BAL: A library for the brute-force analysis of dynamical systems

被引:2
|
作者
Linaro, Daniele [1 ]
Storace, Marco [2 ]
机构
[1] Univ Libre Bruxelles, ULB Neurosci Inst, Inst Interdisciplinary Res, Route Lennik 808, B-1070 Brussels, Belgium
[2] Univ Genoa, Dept Elect Elect Telecommun Engn & Naval Architec, Via Opera Pia 11-A, I-16145 Genoa, Italy
关键词
ODEs; Nonlinear systems; Bifurcation analysis; Lyapunov exponents; BIFURCATION-ANALYSIS; LYAPUNOV EXPONENTS; TOOLBOX; PACKAGE;
D O I
10.1016/j.cpc.2015.11.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper describes the functionality and usage of BAL, a C/C++ library with a Python front-end for the brute-force analysis of continuous-time dynamical systems described by ordinary differential equations (ODEs). BAL provides an easy-to-use wrapper for the efficient numerical integration of ODEs and, by detecting intersections of the trajectory with appropriate Poincare sections, allows to classify the asymptotic trajectory of a dynamical system for bifurcation analysis. Some examples of application are discussed, concerning two-dimensional bifurcation diagrams, Lyapunov exponents and finite-time Lyapunov exponents, basins of attraction, simulation of switching ODE systems, and integration with AUTO, a software package for continuation analysis. Program summary Program title: BAL (Library) Catalogue identifier: AEYY_v1_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEYY_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 65256 No. of bytes in distributed program, including test data, etc.: 438133 Distribution format: tar.gz Programming language: C/C++, Python. Computer: PCs and Workstations. Operating system: Any Unix based system such as Linux and Mac OSX. RAM: Variable, depending on the number of dimensions of the dynamical system and duration of the simulation. Classification: 4.3, 4.12. External routines: CVODE, Boost, HDF5 Nature of problem: The numerical analysis of continuous-time nonlinear dynamical systems often requires the computation of a large number of solutions of the system, for varying parameter sets, and the subsequent classification of the steady state solution. Solution method: This library provides a convenient interface to the library CVODE for the integration of sets of differential equations and at the same time implements all the machinery required for integrating and classifying the behaviour of the system for varying parameter sets and initial conditions. A high-level Python interface makes the usage of the library amenable also to users who are not familiar with the C/C++ programming languages. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:126 / 134
页数:9
相关论文
共 50 条
  • [21] Honey Encryption: Security Beyond the Brute-Force Bound
    Juels, Ari
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 293 - 310
  • [22] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [23] Fast Network-Based Brute-Force Detection
    Koch, Robert
    Rodosek, Gabi Dreo
    EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012), 2012, : 184 - 190
  • [24] PUMP CONTROLS FINESSE BRUTE-FORCE DESIGN.
    Bagat, Arjun
    Orban, Paul
    Hydraulics and Pneumatics, 1985, 38 (05): : 53 - 56
  • [25] InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication
    Chen, Yu
    Yu, Yang
    Zhai, Lidong
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2027 - 2041
  • [26] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Yicheng Xu
    Vincent Chau
    Chenchen Wu
    Yong Zhang
    Vassilis Zissimopoulos
    Yifei Zou
    Algorithmica, 2024, 86 : 130 - 146
  • [27] Honey Encryption Encryption beyond the Brute-Force Barrier
    Juels, Ari
    Ristenpart, Thomas
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 59 - 62
  • [28] Brute-Force Facial Landmark Analysis with a 140,000-Way Classifier
    Li, Mengtian
    Jeni, Laszlo
    Ramanan, Deva
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 7032 - 7040
  • [29] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Xu, Yicheng
    Chau, Vincent
    Wu, Chenchen
    Zhang, Yong
    Zissimopoulos, Vassilis
    Zou, Yifei
    ALGORITHMICA, 2024, 86 (01) : 130 - 146
  • [30] A New Distributed Brute-Force Password Cracking Technique
    Tirado, Emanuel
    Turpin, Brendan
    Beltz, Cody
    Roshon, Phillip
    Judge, Rylin
    Gagneja, Kanwal
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 117 - 127