×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • Analyzing loading sequence problems of client web applications

    This paper examines the problems of optimizing the loading of client web applications and ways to solve them, taking into account various practical conditions. It provides ways to speed up the loading of web applications and remove blocking elements in the data processing chains in order to improve various aspects of the user experience. An approach is proposed that allows you to design an optimal application loading chain that meets the highest quality standards in the front end industry and provides the best user experience.

    Keywords: front end, rendering, client web applications, load time, performance optimization, user experience

  • Overview of common nodal joints for 3D modular building blocks and individual structural elements

    The overview of the existing horizontal and vertical nodal joints for 3D modular building blocks and plane elements has shown that tongue and groove is the most commonly used connection today. Other types of module attachments are also discussed. Special attention is paid to a modular integrating system encompassing a design description. It is emphasized that the efficiency of modular construction depends, among others, on nodal joints used therein.

    Keywords: modular construction systems, operational reliability, horizontal and vertical attachments, coupling bolts, tongue and groove connection

  • Strategic management of the placement of construction industry facilities in conditions of import substitution

    The construction industry plays an important role in the national economy, and the products of construction industry enterprises are essential for economic growth and development of the state. At the same time, the current state of affairs in the construction industry is characterized by the presence of economic uncertainties and other restrictions. One of the main directions of development of the construction sector, as well as other sectors of the national economy of the country, is expanded reproduction in the conditions of import substitution, which determines the search for the most promising territories for the location of new construction industry facilities.

    Keywords: construction, construction industry, construction complex, strategic management, import substitution

  • The current state of housing construction in the Khabarovsk Territory: problems and development prospects

    The article considers the current state of the residential construction market in the Khabarovsk Territory. The article analyses the volume of housing construction and housing commissioning, provides information on the main developers, and gives a short description of the main state-backed mortgage programmes facilitating the purchase of housing in the Khabarovsk Territory.

    Keywords: Khabarovsk Territory, housing construction, problems, prospects, state mortgage lending programme

  • Differences and prospects for the development of cloud, fog and edge computing technologies

    The article thoroughly explores cloud, fog, and edge computing, highlighting the distinctive features of each technology. Cloud computing provides flexibility and reliability with remote access capabilities, but encounters delays and high costs. Fog computing focuses on data processing at a low level of infrastructure, ensuring high speed and minimal delays. Edge computing shifts computations to the data source itself, eliminating delays and enhancing security. Applications of these technologies in various fields are analyzed, and their future development is predicted in the rapidly evolving world of information systems.

    Keywords: cloud computing, fog computing, edge computing, cloud technologies, data processing infrastructure, scope of application, hybrid computing, Internet of Things, artificial intelligence, information systems development

  • Technical science. Informatics, computer facilities and management

  • Localization of round objects in images using fast radial symmetry transform

    Currently, there is an increase in the number of scientific papers on models, methods and software and hardware for image processing and analysis. This is due to the widespread introduction of computer vision technologies into information processing and control systems. At the same time, approaches that provide fast image processing in real time using limited computing resources are relevant. Such approaches are usually based on low-level image filtering algorithms. One of the tasks to be solved in computer vision-based systems is the localization of round objects. These objects have the property of radial symmetry. Therefore, the approach based on the Fast Radial Symmetry Transform, which is considered in this paper, is effective for solving this problem. The paper describes the basic steps of the basic transformation, provides a procedure for determining the centers of radially symmetric areas for localization of round objects in images, and discusses examples of its application.

    Keywords: computer vision, image processing, image analysis, localization of objects, methods of localization of round objects, fast radial symmetry transf, detecion of the centers of radially symmetric areas

  • Determination of the granulometric composition of the result of drilling and blasting operations in a quarry using neural networks

    The drilling and blasting method is currently the most widely used for mining rocks. An indicator of the high–quality drilling and blasting operations is the uniform granulometric composition of the exploded rock mass - the percentage of oversized ore pieces should be minimal. The percentage of oversized and its increase have a significant impact on the technical processes of transporting rock mass, leading to an increase in the costs of loading and transportation operations and secondary crushing of oversized ore masses. The paper describes the results of a study of methods for determining the granulometric composition of drilling and blasting operations using neural networks of segmentation Unet and FPN. Images taken from UAVs are used for analysis. A method of classifying ore by size has also been developed, which ensures the accuracy of the proportion of correct answers of more than 0.91. The expected result of the introduction of the system for automatic determination of the granulometric composition of drilling and blasting operations is the possibility of more accurate control over the quality of their performance.

