All issues
- 2025 Vol. 17
- 2024 Vol. 16
- 2023 Vol. 15
- 2022 Vol. 14
- 2021 Vol. 13
- 2020 Vol. 12
- 2019 Vol. 11
- 2018 Vol. 10
- 2017 Vol. 9
- 2016 Vol. 8
- 2015 Vol. 7
- 2014 Vol. 6
- 2013 Vol. 5
- 2012 Vol. 4
- 2011 Vol. 3
- 2010 Vol. 2
- 2009 Vol. 1
-
Molecular model of OCP-phycobilisome complex formation
Computer Research and Modeling, 2014, v. 6, no. 5, pp. 761-774A molecular model of phicobilisome complex with a quenching protein OCP which regulates the energy transfer from phicobilisome to photosystem in photosynthetic apparatus of cyanobacteria has been developed. In the model obtained a well known spatial structure of interacting proteins remains intact and also the energy transfer from phycobilisome to OCP with reasonable rates is possible. Free energy of complex formation was calculated using MM–PBSA approach. By the order of magnitude this energy is about tens of kJ/mole. This value correlates well with experimental observed low stability of this complex. The specific surface energy of interaction between hydrophylic phicobilisome and OCP is twice larger than specific surface energy of their interaction with water. This reflects a high molecular complementary of interacting protein surfaces and is a strong pro argument for proposed model.
-
On some properties of short-wave statistics of FOREX time series
Computer Research and Modeling, 2017, v. 9, no. 4, pp. 657-669Views (last year): 10.Financial mathematics is one of the most natural applications for the statistical analysis of time series. Financial time series reflect simultaneous activity of a large number of different economic agents. Consequently, one expects that methods of statistical physics and the theory of random processes can be applied to them.
In this paper, we provide a statistical analysis of time series of the FOREX currency market. Of particular interest is the comparison of the time series behavior depending on the way time is measured: physical time versus trading time measured in the number of elementary price changes (ticks). The experimentally observed statistics of the time series under consideration (euro–dollar for the first half of 2007 and for 2009 and British pound – dollar for 2007) radically differs depending on the choice of the method of time measurement. When measuring time in ticks, the distribution of price increments can be well described by the normal distribution already on a scale of the order of ten ticks. At the same time, when price increments are measured in real physical time, the distribution of increments continues to differ radically from the normal up to scales of the order of minutes and even hours.
To explain this phenomenon, we investigate the statistical properties of elementary increments in price and time. In particular, we show that the distribution of time between ticks for all three time series has a long (1-2 orders of magnitude) power-law tails with exponential cutoff at large times. We obtained approximate expressions for the distributions of waiting times for all three cases. Other statistical characteristics of the time series (the distribution of elementary price changes, pair correlation functions for price increments and for waiting times) demonstrate fairly simple behavior. Thus, it is the anomalously wide distribution of the waiting times that plays the most important role in the deviation of the distribution of increments from the normal. As a result, we discuss the possibility of applying a continuous time random walk (CTRW) model to describe the FOREX time series.
-
Numerical simulation of the process of activation of the safety valve
Computer Research and Modeling, 2018, v. 10, no. 4, pp. 495-509Views (last year): 34. Citations: 1 (RSCI).The conjugate problem of disk movement into gas-filled volume of the spring-type safety valve is solved. The questions of determining the physically correct value of the disk initial lift are considered. The review of existing approaches and methods for solving of such type problems is conducted. The formulation of the problem about the valve actuation when the vessel pressure rises and the mathematical model of the actuation processes are given. A special attention to the binding of physical subtasks is paid. Used methods, numerical schemes and algorithms are described. The mathematical modeling is performed on basе the fundamental system of differential equations for viscous gas movement with the equation for displacement of disk valve. The solution of this problem in the axe symmetric statement is carried out numerically using the finite volume method. The results obtained by the viscous and inviscid models are compared. In an inviscid formulation this problem is solved using the Godunov scheme, and in a viscous formulation is solved using the Kurganov – Tadmor method. The dependence of the disk displacement on time was obtained and compared with the experimental data. The pressure distribution on the disk surface, velocity profiles in the cross sections of the gap for different disk heights are given. It is shown that a value of initial drive lift it does not affect on the gas flow and valve movement part dynamic. It can significantly reduce the calculation time of the full cycle of valve work. Immediate isotahs for various elevations of the disk are presented. The comparison of jet flow over critical section is given. The data carried out by two numerical experiments are well correlated with each other. So, the inviscid model can be applied to the numerical modeling of the safety valve dynamic.
