×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • The main directions of development of architecture of the North Caucasus are a symbiosis of modern technologies and national traditions

    The article examines the unique symbiosis of modern technologies and national traditions, analyzes the stages of formation and development of the main directions of architecture development in the North Caucasus in the context of modern trends. The subject of the study is the architecture of the North Caucasus, taking into account modern design trends. The object of the study is buildings and structures, urban conglomerates of the North Caucasus region. The most striking example of this symbiosis is the new projects in the Caucasus, where architecture literally combines with the landscape, showing the unique interaction between man and nature. Thanks to modern construction methods, these buildings combine traditional architecture and modern construction technologies, creating a harmonious space. The architecture of the future, despite its subjectivity, has readability because culture and technological progress always affect architecture. In general, we can identify a number of features characteristic of the architecture of the future: cost-effectiveness, ergonomics, environmental friendliness and versatility. It is also necessary to mention new modern construction technologies, which include elements such as artificial intelligence, automation and robotization of processes, the use of 3D printing and digital modeling of building information (BIM).The symbiosis of modern construction and Caucasian culture is a unique combination of architecture of the past and the present. The synergy between modern construction technologies and traditional Caucasian culture can be very promising. It has the potential to simultaneously revive local cultural identity, contribute to sustainable practices, and create unique architectural designs that harmonize innovation and tradition. Historical forms and materials are actively combined with modern technology and materials, resulting in an architecture that simultaneously preserves its roots and looks to the future. This close interaction and symbiosis highlights the importance of culture in architecture and shows how innovations can be used to preserve and update cultural heritage.

    Keywords: construction, architectural design, modern trends, energy efficiency, thermal protection of buildings, construction industry, ecology, green construction, architectural bionics, North Caucasus

  • Automatic text summarization: overview of algorithms and approaches to quality assessment

    The paper presents an overview of the task of automatic text summarization. The formulation of the problem of automatic text summarization is carried out. The classification of algorithms for automatic text summarization by the type of the resulting summary and by the approach to solving the problem is carried out. Some existing problems in the field of automatic text summarization and disadvantages of certain classes of algorithms are described. The concepts of quality and information completeness of the summary are defined. The most popular approaches to the assessment of the information completeness of the summary and their classification in accordance with the methodology used are considered. The metrics of the ROUGE family are considered in relation to the task of automatic text summarization. Special attention is paid to the evaluation of the information completeness of the summary using such metrics of information proximity as the Kulback-Leibler divergence, the Jensen-Shannon divergence and the cosine distance (similarity). The metrics mentioned above can be applied to the text vector representations of the initial text and summary. The text vector representation in question can be performed using such methods like frequency vectorization, TF-IDF, static vectorizers and so on.

    Keywords: automatic summarization, summary, information completeness, ROUGE, vectorization, TF-IDF, static vectorizer, Kullback-Leibler divergence, Jensen-Shannon divergence, cosine distance

  • On the development of collimator systems with integrated AI and VR/AR elements

    The issue of using the screen of an aircraft's collimator system as a means of providing a help to the pilot about the vertical profile of the flight path in poor visibility conditions at low and extremely low piloting altitudes is being considered.

    Keywords: low flight altitude, extremely low flight altitude, threat of collision, collimator, virtual elevation map, virtual reality, augmented reality, artificial intelligence, data fusion, pilot assistance system

  • Overview of the capabilities and technologies of implementing anti-plagiarism systems

    This article analyzes and reviews modern methods and technologies used in anti-plagiarism systems, with an emphasis on the Russian market. The purpose of considering all of the above is to choose a suitable anti-plagiarism system for integration. The article presents the most popular Russian services for detecting borrowings, their business models, algorithms of operation, as well as a general description of the principles and mechanisms underlying these algorithms. It was determined that the most universal and effective system for finding loans is the service Antiplagiat.ru , since it has the possibility of integration via the API, as well as 34 additional modules that provide the opportunity to adapt the functionality of the system to individual needs.

    Keywords: antiplagiarism, text analysis, text processing algorithms, semantic analysis, stylistic analysis

  • Designing an application to collect data from third-party Internet sources

    This article discusses the basic principles and design patterns of an application for collecting data from third-party sources. Research has been carried out on various methods of obtaining data, including web scraping, using APIs and file parsing. It also describes various approaches to extracting information from structured and unstructured sources.

