Behavioral Agent Testing of Distributed Information Systems Oleksandr Martynyuka, Oleksandr Drozda, Hanna Stepovaa, Viktor Antonyuka, Dmitry Martynyukb a Odessa National Polytechnic University, Ave. Shevchenko 1, 65044 Odessa, Ukraine b Join Venture “Nippon Auto”, Academician Williams str. 71a, Odessa, Ukraine Abstract The use of multi-agent technologies in modern distributed information systems, that due to the increasingly demanded properties of autonomy, mobility, intelligence, cooperation, determines their appearance in the tools of online and offline testing. This work presents an agent-based check model of behavioral testing of a component of a distributed information system in its resource environment. This agent check model has the features of the composition of the reactive online and deliberative offline components of testing, suggesting deterministic and evolutionary methods of decomposition behavioral testing. To ensure autonomy and mobility, the agent-based check model defines the resource model of the component deployment environment, models of its goals and test strategies, signatures of multi-agent operations, as part of observation, strategy execution and adaptation, as well as initial models, goals and test strategies of the component. For the intelligence of the agent-based check model, its main components are also defined as individuals in the population of evolutionary test generation, which is proposed as an implementation of the deliberative component testing strategy. For the cooperation of agent-based check models in the network and multi-level interaction of their reactive and deliberative components, there are cooperative definitions for resource models of placement, goals and strategies, operations and initializations, realizability and transportability into the network DIS model, inheritance into the hierarchical DIS model. The check model defines the formal conditions/requirements for the performance of the behavioral online and offline testing, that performed by the multi-agent system of testing, and can be taken as the basic one, when constructing methods and special distributed behavioral test systems. Keywords: Distributed information system, online and offline testing, behavioral testing, agent, multi-agent system, evolutionary check model 1. Introduction Modern effective distributed information systems (DIS) [1, 2] are based on the joint use of many promising computer, communication, computing, information subject technologies, and some of which are rapidly developing service-oriented architectures, as Web services [3, 4], cluster, cloud, multi-agent [5, 6]and GRID systems [7, 8], super-large data and knowledge systems [9, 10] intelligent systems [11-13], the avalanche-growing world of the Internet of things [14, 15]. One of the most important reasons for this growth is the significant successes of fundamental mathematical computer sciences, in particular, in the field of complex, decomposition, functional, fuzzy, intellectual, concurrent methods of analysis and synthesis of DIS. --------------------------------------------------------- ICT&ES-2020: Information-Communication Technologies & Embedded Systems, November 12, 2020, Mykolaiv, Ukraine EMAIL: anmartynyuk@ukr.net (O. Martynyuk); drozd@ukr.net (O. Drozd); hanna.suhak@gmail.com (H. Stepova); viktor.v.antoniuk@gmail.com (V. Antonyuk); domarty@ukr.net (D. Martynuk) ORCID: 0000-0003-1461-2000 (O. Martynyuk); 0000-0003-2191-6758 (O. Drozd); 0000-0002-7223-8822 (H. Stepova); 0000-0003-0427-9005 (V. Antonyuk); 0000-0001-9267-1474 (D. Martynuk) ©️ 2020 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) At the same time, the quality of their functioning, which is determined not only by the general completeness, accuracy and efficiency of the results, but also their reliability, and the performance of the DIS as a whole [2]. One of the most important ways to ensure the operability of computer systems is the technology of technical verification of projects, testing and diagnosing of DIS implementations, which allows developing and applying various tools, as part of automated technical diagnostic systems (ASTD) [16]. Among these tools, as a rule, there is an online and offline testing. Currently, there are developed tools of structural, functional-behavioral, deterministic, pseudo-random, evolutionary- genetic, logical, symbolic, fuzzy, intelligent, abstract, decomposition analysis and synthesis to provide the necessary level of DIS reliability of projects and the operability of functioning of its implementations, in particular, the tools of online and offline testing of DIS. Most often, to achieve greater efficiency, these tools are used in a comprehensive manner, tuning their aggregates to the features of specific tested systems and the tasks they solve. The properties of the DIS, that adopted from the applied technologies, are reflected also in the properties of ASTD tools. Moreover, the complexity of constructing technical tools ASTD often exceeds the complexity of the DIS [15-19] itself. It is often and naturally, for example, for systems of critical applications [20-22]. At the same time, there is transfer of the basic methods of DIS analysis and synthesis to a systemic, abstract-symbolic, structural-behavioral level, which has mappings to many possible technologies of physical implementation. Additionally, the degree of dimensionality, uncertainty and intelligence of DIS behavior, of scalability, autonomy, mobility and situational dynamic the goal formation and the cooperation of DIS components for solving objective problems in a multi-level, multi-platform global network is increasing. This increasing degree requires appropriate improvement of verification and test tools, in particular, in the abstract, behavioral, decomposition, intelligent directions. Thus, we can conclude, that the development of effective tools for ASTD new DIS is non-trivial and relevant. 