    Keywords: granulometric composition, Unet, FPN, classification, segmentation

  • Methodological foundations of working with the Modbus TCP protocol with an example in the high-level Python programming language

    This article explores a method for executing data collection systems based on the widely-used industrial protocol, Modbus TCP. In this configuration, the server is a program emulating the Modbus TCP protocol.To implement the client an algorithm and furnished a practical Python programming illustration that employs a lower-level socket library.

    Keywords: python, socket, modbus

  • Decision-making in the territorial bodies of the Ministry of Internal Affairs of Russia in conditions of risk and uncertainty

    The article considers key aspects related to the process of managerial decision-making and the formation of managerial influence in conditions of uncertainty associated with risk, in such a complex and numerous social organizational system as internal affairs bodies, when the subject of management does not have reliable or does not fully possess sufficient information about the current state of the operational situation. In the organization of information and analytical activities of internal affairs bodies are highlighted in order to determine priority areas of law enforcement activity in accordance with their main functions, forecasting possible adverse trends and processes in society, substantiating ways and means of resolving identified problematic situations in law enforcement and developing appropriate preventive measures in various information situations according to probabilistic realizations of various outcomes. The application of the main types of selection criteria and formalized models for determining the relationship between planned organizational measures and the results of their implementation in the presence of uncertain factors affecting effective decision-making in situations of rapid changes in the elements of the operational situation and the irrational use of resources available in the internal affairs bodies is considered and illustrated. Using concrete examples, the mechanism of finding the optimal management solution in the field of law enforcement and public safety is demonstrated, the existing problems of choosing a solution in conditions of risk and uncertainty are identified and ways to resolve them are proposed, an analysis is made regarding the results of the study.

    Keywords: "managerial decisions, managerial activity, decision-making in conditions of risk and uncertainty, situational management, internal affairs bodies, law enforcement, information, information and telecommunication technologies, decision-making criteria

  • Design of the SPI slave based on gate arrays

    Results of the Serial Peripheral Interface (SPI) Slave node design based on gate arrays 5503 series are presented in this paper. SPI is used for high-speed synchronous data transmission between control and peripheral devices. Developed chip could be applied in connection with SPI Master node for matching microcontrollers and microprocessors with different sensors, analog-to-digital and digital-to-analog converters, memory and communication units. Upon the results of the development, design approach of digital integrated circuits is proposed. The approach supposes using Russian freeware CAD "Kovcheg" ("Ark") designated for gate arrays design (IC based on prefabricated crystals, components on which are supposed to be interconnected during design to form logic devices). According to the proposed approach, behavioural descriptions of the devices, written on hardware description languages (e.g. Verilog), are used, since it is often easier to describe circuit operational principal algorithmically than construct structure from components library. The problem is that "Kovcheg" can't execute structural synthesis of the circuit from behavioural description. So it is proposed in the approach to use outside CAD environments, intended even for design of custom full-integrated circuits (like Cadence) or FPGA (like Vivado), to synthesize structural description of desired device from known behavioural ones and available process design kits (PDK) or library, appropriate for the chosen CAD. The entire design cycle using "Kovcheg" is outlined in the paper.

    Keywords: gate arrays, serial peripheral interface, hardware description language, computer-aided design

  • Exploring the React framework for implementation of the View part of client web applications

    This paper examines the need to use frameworks as such, as well as React, the most commonly used framework for creating the View portion of client-side web applications. Its design, the proposed approach to developing client applications, the problems it solves and creates, its strengths and weaknesses, as well as its features and limitations in application are studied.

    Keywords: view frameworks, client web applications, front end, React, Reconciliation, Fiber, rendering

  • Modification of the algorithm for correcting errors that occur during the operation of the satellite authentication system

    The prospects for building a satellite Internet based on a low-orbit constellation of satellites (LOСS) are due to the fact that only it allows for stable and reliable communications anywhere on the planet. Therefore, the technology of satellite industrial Internet of things IIoT has become widespread in the oil and gas industry, many of whose facilities are located in the Far North. However, when using satellite low-orbit Internet (SLOEI), new threats and attacks arise against it. Among attacks on LOCS, a special place is occupied by attempts to impose unauthorized content on SLOEI subscribers. This situation can be prevented using a satellite identification system. For the effective operation of the “friend or foe” challenge-response system for LOCS, a copy-resistant authentication protocol with zero knowledge disclosure was developed. This property was achieved by reducing authentication time through the use of modular deduction class codes (MDCC). The use of parallel VDCC codes has led to a change in the method of satellite identification, which entails a revision of the principles for constructing a request-response system. Therefore, the development of a block diagram of a satellite identification system operating in the MDCC for a low-orbit satellite Internet system is relevant.

