers, which, in turn, is a consequence of incorrect modeling of vorticity evolution in the vicinity of separation points (zones). Some results of flow simulations around different airfoils at different values of the Reynolds number are presented and a hypothesis explaining the reason for the discrepancy between numerical results and experimental data is proposed. It is shown that the kinetic energy spectrum of turbulence corresponds to “two-dimensional turbulence”.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"254 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76339095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Marchevsky, Yulia Izmailova, M. A. Erofeeva, D. Y. Kobzar
{"title":"On open third-party libraries usage in implementation of vortex particle methods of computational fluid dynamics","authors":"I. Marchevsky, Yulia Izmailova, M. A. Erofeeva, D. Y. Kobzar","doi":"10.15514/ispras-2023-35(2)-13","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(2)-13","url":null,"abstract":"The most general structure of a computational algorithm that implements meshless Lagrangian methods of computational fluid dynamics is discussed. Not only the main ones are touched upon, but also “auxiliary”, but therefore no less important procedures, which implementation is often practically ignored. The latter can lead to a significant imbalance and decrease in the efficiency of codes in which the “basic” computational operations are significantly optimized. The author's in-house codes VM2D and VM3D are discussed, the development of which at the first (“exploratory”) stage proceeded mainly along the path of choosing and implementing the necessary mathematical models, and the achievement of acceptable efficiency was ensured by an “extensive” way – involving significant computing resources (in particular, graphical accelerators). An attempt was made to make a conclusion about the expediency of using existing third-party libraries to perform computational geometry operations, solve problems on graphs, etc..","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75856074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software project estimation using smooth curve methods and variable selection and regularization methods using a wedge-shape form database","authors":"F. Valdés-Souto, Lizbeth Naranjo-Albarrán","doi":"10.15514/ispras-2023-35(1)-9","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(1)-9","url":null,"abstract":"Context: The impact of an excellent estimation in planning, budgeting, and control, makes the estimation activities an essential element for the software project success. Several estimation techniques have been developed during the last seven decades. Traditional regression-based is the most often estimation method used in the literature. The generation of models needs a reference database, which is usually a wedge-shaped dataset when real projects are considered. The use of regression-based estimation techniques provides low accuracy with this type of database. Objective: Evaluate and provide an alternative to the general practice of using regression-based models, looking if smooth curve methods and variable selection and regularization methods provide better reliability of the estimations based on the wedge-shaped form databases. Method: A previous study used a reference database with a wedge-shaped form to build a regression-based estimating model. This paper utilizes smooth curve methods and variable selection and regularization methods to build estimation models, providing an alternative to linear regression models. Results: The results show the improvement in the estimation results when smooth curve methods and variable selection and regularization methods are used against regression-based models when wedge-shaped form databases are considered. For example, GAM with all the variables show that the R-squared is for Effort: 0.6864 and for Cost: 0.7581; the MMRE is for Effort: 0.1095 and for Cost: 0.0578. The results for the GAM with LASSO show that the R-squared is for Effort: 0.6836 and for Cost: 0.7519; the MMRE is for Effort: 0.1105 and for Cost: 0.0585. In comparison to the R-squared is for Effort: 0.6790 and for Cost: 0.7540; the MMRE is for Effort: 0.1107 and for Cost: 0.0582 while using MLR.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86838520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approach to end-to-end testing of the application for managing the configuration of enterprise virtual infrastructure","authors":"E. Geraskin, N. Voinov","doi":"10.15514/ispras-2023-35(2)-10","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(2)-10","url":null,"abstract":"The article is devoted to end-to-end testing of the application for managing the configuration of enterprise virtual infrastructure. The main idea is to develop a software framework to create and perform end-to-end tests written in Python. The approach involves a comprehensive evaluation of the system from the user interface to the database. The testing process is performed in a continuous integration environment, which enables the team to test the system continually as new code is added. The testing process also includes the use of automated tests written in Python. The automated tests allow for faster and more reliable testing and enable the team to test the system across multiple platforms and configurations. The approach also includes the use of virtual environments to simulate the production environment. This enables the team to identify potential issues that may arise in the production environment and to test the system's performance under various conditions.