2. Review of the known approaches Formal behavioral analysis and synthesis of computer systems (CS), usually characterized by NP- complexity [15-19], is becoming increasingly important in systemic, structural and functional verification of projects of CS and check of its implementation. The ongoing development of the mathematical theory of experiments with automata class models [23, 24], which define a formal methodology of behavioral checking and recognition, gradually raises the upper limits of applicability of check automata models. Generally, these limits are determined by exponential (NP-complex) dependences of the complexity of such an analysis from the dimension of input models [15-19]. To reduce the complexity, in particular, the time of preparation and execution of the behavioral testing in the class of errors of functional automata mappings with preserved values of the completeness of the testing itself, a common (mathematical) and special (taking into account architectural solutions) network and hierarchical decomposition are used [25-29] for checked systems most often. They allow to reduce (usually polynomially) the exponential dependence of the dimension of complexity (computational resources) and time of constructing and performing of testing at a formal model level. Special probabilistic-statistical [30-32], fuzzy [33-36], intelligent [37, 38], in particular, evolutionary-genetic [25, 28, 29, 38] models and methods give experimental values for the complexity of behavioral testing for most real systems, that polynomially smaller, than the upper theoretical boundaries of deterministic methods, with a slight decrease in the completeness of this testing. As a result, depending on the involved computing tools, behavioral check of acceptable completeness of checking for DIS of medium complexity becomes achievable, nevertheless, as noted, such a decrease does not remove this problem from the class of NP-complex ones. The above circumstances determine the expediency of further development of verification and testing of CS, in particular, complex, formal, decomposition, intelligent, parallel check models and methods with the total effect of reducing the complexity of the computational costs of its preparation and implementation. The growing tendency to classify a significant part of modern DIS to real-time and critical application systems, significantly strengthens the requirements for completeness, accuracy and relevance of operational checking of their performance, for resources, that necessary for its implementation. This trend also encourages the use of complex ASTD, which include tools of online and offline testing, acting from the upper systemic, structural and functional level. In this case, the work of ASTD is inevitably based on formal models and methods of behavioral testing [24, 28, 29, 39-41], whether their analytical or intuitive expert implementations. Behavioral testing of the CS makes it possible both for the online testing [29], that is backgrounding to the main functioning and performing the accumulation of check presentability of passive recognition experiments, as well as the special offline testing, that is interrupting the main functioning of the CS and performing active check experiments [28]. Typically, both modes involve a previous (preprocessor) check analysis of the reference behavior of the CS with external or internal (own) procurement of elements of behavioral check. The foregoing does not remove the advisability of continuing research on decomposition, compatible, dynamically integrated online and offline behavioral testing, especially for distributed, critical, intellectual CS, in particular, DIS, with dynamically reconfigurable of model representation, structure, composition and migration of components, general and component behavior. These features, in particular, become characteristic of DIS and cause the expanding use of multi- agent technologies. For such systems, a distributed, fuzzy, dynamic definition of the class of checked properties, completeness, accuracy and relevance of the checking are also characteristic. The consequence of this condition, in particular, can be considered the emergence of the class of ASTD DIS, essentially relying on models and methods of multi-agent technologies [42]. Taking into account the aforementioned, the tasks of system-functional, network and multi-level, integrated online and offline behavioral testing of DIS can be considered relevant and carried out. This testing executes on the basis of the dynamic cooperation of intelligent agents in the conditions of variable resources, that provided by the environment of the DIS itself. Also, this behavioral testing has variable check controllability, observability and heritability of own results, bases on agent, decomposition, deterministic and evolutionary models and methods. 