    Keywords: imitation resistance, zero-knowledge authentication protocol, modular codes of residue classes, block diagram of the low-orbit satellite identification system

  • Low-Latency Wavelet Image Processing Using the Winograd Method with Convolution Step

    Wavelets are widely used in various fields of science and technology for processing 1D signals and multidimensional images. However, technical information processing devices are developing more slowly than the amount of digital data is growing. Computational latency is the most important characteristic of such devices. This paper proposes an implementation of the Winograd method with a convolution step 2 to reduce the latency of wavelet image processing. The proposed scheme for implementing calculations has reduced the asymptotic computational complexity of wavelet processing of 2D images to 53% compared to the direct implemettaion method. A theoretical assessment of the computing device characteristics showed a reduction in latency of up to 67%. A promising direction for further research is the hardware implementation of the proposed approach on modern microelectronic devices.

    Keywords: image processing, Winograd method, digital filtering, computational delay, wavelet transform, convolution with step

  • Hierarchical Dynamic Information Security Management System for an Enterprise Information System

    The problem of developing the architecture of a dynamic information security management system for an enterprise information system, based on the hierarchical organization of the management system, analysis of the state of the computer system in the information space, analysis of the spread of risk flow, as well as multi-agent organization of the processes of collecting, analyzing data and making decisions is considered.

    Keywords: information protection, enterprise information system, security policy, information security management, risk analysis, zero trust architecture, multi-agent technologies, neural network forecasting

  • On the role of information impacts in the context of national security

    The article discusses issues related to the level of existing technological development and the role of information impacts in the modern world. The necessity of an interdisciplinary approach in training an information security specialist is substantiated. A number of examples are considered on the historical material, indicating the causal relationship between actions in the information space and the events of the material nature, the scale of the consequences has been noted. The process of forming a value system and the potential possibility of changing it are considered. The influence of the level of development of information delivery means on the effectiveness of information impact is noted. An example of using media content to transmit non-verbal signals is given. Using the example of cinematographic products, the principles of deformation of the system of traditional values through the introduction of a new term and a change in attitude towards it are considered. The need for additional measures to counter information threats is substantiated. Ways to reduce the risk of negative consequences from harmful information influences are proposed.

    Keywords: information space, information security, information threat, information delivery tools, information impact, counteraction of the threat

  • Feasibility study for the selection of optimal attack (intrusion) detection tools for the needs of monitoring centers of the Russian Federation

    The subject of the study is the technical and economic characteristics of attack detection tools that affect the effectiveness of their use for the system for detecting, preventing and eliminating the consequences of computer attacks on critical information infrastructure facilities of the Russian Federation. An analysis of approaches to selecting the best solutions is presented, the result of which formed the basis of the proposed solution. The article contains a study of approaches to solving the problem of feasibility study of choice, formalizing the formulation of the problem and a mathematical model for solving the problem of choosing the optimal attack detection tool for implementing the corresponding tasks. The research methods used include systems analysis, modeling and peer review methods. The purpose of developing the methodology is to increase the level of validity of decision-making on choosing the best of the proposed attack detection tools. The research results presented in the article can be used to carry out a feasibility study of decisions made when choosing attack detection tools for the needs of monitoring centers of the Russian Federation. The proposed methodology for conducting competitive analysis can be used as the basis for conducting appropriate research for each means of the system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation.

    Keywords: attack detection tools, intrusion detection tools, feasibility study, competitive analysis, information security tools, decision support system, information security system, optimization, integer linear programming

  • Comparative analysis of additive technologies used to form electromechanical structures of functional devices

    The paper provides a comparative analysis of additive technologies in the field of formation of electromechanical designs of functional devices. In particular, the problem of using additive technologies, their relevance in relation to modern needs in different fields of science and technology is put, the essence of additive technological processes for the production of various kinds of products is revealed and a specific design and technological approach for creating a modular product on the basis of these technologies is defined.

    Keywords: additive technologies, printed circuit board, 3D printing, fused deposition modeling , selective laser sintering, stereolithography, digital light processing, direct metal laser sintering, selective laser melting, direct ink writing

  • Algorithmization of the solution of the task of compiling a comprehensive service taking into account the emotional preferences of customers based on the modification of the method of branches and boundaries

    The article considers the issue of taking into account the emotional preferences of customers in the process of compiling a comprehensive service to increase customer satisfaction. The problem of forming an optimal set of services is solved, taking into account the emotional preferences of the client and the economic constraints in the form of the client's budget. Modifications to the method of branches and boundaries are proposed, reducing the number of calculations. An algorithm for solving the problem is developed and the results of a numerical experiment are presented, showing that the developed algorithm has basically a linear increase in execution time depending on the number of services. The advantage of this method is a significant reduction in operating time, as opposed to a complete search, as well as ease of implementation.