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87926776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peculiarities of numerical simulation of air/heat curtain operation in OpenFOAM","authors":"S. Grigorev, M. Koroleva, O. Mishchenkova","doi":"10.15514/ispras-2023-35(2)-15","DOIUrl":"https://doi.org/10.15514/ispras-2023-35(2)-15","url":null,"abstract":"The issues of mathematical modeling of turbulent heat-conductive flow of compressible viscous medium in the internal volume of the body of an air-thermal curtain equipped with a tangential fan are considered. The solution of the problem is constructed on the basis of averaged Reynolds (Favre) Navier-Stokes equations. The solution of the problem is obtained using the MRF (Multiple Reference Frame) approach, which uses a rotating reference frame, and using a transformation of the basic Navier-Stokes equations in the rotation zone. In order to correctly describe the working processes occurring in the internal volume of the air-thermal curtain and in the environment, modular multiblock meshes are applied in the work, including those allowing to separate rotating and stationary areas. The solution of the set tasks is constructed using the tools of the OpenFOAM package. As a result of the work, the peculiarities of the flow structure in the flowing part of the air-heat curtain are described in detail, and the gas velocities achieved at different fan speeds are estimated. The self-similarity of velocity profiles at the air curtain nozzle outlet is shown.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90845334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Romanova, O. Nepomnyashchiy, I. Ryzhenko, A. Legalov, Natalya Yurievna Sirotinina
{"title":"Parallelism reduction method in the high-level VLSI synthesis implementation","authors":"D. Romanova, O. Nepomnyashchiy, I. Ryzhenko, A. Legalov, Natalya Yurievna Sirotinina","doi":"10.15514/ispras-2022-34(1)-5","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(1)-5","url":null,"abstract":"In the article the problems and solutions in the field of ensuring architectural independence and implementation of digital integrated circuits end-to-end design processes are considered. The method and language of parallel programming for functional flow synthesis of design solutions is presented. During the method implementation, the tasks of reducing parallelism and estimating the occupied resources were highlighted. The main feature of the developed method is the introduction of the additional meta-layer into the synthesis process. Algorithms for the parallelism reduction have been developed. The results of software tools development for design support and practical VLSI projects are presented.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85277605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol automata recovery method using binary code","authors":"Ivan Vladimirovich Sharkov","doi":"10.15514/ispras-2022-34(5)-3","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(5)-3","url":null,"abstract":"Security analysis of network programs includes set of reverse engineering tasks of network protocols. Data formats restoring and implemented protocol automaton are the previous task issues. Unlike quite researched problem of formats restoring where there are lots of scientist’s papers, finding out the protocol's automaton program implementation looks like terra incognita and the cornerstone is a protocol state description currently undefined. There are two general ways to retrieve the implemented protocol automaton: an analysis of the network traces and looking into binary trace of the target application. This article offers a second one method. The first aim of the paper is the way to describe a mathematical model of a protocol automaton and a method for projecting it onto an executing application binary code. The second is concept of the protocol state definition and a principle to detect the states transitions based on some \"global\" binary trace objects, are described. Thirdly, there is suggested a protocol automaton precising manner by in-memory fuzzing based on a \"floating\" fork-server to manage states transitions. Finally, developed toolset's scheme and experiments on its using with a real VPN client, are shown.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77865426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Test Program Generation for Memory Coherence Verification of “Elbrus” Microprocessors","authors":"Vladimir Agafonov, Pavel Frolov, A. Meshkov","doi":"10.15514/ispras-2022-34(2)-1","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(2)-1","url":null,"abstract":"One of the key aspects of the correctness of the memory subsystem of a microprocessor is its functioning in accordance with the memory coherence protocol. This article presents an approach to test program generation for memory coherence verification of “Elbrus” microprocessors. Requirements for memory coherence tests are considered. The memory map structure allowing to describe the memory areas used in tests and the types of accesses to these areas in a flexible way is presented. The method of test program generation based on the memory map structure is described. The method of automatic memory map generation is proposed. Generated tests have been used for verification of RTL models and FPGA-based prototypes.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77865900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}