3. Main researched tasks A multilevel network model – a extended hierarchical Petri net, adopted as the basic input model of checking agent for DIS, – is characterized by a two-dimensional structure, alphabets and mappings of components, data and knowledge structures, that can change in the life cycle of a checked DIS, that hosts checking agents from MAS. Online and offline testing of DIS is carried out by cooperations of agents from a set of Ag, that located into DIS environment. Atomic element, MAS agent agiAg, is the MAS model of the first level. The goal of this work is the construction an agent check model agi, as a formalization of the representation of agent online and offline behavioral testing, performed on the basis of the Petri net S(f)i – an automata class model for some DIS component. These representations are selected in accordance with the contexts for MAC testing, namely: autonomous; mobile; purposeful or intellectual; cooperative. To achieve this goal, the tasks of behavioral testing for PN S(f)i are formalized. These tasks are solved by the agent agiAg of a certain components of DIS and include: behavioral testing for an component Petri net S(f)i; controllability and observability of testing for the component Petri net S(f)i into the network model nS(f)i of DIS; inheritance of the elements of behavioral testing of a single-level Petri net S(f)i into the hierarchical model iS(f)i of DIS. 4. Formal model of behavioral testing The model of behavioral agent-based testing is built on the basis of an extended Petri net — an input automata class model [26, 28, 29] for some i-th component of DIS of the form: S(f)i=(P, T, Ev, Ac, X, Y, Ep, Et, Em, F, S, M, M0), (1) where P, T – positions and transitions, respectively; Ev, Ac – events for positions and actions for transitions; X@Co, Y@Fu – external controlled events and observed actions, supplemented by @ – an unknown event or action; Ep – the set of variables for the energy costs, represented as triples epnep=(epinep,epnep,eptnep) with components – the upper values of the energy expenditures, calculated on the electricity epinep, temperature difference epnep, time interval eptnep; Et – variables for the energy costs, represented as the triples etnet=(etinet,etnet,ettnet) with components - upper of values of the energy costs calculated on the electricity epinep, temperature difference epnep, time interval eptnep; Em – weighted mandates for forming events and performing actions, having the form of a triple emnem=(eminem,emnem,emtnem) with components – cumulative values of energy costs, that are calculated on the electricity epinep, temperature difference epnep, time interval eptnep; F:((B(P),S(B(P)))T×Ac×Et)B(P))) – the incidence relation for subsets of positions from the Boolean {p1,…,pip}B(P) and transitions from T, that is depended from current events, actions and energy costs; S:(PEv×EpTAc×Et) – the correspondence of own, internal variables of events, as well as actions, expanded by the metric of energy costs in positions and transitions, included in F; M0:PEm– the initial marking of positions, taking into account the initial energy costs of initialization, M:P×EmEm – function of the current marking of positions and transitions, taking into account the current energy costs, accumulated during the movement of chips. The model agi of the behavioral agent-based testing, which contains two components for simulated Petri nets (1), the deterministic reactive agRi and the evolutionary deliberative agDi [42] has the form: agi=(agRi, agDi, Evi, Aci, i), (2) where agRi, agDi – its reactive and deliberative components, that interact with each other in space and in time, they are functioning in the Petri net S(f)i – the behavioral model of some i-th component of DIS in its space-network nS(f)i [28] and temporal hierarchical iS(f)i [29] models; Evi, Aci – the events and actions of the components; i:iIAcRiEvDi)(AcDiEvRi))) – the relation of the interaction for reactive agRi and deliberative agDi components, both parallel (in space) and serial (in time). The type, complexity and state of the Petri net S(f)i of the DIS and the multi-agent system (MAS) of testing, these states, as well as own targeting and tasks of agent agi affect to the form, complexity, priority, activation of agRi and agDi components. The difference between reactive agRi and deliberative agDi of the check agent agi consists in the features of check tasks, models and methods, which are used into definition, constructing, and recognizing of the check objects. In general, the agent model agi has information about the objects of check for reference checked properties Pri, identifiers Cii, check Cpi and link Lpi primitives, realized S(f)i(RAc) and transported S(f)i(TrEv) Petri nets, realizing T-1(S(f)i) and transporting T(S(f)i) nodal subnets, realized S(f)i(RXT-1(S(f)i)) and transported S(f)i(TrYT(S(f)i)) nodal Petri nets necessary, inherited properties iPri , identifiers iCii, check iCpi and iLpi primitives, check fragments Cfi, realized CfiR and transported CfiTr check fragments, inherited check fragments iCfi. The intelligence of the check agent agi for its deliberative component agDi can be based on evolutionary approaches to check a type of check evolution [28]: Cei=(Cfi, Cpi, Lpi, Sgti, Cffi), (3) where: Cfi, Cpi, Lpi – the sets of check fragments, check and linking primitives, Сf0i – initial set of check fragments, Сf0i=СpiСfi, Сffi – final set of check fragments; SgtagDi={tagDi, tagDi, tagDi, tagDi, tagDi} – the signature of operations and functions of check evolution, that contain special operations of mutation, crossover, immunity, fitness function, selection function, respectively. In the case of the presentation of DIS not only as checked, but also as a resource environment for hosting the checking MAS, the