    Keywords: internet sources, API, parsing, web, headless browser, scraping, etag, data collection

  • Technical science. Informatics, computer facilities and management

  • About the use of error-correcting code decoders in channels with erasures

    Unintentional errors occur in all data transmission channels. The standard way to deal with them is to use noise-resistant codecs based on the use of algebraic error correction codes. There are transmission channels in which a special type of error occurs – erasures, i.e. a type of error in which the location of the error is known, but its value is not known. Coding theory claims that error-control methods can be applied to protect data from erasure, however, these statements are not accompanied by details. This work fills this gap. Algorithms for correcting erasures using arbitrary decoders for error correcting codes are constructed. Lemmas about the correctness of the constructed algorithms are formulated, some estimates of the probability of successful decoding are obtained.

    Keywords: channels with erasures, noise-resistant code, algebraic code, error correction code decoder, erasure correction algorithm

  • Mechanisms for adapting the development of development strategies for a modern mining enterprise

    The factors of sustainable development of a modern mining enterprise are considered. The main operating factors of the external and internal environment of the enterprise are determined. The basic conceptual provisions underlying the formation of an effective, modern, strategic platform for the formation of strategies for the development of a mining enterprise are considered. The possibilities of applying a particular strategy for the development of a mining enterprise are analyzed, depending on the combination of phases of rise or decline in the level of impact of factors of the external and internal environment of the enterprise. The algorithm developed by the authors of this work for choosing the optimal model of enterprise development is proposed, taking into account the phases of the impact of external and internal environmental factors and the development strategy of a modern mining enterprise chosen in accordance with them. Recommendations on choosing the optimal strategy for the development of a mining enterprise and building a development model based on it are proposed.

    Keywords: mining enterprise, economics, risk management, innovative development, development strategy, ecology, social policy

  • Vulnerabilities and methods of protection of the ROS operating system when implementing a multi-agent system based on the Turtlebot3 robot

    The problem of vulnerabilities in the Robot Operating System (ROS) operating system when implementing a multi-agent system based on the Turtlebot3 robot is considered. ROS provides powerful tools for communication and data exchange between various components of the system. However, when exchanging data between Turtlebot3 robots, vulnerabilities may arise that can be used by attackers for unauthorized access or attacks on the system. One of the possible vulnerabilities is the interception and substitution of data between robots. An attacker can intercept the data, change it and resend it, which can lead to unpredictable consequences. Another possible vulnerability is unauthorized access to the commands and control of Turtlebot3 robots, which can lead to loss of control over the system. To solve these vulnerabilities, methods of protection against possible security threats arising during the operation of these systems have been developed and presented.

    Keywords: Robotic operating system (ROS), multi-agent system, system packages, encryption, SSL, TLS, authentication and authorization system, communication channel, access restriction, threat analysis, Turtlebot3

  • Methods and means of forming and evaluating the competencies of specialists in the field of information security based on a multifunctional software and hardware complex

    The article discusses various aspects of the organization of training of specialists in the field of information security on the basis of a cyberpolygon – a multifunctional software and hardware complex. The analysis of the essence of cyberpolygon as a computer learning technology within the framework of the digitalization of education and the formation of students' competencies, for example, digital culture and cyber hygiene, is given. Based on the analysis of the capabilities of the cyberpolygon for the training and retraining of specialists of various profiles, the requirements for the specifics of methods and means of training and assessment of their competencies are formulated. The problems of conceptual design of the educational content of the cyberpolygon, the need for a formalized description of the essence of competencies and their components, fixing cause-and-effect relationships for the scenario design of educational trajectories are discussed. Special attention is paid to the specifics of pedagogical design, the use of active and group approaches to learning, the need for role allocation in solving team tasks. New formal approaches to the conceptual design of the entities of competencies are proposed, taking into account this specificity, methods of automated distribution of participants by roles of educational projects and educational tasks, new conceptual models for assessing competencies based on covering them with suitable competence-oriented tasks. The proposed conceptual models formed the basis of the software architecture of the cyberpolygon information components for the management of educational trajectories and are presented at the level of design artifacts of the logical level of the cyberpolygon management system.