    Keywords: formation of an optimal set of services, consideration of emotional preferences, the method of branches and boundaries

  • Digital Transformation of Education: Cognitive Models of Collective Cognition and Communication

    The article shows the relevance of solving the problem of conceptual analysis of traditional and digital educational structures integrated in the process of transformation, identification and evaluation of their effective interaction. It is proposed to use the methodology of the cognitive analysis that has already passed the stages of approbation in the subject environment of education. It is noted that the educational process includes continuously generated and continuously modified cycles of cognition of reality. Within the framework of generalized descriptions presented by models of cognition, a transition is naturally made from individualized cycles of cognition to a collective study of reality, in which models already control collective cognition, forming a cycle of cognition based on collective communication. An initial cognitive model has been developed which illustrates the situation that has developed in the modern educational system under the powerful influence of the "technocratic" point of view on digitalization. A cognitive model of collective cognition and communication in the digital environment is proposed, which systematically integrates three important parts from the point of view of transformational processes in education, namely, the traditional structure of cognition of reality, the newest structure of digital communication built in the paradigm of the collective subject of cognition, and, finally, the structure of strategic management based on the socio-cultural development of society and the country.

    Keywords: Cognitive model, education, digital transformation, cognition, communication

  • Development of a system for detecting areas with defects in the development of corn crops based on photos from UAVs

    In this work, the developed system for detecting areas with defects in the development of corn crops was investigated from a photograph taken by an unmanned aerial vehicle (UAV) using computer vision. To solve the problem of detecting such sites, the structures of the YOLOv5 and YOLOv8 neural networks were considered. The use of the developed software will reduce labor and time costs for image analysis, which in turn will reduce the response time when problem areas are detected in agricultural fields to achieve higher yields.

    Keywords: instance segmentation, YOLOv5, YOLOv8

  • Determination of the geometry of the room by the impulse response using convolutional neural networks

    Existing methods for determining the geometry of an enclosed space using echolocation assume the presence of a large amount of additional equipment (sound sources and receivers) in the room. This paper investigates a method for determining the geometry of enclosed spaces using sound location. The method does not assume the presence of a priori knowledge about the surrounding space. One sound source and one sound receiver were used to create and capture real impulse characteristics. A microphone was used as a sound receiver and a finger snap was used as a sound source to produce the impulse response. In this work, we used convolutional neural networks that were trained on a large dataset consisting of 48000 impulse responses and a number of room geometry parameters corresponding to them. The trained convolutional neural network was tested on the recorded impulse responses of a real room and showed accuracy ranging from 92.2 to 98.7% in estimating room size from various parameters.

    Keywords: convolutional neural networks, room geometry, echolocation, impulse response, robotics, recognition, contactless methods of measuring objects, sonar, geometry prediction, virtual reality

  • A Study and Comparative Analysis of the Computational Performance of AssemblyScript

    In the world of web development, there is a growing need for tools that can provide high performance for client applications. In response to this challenge, WebAssembly technology has been developed to compile various programming languages into a binary format that can be executed in web browsers. The new AssemblyScript programming language provides the ability to create high-performance WebAssembly modules using the TypeScript language syntax familiar to Web developers. This paper investigates WebAssembly and AssemblyScript, and compares the performance of AssemblyScript and JavaScript using four computational algorithms as examples. The test results demonstrate faster execution speed of AssemblyScript in most tasks, as well as more stable performance when executed in different browsers. The study highlights the relevance of using AssemblyScript to optimize computationally intensive operations in web application development.

    Keywords: assemblyscript, webassembly, wasm, javascript, front end, performance, web applications

  • Using statistical edge-based modeling for motion detection in video

    In this article we present a novel algorithm for detecting moving objects using a stationary camera, which is based on statistical background modeling using edge segments. Traditional algorithms that rely on pixel intensity struggle in dynamic environments due to their inability to handle sudden changes in lighting conditions. These algorithms also tend to produce ghosting artifacts when a sudden change occurs in the scene. To address this issue, edge-based features that are robust to intensity variations and noise have been introduced. However, existing methods that rely on individual edge pixels suffer from scattered edge pixels and cannot effectively utilize shape information. Additionally, traditional segment-based methods struggle with variations in edge shape and may miss moving edges that are close to the background edges. In contrast to conventional approaches, our proposed method constructs the background model using regular training frames that may include moving objects. Furthermore, it avoids the generation of ghosting artifacts. Additionally, our method employs an automatic adaptive threshold for each background edge distribution to facilitate matching. This enhances the robustness of our approach to changes in illumination, camera movement, and background motion. Experimental results demonstrate that our method outperforms other techniques and efficiently detects moving edges despite the aforementioned challenges.

    Keywords: motion detection, edges, canny edge detector, gaussian of color, gaussian of gradient magnitude, normal distribution, adaptive thresholds, statistical map