second extended model of the check agent agi (also agRi and agDi) [42] is also presented as a system: agi=(cSi, cMi, Qi, Sti, {i, i, i}, {cs0i, cm0i, q0i, st0i}), (4) where: – cSi – agent check models for the i-th component of the placement in the DIS, which determine the check conditions; – cMi – agent check methods for the i-th component of the placement in the DIS, which determine the implementation of check procedures; – Qi – agent goals, for some qiQi, defined as: qi:((cSicMicSicMiQi, qi((csi,cmi),(csi’,cmi’))= =(ki((i(csi’)-i(csi)),(i(cmi’)-i(cmi))), ki((i(csi’)-i(csi)), (i(cmi’)-i(cmi))), ki((i(csi’)-i(csi)),(i(cmi’)-i(cmi))), ki((i(csi’)-i(csi)),(i(cmi’)-i(cmi))), ki((i(csi’)-i(csi)),(i(cmi’)-i(cmi))), ki((i(csi’)-i(csi)), (i(cmi’)-i(cmi)))), (5) where ki, ki, ki, ki, ki, ki, i, i, i, i=(i, i, i), i=(i, i, i), i=(i, i, i) – the weighted priority coefficients and determination functions, respectively, of completeness  of verification, length  (complexity), multiplicity , network realizability  and transportability , inter-level inheritance  of check (moreover, the functions of realizability, transportability, inheritance combine each of three own functions of preservation of completeness, lengths, multiples of check), csi and csi’, cmi and cmi’ - the initial and assumed next agent models and check methods for the placement component, respectively;  Sti – strategies for the agent’s functioning – the agent’s application of deterministic, pseudo- random, expert, evolutionary check methods in its life cycle, for some sti defined as: sti:(jJ(csicmijjJcsicmi)j), (csi’,cmi’)=sti(csi,cmi); (6)  {i, i, i} – accent-agent operations directly displayed in the composition of check models from cMi, their signatures of operations and relations (5), in composition of check methods from cMi, their signatures of operations and relations (6), accordance with the models: a) abstract SgS(f)i={,,} - the signature of the check operations of identification, congruence, determination [24]; b) network realizing and transporting compositions SgnS(f)i={@,,@’,#} - the signature of the check compositions – sequential, parallel, with feedback, DeMorgan half-convolution [28, 29]; c) hierarchical inheriting compositions SgiS(f)i={p,t} - signature of check substitutions of macro- positions and macro-transitions [29]. Own agent operations include: 1. observation i:(jJ(csicmijVi(jJ(csicmij, (csi,cmi)=i((jJ(csicmij,Vi) (7) – with the definition of the current agent check model and method, if necessary, the construction of identifiers Cii and check primitives Cpi in their composition, here Vi=(eni, agRi, Conni) is the complete environment of agent agi, for which: 1) eni=(S(f)i, nS(f)i, iS(f)i, Pli) – abstract, two- dimensional, network-hierarchical space of the agent world for the agent agi, provided by the i- th component of DIS; 2) Conni – the placement relation (on functional level – usually the inclusion relation) between the check agent agi and the space eni for the checked i-th component; 3) Pli={plsubi, plini, plouti, plioi, plnodei, plsubni, plupi, plmidi, pllowi} – a set of basic, including initial, placements of the agent agi of the basic types (input, output, input-output, nodal in the structure, sub-structure, senior, middle, junior in the hierarchy) in+ the space eni; 2. the implementation of the strategy i:StiViVi, V’=i(sti, Vi) (8) – with obtaining the modified environment Vi’=( eni’, agi’, Conni’) (in its composition - modified spaces of the agent world eni’, agent agi’, relations of placement Conni’) for the existing agent model csi and method cmi of check, with definition (if necessary) of linking primitives Lpi and inherited properties іPri, with constructing of check fragments Cfi and determining for the set of achieved check fragments the values of completeness i, length i, multiplicity i, realizability i, transportability i, inheritance i; 3. adaptation i=(smi,sti), smi:((jJ(csicmij((jJ(csicmijjJ(csicmij(jJ(csicmij, (csi’,cmi’)=smi((jJ(csicmij,(csi,cmi),(csi’,cmi’)), sti:(Sti(jJ(csicmijjJ(csicmijSti, Sti’=sti(Sti,(csi,cmi),(csi’,cmi’)) (9) – with fixing updated sets (bases) of agent check models cSi, methods cMi and strategies Sti, consisting of: 1) identifiers Cii and check primitives Cpi; 2) check fragments Cfi; 3) output realizable S(f)(RAc) and input transportable S(f)(TrEv) component (autonomous) partial Petri nets; 4) input realizing T-1(S(f)i) and output transporting T(S(f)i) nodal topological subnets; 5) input realizable S(f)(REvT-1(S(f)i)) and output transportable S(f)(TrAcT(S(f)i)) nodal (for input and output topological subnets) partial Petri nets [26, 28]; 6) inherited, adjacent up or down for hierarchy, iS(f)i hierarchies of properties and transactions іPri, identifiers іCii, check iCpi and linking iLpi primitives, check fragments iCfi, respectively [29];  {cs0i, cm0i, q0i, st0i} – initial agent check model, method, goal, strategy. Then the combined agent check model csicSi from the above set models cSi for components of abstract S(f)i, network nS(f)i and hierarchical iS(f)i models is defined as: csi=((Wi^,Cii,Cpi,Lpi,Cfi, SgS(f)i), (S(f)i(R i),S(f)i(Tr i),T-1(S(f)i),T(S(f)i),S(f)i(R EvT-1(S(f)i)),S(f)i(TrAcT(S(f)i)),SgnS(f)i ), Ac Ev (iPri,iCii,iCpi,iLpi,iCfi,SgiS(f)i)). (10) The representation of the abstract component agent meta-method of behavioral check cmicMi as a special, asynchronous-event parallel behavioral procedure with many realizations, that is satisfying the conditions of the corresponding component agent check model csicSi, can be formally