-
Analysis of predictive properties of ground tremor using Huang decomposition
Computer Research and Modeling, 2024, v. 16, no. 4, pp. 939-958A method is proposed for analyzing the tremor of the earth’s surface, measured by means of space geodesy, in order to highlight the prognostic effects of seismicity activation. The method is illustrated by the example of a joint analysis of a set of synchronous time series of daily vertical displacements of the earth’s surface on the Japanese Islands for the time interval 2009–2023. The analysis is based on dividing the source data (1047 time series) into blocks (clusters of stations) and sequentially applying the principal component method. The station network is divided into clusters using the K-means method from the maximum pseudo-F-statistics criterion, and for Japan the optimal number of clusters was chosen to be 15. The Huang decomposition method into a sequence of independent empirical oscillation modes (EMD — Empirical Mode Decomposition) is applied to the time series of principal components from station blocks. To provide the stability of estimates of the waveforms of the EMD decomposition, averaging of 1000 independent additive realizations of white noise of limited amplitude was performed. Using the Cholesky decomposition of the covariance matrix of the waveforms of the first three EMD components in a sliding time window, indicators of abnormal tremor behavior were determined. By calculating the correlation function between the average indicators of anomalous behavior and the released seismic energy in the vicinity of the Japanese Islands, it was established that bursts in the measure of anomalous tremor behavior precede emissions of seismic energy. The purpose of the article is to clarify common hypotheses that movements of the earth’s crust recorded by space geodesy may contain predictive information. That displacements recorded by geodetic methods respond to the effects of earthquakes is widely known and has been demonstrated many times. But isolating geodetic effects that predict seismic events is much more challenging. In our paper, we propose one method for detecting predictive effects in space geodesy data.
-
Special action and counter-terrorism models
Computer Research and Modeling, 2024, v. 16, no. 6, pp. 1467-1498Special actions (guerrilla, anti-guerrilla, reconnaissance and sabotage, subversive, counter-terrorist, counter-sabotage, etc.) are organized and conducted by law enforcement and armed forces and are aimed at protecting citizens and ensuring national security. Since the early 2000s, the problems of special actions have attracted the attention of specialists in the field of modeling, sociologists, physicists and representatives of other sciences. This article reviews and characterizes the works in the field of modeling special actions and counterterrorism. The works are classified by modeling methods (descriptive, optimization and game-theoretic), by types and stages of actions, and by phases of management (preparation and conduct of activities). The second section presents a classification of methods and models for special actions and counterterrorism, and gives a brief overview of descriptive models. The method of geographic profiling, network games, models of dynamics of special actions, the function of victory in combat and special actions (the dependence of the probability of victory on the correlation of forces and means of the parties) are considered. The third section considers the “attacker – defender” game and its extensions: the Stackelberg game and the Stackelberg security game, as well as issues of their application in security tasks In the “attacker – defender” game and security games, known works are classified on the following grounds: the sequence of moves, the number of players and their target functions, the time horizon of the game, the degree of rationality of the players and their attitude to risk, the degree of awareness of the players. The fourth section is devoted to the description of patrolling games on a graph with discrete time and simultaneous choice by the parties of their actions (Nash equilibrium is computed to find optimal strategies). The fifth section deals with game-theoretic models of transportation security as applications of Stackelberg security games. The last section is devoted to the review and characterization of a number of models of border security in two phases of management: preparation and conduct of activities. An example of effective interaction between Coast Guard units and university researchers is considered. Promising directions for further research are the following: first, modeling of counter-terrorist and special operations to neutralize terrorist and sabotage groups with the involvement of multidepartmental and heterogeneous forces and means, second, complexification of models by levels and stages of activity cycles, third, development of game-theoretic models of combating maritime terrorism and piracy.
-
R/S method application in neurological speech disorders analyses
Computer Research and Modeling, 2014, v. 6, no. 5, pp. 775-791Views (last year): 2. Citations: 2 (RSCI).Based on modified rescaled range scale computation algorithm, the technique of Hurst exponent and its characteristic time estimation is proposed. The approach of increase the accuracy and simplification automatic Hurst exponent calculation is developed. The Hurst exponent and characteristic time is calculated for power time sets of speech signals with various motor pathologies (aphasias and dysarthrias). Results is statistically analyzed, the correlation between Hurst exponent and characteristic time is estimated.
-
Formalized decision-making model: taking into account value motivation
Computer Research and Modeling, 2025, v. 17, no. 2, pp. 323-338The paper considers the problems of mathematical description of deontological aspects influencing the behavior of decision makers. A methodology is proposed for correlating utilitarian (material) and deontological (value) aspects in their decision-making, taking into account their psychological characteristics. A mathematical model is proposed for the joint consideration of utilitarian and deontological factors in decision-making in various situations. Some patterns related to this consideration are identified, and their formal description is given. The model shows that there is a tendency for a gradual decrease in the level of deontology in evaluating alternatives when making decisions (compared to what the outside world inclines to) towards greater utilitarianism. Over time, this trend begins to influence public opinion and society’s attitude to moral norms, gradually reducing the overall level of morality in society. This process can be stopped only by constantly and purposefully maintaining a high level of deontology by society and the state (ideological work, promotion of traditional values, educational work at school, etc.), otherwise society will inevitably become utilitarian over time, focusing exclusively on material factors when making decisions.
