27,808 research outputs found
Phase transitions in dependence of apex predator decaying ratio in a cyclic dominant system
Cyclic dominant systems, like rock-paper-scissors game, are frequently used
to explain biodiversity in nature, where mobility, reproduction and
intransitive competition are on stage to provide the coexistence of
competitors. A significantly new situation emerges if we introduce an apex
predator who can superior all members of the mentioned three-species system. In
the latter case the evolution may terminate into three qualitatively different
destinations depending on the apex predator decaying ratio . In particular,
the whole population goes extinct or all four species survive or only the
original three-species system remains alive as we vary the control parameter.
These solutions are separated by a discontinuous and a continuous phase
transitions at critical values. Our results highlight that cyclic dominant
competition can offer a stable way to survive even in a predator-prey-like
system that can be maintained for large interval of critical parameter values.Comment: version to appear in EPL. 7 pages, 7 figure
Invasion controlled pattern formation in a generalized multi-species predator-prey system
Rock-scissors-paper game, as the simplest model of intransitive relation
between competing agents, is a frequently quoted model to explain the stable
diversity of competitors in the race of surviving. When increasing the number
of competitors we may face a novel situation because beside the mentioned
unidirectional predator-prey-like dominance a balanced or peer relation can
emerge between some competitors. By utilizing this possibility in the present
work we generalize a four-state predator-prey type model where we establish two
groups of species labeled by even and odd numbers. In particular, we introduce
different invasion probabilities between and within these groups, which results
in a tunable intensity of bidirectional invasion among peer species. Our study
reveals an exceptional richness of pattern formations where five quantitatively
different phases are observed by varying solely the strength of the mentioned
inner invasion. The related transition points can be identified with the help
of appropriate order parameters based on the spatial autocorrelation decay, on
the fraction of empty sites, and on the variance of the species density.
Furthermore, the application of diverse, alliance-specific inner invasion rates
for different groups may result in the extinction of the pair of species where
this inner invasion is moderate. These observations highlight that beyond the
well-known and intensively studied cyclic dominance there is an additional
source of complexity of pattern formation that has not been explored earlier.Comment: 8 pages, 8 figures. To appear in PR
Efficient Formal Verification for the Linux Kernel
Formal verification of the Linux kernel has been receiving increasing attention in recent years, with the development of many models, from memory subsystems to the synchronization primitives of the real-time kernel. The effort in developing formal verification methods is justified considering the large code-base, the complexity in synchronization required in a monolithic kernel and the support for multiple architectures, along with the usage of Linux on critical systems, from high-frequency trading to self-driven cars. Despite recent developments in the area, none of the proposed approaches are suitable and flexible enough to be applied in an efficient way to a running kernel. Aiming to fill such a gap, this paper proposes a formal verification approach for the Linux kernel, based on automata models. It presents a method to auto-generate verification code from an automaton, which can be integrated into a module and dynamically added into the kernel for efficient on-the-fly verification of the system, using in-kernel tracing features. Finally, a set of experiments demonstrate verification of three models, along with performance analysis of the impact of the verification, in terms of latency and throughput of the system, showing the efficiency of the approach
Untangling the intricacies of thread synchronization in the PREEMPT-RT linux kernel
This article proposes an automata-based model for describing and validating the behavior of threads in the Linux PREEMPT-RT kernel, on a single-core system. The automata model defines the events and how they influence the timeline of threads' execution, comprising the preemption control, interrupt handlers, interrupt control, scheduling and locking. This article also presents the extension of the Linux trace features that enable the trace of the kernel events used in the modeling. The model and the tracing tool are used, initially, to validate the model, but preliminary results were enough to point to two problems in the Linux kernel. Finally, the analysis of the events involved in the activation of the highest priority thread is presented in terms of necessary and sufficient conditions, describing the delays occurred in this operation in the same granularity used by kernel developers, showing how it is possible to take advantage of the model for analyzing the thread wake-up latency, without any need for watching the corresponding kernel code
Hamming distance and mobility behavior in generalized rock-paper-scissors models
This work reports on two related investigations of stochastic simulations
which are widely used to study biodiversity and other related issues. We first
deal with the behavior of the Hamming distance under the increase of the number
of species and the size of the lattice, and then investigate how the mobility
of the species contributes to jeopardize biodiversity. The investigations are
based on the standard rules of reproduction, mobility and predation or
competition, which are described by specific rules, guided by generalization of
the rock-paper-scissors game, valid in the case of three species. The results
on the Hamming distance indicate that it engenders universal behavior,
independently of the number of species and the size of the square lattice. The
results on the mobility confirm the prediction that it may destroy diversity,
if it is increased to higher and higher values.Comment: 7 pages, 9 figures. To appear in EP
Spatial patterns and biodiversity in off-lattice simulations of a cyclic three-species Lotka-Volterra model
Stochastic simulations of cyclic three-species spatial predator-prey models
are usually performed in square lattices with nearest neighbor interactions
starting from random initial conditions. In this Letter we describe the results
of off-lattice Lotka-Volterra stochastic simulations, showing that the
emergence of spiral patterns does occur for sufficiently high values of the
(conserved) total density of individuals. We also investigate the dynamics in
our simulations, finding an empirical relation characterizing the dependence of
the characteristic peak frequency and amplitude on the total density. Finally,
we study the impact of the total density on the extinction probability, showing
how a low population density may jeopardize biodiversity.Comment: 5 pages, 7 figures; new version, with new title and figure
Self-Similar Collapse of Scalar Field in Higher Dimensions
This paper constructs continuously self-similar solution of a spherically
symmetric gravitational collapse of a scalar field in n dimensions. The
qualitative behavior of these solutions is explained, and closed-form answers
are provided where possible. Equivalence of scalar field couplings is used to
show a way to generalize minimally coupled scalar field solutions to the model
with general coupling.Comment: RevTex 3.1, 15 pages, 3 figures; references adde
- …