determined by using the special Petri net - a special kind of the Rabin-Scott automata, the components of which individually and the relationships for them were mostly determined earlier: cmi=({W^,Evi,Aci},jJ(Wij ^,Cfij,Prij,{ij,ij,ij}),{Pri,Cii,Cpi,Cfi},Mmi, {i,i,i},{i,i,i},{i,i,i},{i,i0},(Wi0^=Cfi0,Pri0=, {i0=0,i0=0,i0=0}),(WiF^,CfiF,PriF,{iF,iF,iF})), (11) where: a) {Evi,Aci,W^} – events Evi, actions Aci, input-output words W^EviAci with unmarked (unrecognized) non-terminals from Evi\Xi and Aci\Yi; b) jJ(Wij^,Cfij,Prij,{ij,ij,ij}) – states of Rabin-Scott automata, as part of the current sets of input-output words Wij^, verified properties Prij, reached values of completeness ij, length ij, multiplicity ij of the check; c) {Pri,Cii,Cpi,Cfi} – properties and transactions Pri, identifiers Cii, check primitives Cpi and fragments Cpi, presented earlier; d) Mmi={mm1,mm2,…,mmnmm} – chips – weighted mandates for forming events in states (non- terminals) and performing actions in check fragments, the chip has the form of a triple mmnmm={nmm,nmm,nmm} with elements - current cumulative values of variables of completeness nmm, length (complexity, time)nmm, multiplicity nmm of check; e) {i,i,i} – operations: – i:(Wij^,Evi,Aci)(Wij^,Evi,Aci) – registration of input-output words, events and actions, as a part of input-output words; – i: – associations of events and actions with reference properties, identifiers, check primitives; – i – compatibility (intersection) of the contexts of the neighborhoods from the corresponding input-output words; g) {i,i,i} – operations, presented earlier, respectively, of identifying i, congruence i and determining i; h) {i,i,i} – previously defined functions of determining, respectively, completeness i, length (complexity)i, multiplicity i; i) i0:(Wi0^=Cfi0,Pri0=,{i0=0,i0=0,i0=0}) {i0=0,i0=0,i0=0}– initialization markup for the initial state, taking into account zero results, here mmi0={i0=0,i0=0,i0=0},i:(jJ(Wij^,Cfij,Prij,{ij,ij,ij}))jJ{ij,ij,ij}) – function of the current markup of states, taking into account the current completeness, length, multiplicity of check, which are accumulated during movement in state and modified chips, here mmi={i,i,i}, for some current (Wij^,Cfij,Prij,{ij,ij,ij})jJ(Wij^,Cfij,Prij, {ij,ij,ij}), that is mmi={ij,ij,ij}=i((Wij ,Cfij,Prij,{ij,ij,ij})); j) (Wi0 =Cfi0,Pri0=,{i0=0,i0=0, i0=0}) – ^ ^ initialization markup for the initial state, taking into account the initial state of the Rabin-Scott automata, consisting of initial sets of input-output words Wi0^, verified properties Pri0, initial (zero) values of completeness i0=0, length i0=0, multiplicity i0=0 of the check; k) (WF^,CfiF,PriF,{iF,iF,iF}) – the final state of the Rabin-Scott automata, as a part of finite sets of input-output words WiF^, verified properties of PriF, achieved values of completeness iF=i(PriF), length iF=i(CfiF), multiplicity iF=i(CfiF) of check. 5. Notes for method and implementation The meta-method can be implemented in deterministic, pseudo-random, evolutionary, and also combined methods based on the search in depth and/or in width. So, model evolutionary concretization and modification of the component agent method of behavioral testing cemiceMi has specialized view for evolutionary operations -i,-i and functions -i,-i,-i,-i,-i,-i: cemi=({W^,Evi,Aci},jJ(Wij ^,Cfij,Prij,{ij,ij,ij}),{Pri,Cii,Cpi,Cfi},Mmi, {i,i,i},{i-i,-i,- i,i},{-i,-i,-i,-i,-i,-i},{i,i0}, (Wi0^=Cfi0,Pri0=,{i0=0,i0=0,i0=0}),(WiF^,CfiF,PriF,{iF,iF,iF})), (12) here modified objects – operations and functions [24, 28, 29]: a) i-i – associations of evolutionary events and actions with identifiers, based on check identification i; b) -i – binary operation of a modifying or expanding mutation based on the check congruence i; c) -i – binary operation of modifying or expanding crossing-over based on the control congruence i; d) -i – the posteriori unary fitness function for determining the completeness i of a new check fragment Cfi (a new individual of evolution), based on the function for determining of the check completeness i; e) -i – the posteriori unary fitness function for determining the length (complexity) i of the new check fragment Cfi, based on the function for determining the check length i; g) -i – the posteriori unary fitness function for determining the multiplicity i of the new check fragment Cfi, based on the function for determining the check multiplicity ii; h) -i – the priori binary selection function for determining the total completeness i of the check fragments Cfi1 and Cfi2 – possible parents of the new check fragment Cfi, based on function for determination of the check completeness i; i) -i, – the priori binary selection function for determining the total length (complexity) i of the control fragments Cfi1 and Cfi2 – possible parents of the new check fragment Cfi, based on function for determination of the check length i; j) -i – the priori binary selection function for determining the total multiplicity i of the check fragments Cfi1 and Cfi2 – possible parents of the new check fragment Cfi, based on the function for determination of the check multiplicity i. The procedure of the component agent evolutionary method cemi of behavioral testing is an event model and does not determine the serial-parallel organization of check, in particular, the combined organization of search in width and depth. Such an organization can be determined by using relations for subjects and objects in their structures and locations, as well as for their operations/functions. Relationships