    Keywords: cyberpolygon, information security, cyber hygiene, digitalization of education, digital culture, conceptual design, methods of automated distribution, competency assessment models, design artifacts

  • An algorithm for tracking human movements in a video stream based on the color group matching method

    Among the vast range of tasks that modern advanced video surveillance systems face, the dominant position is occupied by the task of tracing various objects in the video stream, which is one of the fundamental problems in the field of video analytics. Numerous studies have shown that, despite the dynamism of processes in the field of information technology and the introduction of various tools and methods, the task of object maintenance still remains relevant and requires further improvement of previously developed algorithms in order to eliminate some inherent disadvantages of these algorithms, systematization of techniques and methods and the development of new systems and approaches. The presented article describes the process of step-by-step development of an algorithm for tracking human movements in a video stream based on the analysis of color groups. The key stages of this algorithm are: the selection of certain frames when dividing the video stream, the selection of the object under study, which is further subjected to a digital processing procedure, the basis of which is to obtain information about color groups, their average values and percentages of their occupancy relative to the object under study. This information is used for the procedure of searching, detecting and recognizing the selected object with an additional function of predicting the direction of movement on video frames, the result of which is the formation of the entire picture of the movement of the person under study. The materials presented in this paper may be of interest to specialists whose research focuses on issues related to the automated acquisition of certain data in the analysis of various images and videos.

    Keywords: surveillance cameras, u2– net neural network, rembg library, pattern recognition, clothing recognition, delta E, tracing, direction prediction, object detection, tracking, mathematical statistics, predicted area, RGB pixels

  • Analysis of images of mathematical and chemical formulas from patent documents

    Currently, patent documents contain graphic images of device drawings, graphs, chemical and mathematical formulas, and formulas often need to be recognized and brought to a unified standard. In this work, the analysis of graphic images extracted from the descriptions of patents of the FIPS of Rospatent is carried out. Thematic filtering of mathematical and chemical formulas contained in patent documents and their recognition is provided. The theoretical value lies in the developed algorithms for parsing patents in the Yandex system.Patents; recognition of chemical and mathematical formulas among graphic patent images; translation of graphic images of chemical formulas into SMILES format; conversion of graphic images of mathematical formulas into LaTeX format. The practical significance of the work lies in the developed software module for analyzing graphic images from patent documents. The field of application of the developed system is the study of patents and the reduction of graphic images to a unified standard for solving patent search problems.

    Keywords: patent, image, mathematical formula, chemical formula, LaTeX, SMILES

  • Automatic recognition of license plates in a VANET

    The paper analyzes various approaches to identifying and recognizing license plates in intelligent transport networks. A deep learning model has been proposed for localizing and recognizing license plates in natural images, which can achieve satisfactory results in terms of recognition accuracy and speed compared to traditional ones. Evaluations of the effectiveness of the deep learning model are provided.

    Keywords: VANET, intelligent transport networks, YOLO, city traffic management system, steganography, deep learning, deep learning, information security, convolutional neural network, CNN

  • Determining the degree of masking of a ball mill based on measuring the vibration acceleration of the drum surface

    The article presents aspects of the development of a device for wirelessly picking up a vibration acceleration signal from the surface of a ball mill drum. The results of measuring vibration acceleration for a ball mill model for various levels of loading with crushed material are presented. According to these results, with an increase in the load of crushed materials relative to the ball, the level of vibration decreases. The work also presents the obtained pie diagrams of the distribution of vibration load across the mill drum, from which one can judge its current operating mode.

    Keywords: ball mill, wireless signal, vibration acceleration, mill loading control

  • Modeling of automated monitoring systems

    The article presents a set-theoretic model that generalizes the concept of a monitoring system. The model is a tuple that includes a monitoring object, the infrastructure of the monitoring system, initial data and monitoring results, and a set of relationships between the components of the model. Each component of the model is detailed at 1-2 levels of detail. For some elements of the model, examples from existing monitoring systems are given. The model can be used to create new or modify existing monitoring systems.

    Keywords: monitoring system, monitoring object, set-theoretic model, tuple, data processing, infrastructure, sensor, software

  • Using the Monty Hall paradox in project management tasks. Part II. Use in combination with Blotto game models. A task with random intelligence

    In this paper, we investigate the possibility of applying the theory of Monty Hall's paradox in tasks that require the need for an optimal choice of a strategy for developing the innovative potential of an enterprise. The article provides recommendations for taking into account and constructive use of the effects that affect the involved experts, in particular, the Condorcet principle and paradox. The paper explores the limits of applicability of the Monty Hall paradox theory. Its applicability is determined, together with considerations about the profitability of changing the initial choice in problems with the so-called "random intelligence".