In the future, it is planned to use the developed tools for analyzing specific situations, including for analyzing the patterns of civilizational cycles: the rise and fall of the Roman Empire, the USSR, and modern Western civilization).
-
The use of cluster analysis methods for the study of a set of feasible solutions of the phase problem in biological crystallography
Computer Research and Modeling, 2010, v. 2, no. 1, pp. 91-101Views (last year): 2.X-ray diffraction experiment allows determining of magnitudes of complex coefficients in the decomposition of the studied electron density distribution into Fourier series. The determination of the lost in the experiment phase values poses the central problem of the method, namely the phase problem. Some methods for solving of the phase problem result in a set of feasible solutions. Cluster analysis method may be used to investigate the composition of this set and to extract one or several typical solutions. An essential feature of the approach is the estimation of the closeness of two solutions by the map correlation between two aligned Fourier syntheses calculated with the use of phase sets under comparison. An interactive computer program ClanGR was designed to perform this analysis.
-
Detection of influence of upper working roll’s vibrayion on thickness of sheet at cold rolling with the help of DEFORM-3D software
Computer Research and Modeling, 2017, v. 9, no. 1, pp. 111-116Views (last year): 12. Citations: 1 (RSCI).Technical diagnosis’ current trends are connected to application of FEM computer simulation, which allows, to some extent, replace real experiments, reduce costs for investigation and minimize risks. Computer simulation, just at the stage of research and development, allows carrying out of diagnostics of equipment to detect permissible fluctuations of parameters of equipment’s work. Peculiarity of diagnosis of rolling equipment is that functioning of rolling equipment is directly tied with manufacturing of product with required quality, including accuracy. At that design of techniques of technical diagnosis and diagnostical modelling is very important. Computer simulation of cold rolling of strip was carried out. At that upper working roll was doing vibrations in horizontal direction according with published data of experiments on continuous 1700 rolling mill. Vibration of working roll in a stand appeared due to gap between roll’s craft and guide in a stand and led to periodical fluctuations of strip’s thickness. After computer simulation with the help of DEFORM software strip with longitudinal and transversal thickness variation was gotten. Visualization of strip’s geometrical parameters, according with simulation data, corresponded to type of inhomogeneity of surface of strip rolled in real. Further analysis of thickness variation was done in order to identify, on the basis of simulation, sources of periodical components of strip’s thickness, whose reasons are malfunctions of equipment. Advantage of computer simulation while searching the sources of forming of thickness variation is that different hypothesis concerning thickness formations may be tested without conducting real experiments and costs of different types may be reduced. Moreover, while simulation, initial strip’s thickness will not have fluctuations as opposed to industrial or laboratorial experiments. On the basis of spectral analysis of random process, it was established that frequency of changing of strip’s thickness after rolling in one stand coincides with frequency of working roll’s vibration. Results of computer simulation correlate with results of the researches for 1700 mill. Therefore, opportunity to apply computer simulation to find reasons of formation of thickness variation of strip on the industrial rolling mill is shown.
-
The model of the rationale for the focus of border security efforts at the state level
Computer Research and Modeling, 2019, v. 11, no. 1, pp. 187-196Views (last year): 26.The most important principle of military science and border security is the principle of concentrating the main efforts on the main directions and tasks. At the tactical level, there are many mathematical models for computing the optimal resource allocation by directions and objects, whereas at the state level there are no corresponding models. Using the statistical data on the results of the protection of the US border, an exponential type border production function parameter is calculated that reflects the organizational and technological capabilities of the border guard. The production function determines the dependence of the probability of detaining offenders from the density of border guards per kilometer of the border. Financial indicators in the production function are not taken into account, as the border maintenance budget and border equipment correlate with the number of border agents. The objective function of the border guards is defined — the total prevented damage from detained violators taking into account their expected danger for the state and society, which is to be maximized. Using Slater's condition, the solution of the problem was found — optimal density of border guard was calculated for the regions of the state. Having a model of resource allocation, the example of the three border regions of the United States has also solved the reverse problem — threats in the regions have been assessed based on the known allocation of resources. The expected danger from an individual offender on the US-Canada border is 2–5 times higher than from an offender on the US-Mexican border. The results of the calculations are consistent with the views of US security experts: illegal migrants are mostly detained on the US-Mexican border, while potential terrorists prefer to use other channels of penetration into the US (including the US-Canadian border), where the risks of being detained are minimal. Also, the results of the calculations are consistent with the established practice of border protection: in 2013 the number of border guards outside the checkpoints on the US-Mexican border increased by 2 times compared with 2001, while on the American-Canadian border — 4 times. The practice of border protection and the views of specialists give grounds for approval of the verification of the model.
Indexed in Scopus
Full-text version of the journal is also available on the web site of the scientific electronic library eLIBRARY.RU
The journal is included in the Russian Science Citation Index
The journal is included in the RSCI
International Interdisciplinary Conference "Mathematics. Computing. Education"