include special (dependencies, generalizations, implementations, associations, aggregations, inheritance), basic (precedence, order, equivalence, compatibility, incompatibility, uncertainty, indifference), properties (reflexivity, symmetry, transitivity connectivity), both forming and limiting the possible structures of the actions of the method. At the internal level, these relations are determined by abstract resources shared in a certain way, first of all, by basic computer-processors, information objects, and communication tools. Computing processors and communication tools directly depend on the environment of the agent’s location, therefore, their influence on the relationship between objects and operations/functions of the agent is indirect to the environment of placement and can be considered instrumental. Information objects are abstracted from the placement environment, their influence on the relationship between objects and agent operations/functions is direct and can be considered methodological. In this regard, it is necessary to consider the current, previous and subsequent influences - temporary relationships for objects (including information) and operations/functions, as well as their instances in the agent's lifetime. In such relations, the input and output weight characteristics of the action object (usually an information object) performed by the subject of the action (usually an operation/function) are significant. These weight characteristics are essential precisely for the subjects of action and their instances, when organizing the system of priorities and parallelism, and also the corresponding system of method relations. Own relations for operations/functions, as subjects of the current moment of time and the current shared object of action in the evolutionary method of cemi behavioral check, are general relations: firstly, of direct preceding (see table 1), which defines adjacent sequential subjects of action - operations/functions with the transfer of a shared action object between them; secondly, compatibility (see table 2), which defines parallel subjects of the action - operations/functions with conflict-free separation of the objects of action. It is obvious, that in the evolutionary method of behavioral check cemi for operations/functions, as subjects of the current moment of time, the relation of indifference acts for different current individual objects of action not separated by subjects. That is, parallelism for such operations/functions and individual objects is methodologically not limited. Table 1 The Relationship of the immediate preceding (quasiorder) i i i i- - - i - - - - - - i i i i, i, i i, i, i i * * * * i * * * i * * * * * * i-i * * * * * * * -i * * * * * -i * * * * * i * * * * -i, * * -i, * * -i * * -i, * * * -i, * * * -i * * * Relationships of indifferent is valid for operations/functions, as subjects of the current moment of time, for different current (individual) action objects, that are not separated by these operations/functions in the evolutionary behavioral check method cemi, therefore, the parallelism for such operations/functions and individual objects is unlimited methodologically. Table 2 The ratio of compatibility (tolerance): i i i i-i -i -i i -i, -i, -i -i, -i, -i i * i * * * i * * * i-i * * * -i * * -i * * i * -i, * * * -i, * * * -i * * * -i, * * * -i, * * * -i * * * The specificity of the check functioning of the deterministic reactive component agRi of the agent agi – the execution of its operations {i, i, i} – can be based on the methods of depth and breadth search with local search optimization for behavioral testing, which bases on experiments with automata model, and is characterized by computational NP-complexity. This circumstance implies the limitation of the analysis space — a subset of the DIS components — by objects of medium complexity (up to 1000 positions/ /transitions) to obtain the solution of check tasks of the required characteristics. These characteristics include high completeness i, acceptable properties of length i and multiplicity i, realizability i, transportation i, inheritance i for spent of time i and memory i, limited by the upper bounds of the allocated computing resources RagRi=(MaxagRi, MaxagRi) of the reactive component agRi. The specificity of the functioning of the deliberative component of the agent for performance of its operations {i, i, i} can be based on a pseudo-random goal-oriented check evolutionary search. As result, this functioning retains the upper exponential analytical estimates of deterministic methods for experiments with automata and Petri nets, but it has experimental complexity, significantly less computational NP-complexity of the latter. This leads to the possibility of solution of check tasks of acceptable completeness and length with time and memory costs lower, than average. This range is limited by the lower and upper boundaries of the resources RagDi=(MaxagDi, MaxagDi) of the deliberative component in the analysis space of the objects above an average degree of complexity (more, than 1000 positions/transitions) - a subset of the DIS components and DIS in as a whole. The results of analytical modeling made it possible to verify the models and assess the domain of their applicability, in particular, the possibility of moving the NP- complexity of the behavioral check into the reachable area. Petri nets S(f) are represented in the memory of the controllers for monitoring systems by using of the list structures. Let the following dimensions of the sets be adopted for the Petri net: |P|=np, |T|=nt, n= np+nt, |X|=m, |Y|=l. The structures require for the upper limit of the number of conditional fields: ciSmax=(nt(4np+3L+4)+np(3m+2))+(iI nt i(4npi +3Li +4)+npi (3mi +2))+ +(jJ ntj(4npj +3Lj +4)+npj(3mj +2)). (13) The complexity of the check analysis of Petri net S(f) includes the preprocessor and main stages for each of evolutions and is determined by upper bound: cciSmax=nt(4np+3L+4)+np(3m+2)+2ntnp(nt-1)+2(2Lmnpnt)nt-3)+(nt-1)(npnt)!