The Upper Kama dialect is spoken by the Komi ethnic group residing in the upper Kama River region. The idiom developed independently from the area of distribution of Komi dialects and existed solely in oral form. In K...
The Upper Kama dialect is spoken by the Komi ethnic group residing in the upper Kama River region. The idiom developed independently from the area of distribution of Komi dialects and existed solely in oral form. In Komi linguistics, there is debate regarding the position of the Upper Kama idiom within the dialectal area of the Komi language. The paper presents the main stages of data processing for four Komi-Permyak dictionaries, including two archival dictionaries from the turn of the 19th-20th centuries, two audio dictionaries of the southern Komi-Zyryan dialects, and an audio dictionary of the Upper Kama dialect uploaded on the LingvoDoc platform. The study found that, based on phonetic-etymological criteria, the Upper Kama dialect is the most similar to the modern Upper Sysola dialect of the Komi-Zyryan language. However, when analyzing the similarity of the basic vocabulary, the dialect in question is most similar to the Kudymkar dialect of the southern Komi-Permyak language. This contradiction may explain the numerous discussions about the position of the Upper Kama dialect in the Komi language dialectal area.
VM2D is an open-source software being developed by the authors for two-dimensional incompressible flows simulations around airfoils. VM2D is based on meshless Lagrangian vortex methods. The main operations of the algo...
详细信息
To avoid re-development, software libraries are widely used. However, the automated testing of software libraries remains challenging. This article focuses on the use of fuzzing technology and automatic code generatio...
详细信息
To avoid re-development, software libraries are widely used. However, the automated testing of software libraries remains challenging. This article focuses on the use of fuzzing technology and automatic code generation for testing software libraries. Since late of 2020, the instrument Futag [1] – Fuzz-targets automatic generator for software libraries – has been developed in Ivannikov institute for system programming of Russian academy of science. The instrument gathers data on the building process, generates the fuzz-targets for library functions, and performs static analysis to find entity dependencies in library source code. As result, Futag has found bugs in software libraries such as libpng, tinyxml2, libpq-standalone, etc.
Crash report accumulation is a necessary step during continuous fuzzing. Dynamic software analysis techniques like fuzzing and dynamic symbolic execution generate a large number of crashes for analysis. However, the t...
详细信息
Due to the development of Wind Energy and construction of new wind farms in the Russian Federation and Europe there is a need for solution of application-oriented problems and development of effective methods for nume...
详细信息
The question about the Mari stress was the discussion's subject from 1775 (the year of the creating of the first grammar). In the modern Mari language, the type of stress depends on the dialect. Analyzing these da...
The question about the Mari stress was the discussion's subject from 1775 (the year of the creating of the first grammar). In the modern Mari language, the type of stress depends on the dialect. Analyzing these data, O.A. Sergeev comes to the following conclusions that in all two-syllable names, the stress in the manuscripts corresponded to modern dialects. However, the analysis of the verbal forms in the first books, which are availible of *** shows that in the XIX century their stress had certain systemic differences from modern dialects. Two books were analysed: A. Albinsky's grammar of the Hill Mari language, published in 1837 and a manuscript translation of the Gospel of Matthew into the Vyatka Northwest dialect of the Mari language, created in 1821. In both books, it was discovered that in the 3rd person singular and plural of the present and past tenses the placement of the stress depends on the type of conjugation, but there are some duplicate forms.
Dynamic symbolic execution (DSE) is an effective method for automated program testing and bug detection. It is increasing the code coverage by the complex branches exploration during hybrid fuzzing. DSE tools invert t...
详细信息
Directed fuzzing performs best for targeted program testing via estimating the impact of each input in reaching predefined program points. But due to insufficient analysis of the program structure and lack of flexibil...
详细信息
Open Source C++ code is developed for 2D incompressible flow simulation by using vortex methods. The code has modular structure, it permits users to simulate flow around airfoils (as well as around system of airfoils)...
详细信息
Open Source C++ code is developed for 2D incompressible flow simulation by using vortex methods. The code has modular structure, it permits users to simulate flow around airfoils (as well as around system of airfoils) and compute unsteady hydrodynamic loads acting the airfoils. It is also possible to simulate hydroelastic regimes of airfoil motion in the flow by using weakly coupled and strongly coupled algorithms. Well known vortex methods algorithms as well as original numerical schemes developed by authors are implemented, which makes it possible to raise the accuracy of simulation significantly in comparison to traditional algorithms of vortex methods. It is possible to run simulations in parallel mode, OpenMP and MPI technologies are supported. The source code of VM2D is available on GitHub under GNU GPL license (https://***/vortexmethods/VM2D).
An approximate value of the number rank is used to increase the speed of homomorphic encryption algorithms. The use of an approximate rank of a number allows reducing the computational complexity of the data encryptio...
详细信息
ISBN:
(数字)9781665404761
ISBN:
(纸本)9781665446426
An approximate value of the number rank is used to increase the speed of homomorphic encryption algorithms. The use of an approximate rank of a number allows reducing the computational complexity of the data encryption algorithm, but at the same time leads to a loss of accuracy. In this paper, we investigate the properties of the number rank. We have shown that it is possible to reduce the accuracy of calculating the approximate rank of a number, but the homomorphic encryption scheme will have the same properties.
暂无评论