+ +(iI nt(4npi +3Li +4)+npi (3mi +2)+2ntinpi(nti -1)+2(2Liminpinti)niti-3)+(nti-1)(npinti)!)+ +(jJ ntjntj(4npj+3Lj+4)+npj(3mj+2)++2ntjnpj(ntj-1)+2(2Ljmjnpjntj)njt j-3)+(ntj-1)(npjntj)!). (14) These formulas contain the three parts for Petri net and Petri subnets. The comparison of the online testing programs, based on automata-deterministic and Petri-evolutionary models and methods for onboard automated control systems and terminal video surveillance confirmed a decrease for the computational complexity of online testing and reducing the its time. Upper computational complexity and length of the online testing for the Determination (solid) and Evolutional (dashed) models and methods in cases of simple Petri net () and hierarchical Petri net () are presents in Fig.1. Figure 1: Computational complexity and length of online testing of the Determ-solid & Evol-dashed (simple PN  & Hierarch.PN ) The basic programs of the behavioral online testing were carried out for component and decomposition of DIS, the results are presented in Tab. 3. Table 3 Experimental values of computational complexity of check: Object Degree of decomposition Input complexity Complexity of check Module BSAC 8 362 64980 Module TVS 2 50 4323 Module IP/IPSec 3 115 71871 Module of Naming 2 146 38150450 Module of Encaps. 3 180 1572123 The comparison of the results of basic programs for automata-deterministic and Petri-evolutionary models and methods of online testing for onboard automated control systems (BSAC) and terminal video surveillance (TVS) confirmed: a) decrease in computational complexity of online testing; b) reducing timer time of the check with preservation of: c) the length of the check and their d) completeness. 6. Conclusions The proposed agent-based model of behavioral checking by taking into account the resource conditions of the deployment environment, when checking the DIS components allows to balance and perform distributed behavioral online and offline testing, based on its combined deterministic and evolutionary models and methods, as well as models of the agent deployment environment in the DIS itself. The proposed combined models, due to the decomposition of the check processes of the distributed MAS, coordinated with the resources of the DIS, make it possible to reduce the time of the DIS check by up to 90% in comparison with the non-decomposition approach. These models and methods increase the completeness, accuracy and efficiency of the checking of the structure and functioning of real DIS with acceptable computational costs of the MAS level built into DIS. Its exponential complexity, limiting the use of behavioral check, is polynomially reduced due to component (DIS) and agent-based (MAS) decomposition. This, in turn, allows to check more complex DIS. 7. References [1] N. M. Josuttis, SOA in Practice: The Art of Distributed System Design (Theory in Practice), O'Reilly Media. 2007. [2] М. Tamer Ozsu, P. Valduriez, Principles of Distributed Database Systems (3rd Edition), Springer, 2011. [3] M. Ouzzani, A. Bouguettaya, Semantic Web Services for Web Databases, Springer Science+Business Media, 2011. [4] S. Pakari, E. Kheirkhah, M. Jalali, Web-service Discovery Methods and Techniques: a Review, International Journal of Computer Science, Engineering & Information Technology 4 (2014) 1–14. [5] X. Jing, L. Chen-Ching, Multi-agent systems and their applications, Journal of International Council on electrical engineering 7(1) (2017) 188–197. [6] Y. Shoham, K. Leyton-Brown, Multiagent systems. Algorithmic, Game-Theoretic, and Logical Foundations (Revision 1.1), Shoham and Leyton-Brown, 2009, 2010. [7] F. Berman, G. Fox, T. Hey, Grid Computing: Making the Global Infrastructure a Reality, John Wiley & Sons Ltd, England, 2005. [8] Installation Guide for UNICORE Server Components, 2018. URL: http://linksceem.cyi.ac.cy/ls2/images/stories/UNICORE_Admin_Workshop.pdf [9] C. J. Date, Date on Database: Writings 2000–2006, Apress, 2006. [10] M. Stonebraker, S. Madden, P. Dubey, Intel “big data” science and technology center vision and execution plan, ACM SIGMOD Record 42(1) (2013) 44-49. [11] S. J. Russell, P. Norvig, Artificial Intelligence: a Modern Approach, Prentice-Hall, A Simon & Schuster Company Englewood Cliffs, New Jersey, 2010. [12] P. H. Winston, Artificial Intelligence (3rd Edition), Addison-Wesley Pub Co; 3rd edition, 1992. [13] P. Norvig, S. J. Russell, Artificial Intelligence: A Modern Approach (2nd Edition), Prentice Hall; 2002. [14] E. Friedman-Hill, Jess in Action: Rule-Based Systems in Java, Manning Publications Company, 2003. [15] Y. Kondratenko, O. Kozlov, O. Korobko, A. Topalov, Complex Industrial Systems Automation Based on the Internet of Things Implementation, in: Bassiliades, N. et al. (Eds.), Information and Communication Technologies in Education, Research, and Industrial Applications: ICTERI’2017, CCIS 826, Springer, Cham, 2018, pp.164–187. [16] O. Drozd, V. Kharchenko, A. Rucinski, T. Kochanski, R. Garbos, D. Maevsky, Development of Models in Resilient Computing, in: 10th IEEE International Conference on Dependable Systems, Services and Technologies, Leeds, UK, 2019, pp. 2–7. doi: 10.1109/DESSERT.2019.8770035 [17] V. Hahanov, O. Mishchenko, V. Soklakova, V. Abdullayev, S. Chumachenko, E. Litvinova, Cyber-Social Computing, in: V. Kharchenko, Y. Kondratenko, J. Kacprzyk (Eds.) Green IT Engineering: Social, Business and Industrial Applications, volume 171 Studies in Systems, Decisions and Control, Springer, Berlin 2019, pp. 489-515. [18] K. Sinha, Structural Complexity and its Implications for Design of Cyber Physical Systems, Ph.D. thesis, Massachusetts Institute of Technology, Engineering Systems Division, January 3, 2014. [19] S. Chernov, S. Titov, L. Chernova, V. Goginskii, Lb. Chernova, K. Koles, Algorithm for the simplification of solution to discrete optimization problems, Eastern-European Journal of Enterprise Technologies 3(4) (2018) 1–12. [20] O. Drozd, M. Kuznietsov, O. Martynyuk, M. Drozd, A method of the hidden faults elimination in FPGA projects for the critical applications, in: 9th IEEE International Conference DESSERT, Kyiv, Ukraine, 2018, pp. 231–234. doi: 10.1109/DESSERT.2018.8409131 [21] O. Drozd, V. Romankevich, M. Kuznietsov, Using natural version redundancy of FPGA projects in area of critical applications, in: 11th IEEE International Conference DESSERT, Kyiv, Ukraine, 2020, pp. 58–63. doi: 10.1109/DESSERT50317.2020.9125050 [22] O. Drozd, I. Perebeinos, O. Martynyuk, K. Zashcholkin, O. Ivanova, M. Drozd, Hidden fault analysis of FPGA projects for critical applications, in: IEEE International Conference TCSET, Lviv–Slavsko, Ukraine, 2020, pp. 467-471. doi: 10.1109/TCSET49122.2020.235591 [23] V. Kudryavtsev, S. Grunskii, V. Kozlovskii, Analysis and synthesis of abstract automata, Journal of Mathematical Sciences 169(4) (2010) 481-532. [24] R. Praveen, S. Km Baby, Automated Software Testing Using Metaheuristic Technique Based on An Praveen Ranjan Ant Colony Optimization Electronic System Design (ISED), International Symposium, 20-22 Dec. 2010, Bhubaneswar, 2010, pp. 235–240. [25] D. Zaitsev, Toward the Minimal Universal Petri Net, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(1) (2013) 47-58. [26] V. Opanasenko, S. Kryvyi, Synthesis of multilevel structures with multiple outputs, in: CEUR Workshop Proc. of the 10th International Conference of Programming, UkrPROG 2016, Kyiv, Ukraine, 24 May 2016, Volume 1631, 2016, pp. 32–37. [27] O. Martynyuk, O. Drozd, H. Stepova, D. Martynyuk, L. Sugak, Multidimensional Hierarchical Model of Behavioral Check of Distributed Information Systems, in: Proc. of 2019 IEEE East- West Design & Test Symposium (EWDTS), Batumi, 2019, pp. 517-522. [28] O. Martynyuk, A. Sugak, D. Martynyuk, O. Drozd, Evolutionary Network Model of Testing of the Distributed Information Systems, in: Proc. 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Bucharest, Romania, 2017, pp. 888–893. [29] O. Martynyuk, O. Drozd, T. Ahmesh, B. V. Thuong, A. Sachenko, H. Mykhailova, M. Dombrovskyi, Hierachical Model of Behavior On-line Testing for Distributed Information Systems, in: 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Vol. 2, Metz, France, 2019, pp. 724-729. [30] C. Pacheco, K. Shuvendu M. Lahiri, D. Ernst, T. Ball, Feedback-directed random test generation, in: Proc. of the 29th International Conference on Software Engineering, 2007, pp. 75–84. [31] I. Ciupa, A. Pretschner, M. Oriol, A. Leitner, B. Meyer, On the number and nature of faults found by random testing, Software Testing, Verification and Reliability 21 (2009) 3–28. [32] Y. Wang, T. Nicol, Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL, in: European Symposium on Research in Computer Security, 2014, pp. 454–471. [33] A. Takanen, J. D. Demott, C. Miller, Fuzzing for Software Security Testing and Quality Assurance (Second Edition), Artech House, 2018. [34] J. Offutt, W. Xu, Generating Test Cases for Web Services Using Data Perturbation, ACM SIGSOFT Software Engineering Notes 29(5) (2004) 1-10. [35] Y. Kondratenko, N. Kondratenko, Soft Computing Analytic Models for Increasing Efficiency of Fuzzy Information Processing in Decision Support Systems, in: R. Hudson (Ed.) Decision Making: Processes, Behavioral Influences and Role in Business Management, Nova Science Publishers, New York, 2015, pp.41-78. [36] V.-T. Pham, M. Böhme, A. Roychoudhury, Model-based whitebox fuzzing for program binaries, in: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering - ASE 2016, 2016, pp. 543–553. [37] J. Hernández-Orallo, F. Martínez-Plumed, U. Schmid, M. Siebers, D. L. Dowe, Computer models solving intelligence test problems programs and implications, Artifficial Intelligence 230 (2016) 74-107. [38] Y. Skobtsov, V. Skobtsov, Evolutionary test generation methods for digital devices, Design of Digital Systems and Devices, in: M.Adamski et al. (Eds.), volume 79 of Lecture Notes in Electrical Engineering, Berlin: SpringerVerlag, 2011, pp. 331–361. [39] A. Classen, C. Cordy, P. Y. Schobbens, P. Heymans, A. Legay, J.-F. Raskin, Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking, IEEE Transactions on Software Engineering 39(8) (2012) 1069–1089. [40] D. Brucker, D. Achim, W. Burkhart, On Theorem Prover-based Testing, Formal Aspects of Computing 25 (5) (2012) 683–721. [41] L. Gomes J. M. Fernandes, Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation, International Science Reference, 2010. [42] A. Sugak, O. Martynyuk, O. Drozd, The hybrid agent model of behavioral testing, International Journal of Computing 14 (4) (2015) 234-246.