    Keywords: decision support systems, mathematical modeling, expert evaluation, Monty Hall's paradox, project management, collective assessment, Condorcet's paradox, enterprise management, assessment of enterprise characteristics

  • Studying the Effectiveness of Tree-Shaking in Modern Web Application Build Tools

    This paper analyzes the effectiveness of the Tree-Shaking mechanism, which is a key way to optimize the size of client web applications. Its implementation is compared in five popular tools for building projects: Webpack, Rollup, Parcel, Vite and Esbuild. Test results demonstrate differences in their behavior and overall effectiveness in removing redundant code, highlighting the relevance of Tree-Shaking in web development.

    Keywords: tree-shaking, javascript, front end, web applications, optimization, loading speed

  • Simulation modeling of the relay transmission system of a multi-motor electric drive of a conveyor train

    The modeling of a multi-motor linear electric drive of a conveyor train is considered. A diagram of the simulation model made in the Simulink program is given. Graphs of the speed and force of the electric drive during the relay transmission of the secondary element are given. The conclusion is formulated that the system fulfills the requirements placed on it.

    Keywords: simulation modeling, Simulink, linear asynchronous motor, electric drive, conveyor train, relay transmission

  • Securing of images in the city traffic management system from unauthorized use

    The paper discusses a stegoalgorithm with localization of the embedding area in the YCbCr color space to protect images of a license plate, a vehicle from different angles, a traffic event, as well as issues of developing a software system that implements the stegoalgorithm. Image protection allows you to effectively implement the concept of multimodal interaction of socio-cyberphysical systems in an automotive self-organizing network. Evaluations of the effectiveness of the developed method are provided.

    Keywords: VANET, intelligent transport networks, city traffic management system, steganography, information security, watermark

  • Logic resynthesis to improve the fault tolerance of combinational circuits for single failures

    The paper discusses methods for protecting logical elements of combinational circuits from single failures. Until recently, the problem of creating microelectronic devices resistant to single failures in logic elements was relevant primarily in the military and space industries. In these areas, increased requirements are placed on the fault tolerance of circuits due to the influence of external destabilizing factors. Such factors can be heavy charged particles that affect the operation of logic elements and cause their single failures. Due to the scaling of semiconductor devices, technological standards for the design and manufacture of integrated circuits are changing, and the problem of fault tolerance becomes relevant for devices on the civilian market. The article proposes a technique for resynthesising vulnerable sections of logical combinational circuits. To assess stability, it is proposed to use logical constraints obtained by the resolution method.

    Keywords: resynthesis, combinational circuits, reliability, logical correlations, resolution method

  • Development of an algorithm for recognizing human emotions using a convolutional neural network using Python tools

    This article deals with the problem of analyzing and recognizing human emotions using sound data processing. In view of the increase in the scope of application, which is largely caused by the difficult epidemiological situation in the world, the solution of the described problem is an urgent issue. The main stages are described: the audio data stream is recorded and, in accordance with the “sound fingerprinting” approach, is converted into an image that is a spectrogram of the sound data set. The stages of training a convolutional neural network on a pre-prepared set of sound data are described, and the structure of the algorithm is also described. To validate the neural network, a different set of audio data was selected, not participating in the training. As a result, graphs were constructed demonstrating the accuracy of the proposed method.

    Keywords: neural network; human emotion recognition; convolutional neural network; sound fingerprinting; Tenserflow; Keras; Matlab; Deep Network Toolbox

  • Development of a system for remote monitoring and control of spatially distributed objects using LoRa network technology

    Relevance and goals. The article describes a project in the field of solving the problem of managing organizational systems through the development of a system for remote monitoring and control of spatially distributed objects using LoRa network technology. Materials and methods. The project provides testing and practical use of LoRa networks. The developed system consists of 3 main modules: Devices, server part, and client application. In turn, devices are divided into gateways and end devices. Results. An automated system for managing spatial objects was designed, gateway devices and end devices that form a prototype of the Internet of Things network were developed and tested, as well as the server part of an automated system for remote control of spatially distributed devices. Conclusions. The system was tested and debugged, and a streamlined system for remote monitoring and control of spatially distributed objects was obtained based on the concept of the Internet of Things using LoRa network technology. It is assumed that the results of R&D will be in demand in organizations whose activities involve the use of spatially distributed resources.

    Keywords: Internet of things, management of geographically distributed systems, LoRa networks, geosystem approach, spatial data infrastructures

  • Technical science. Building and architecture

  • Classification of university campuses by organizational and territorial basis

    The article examines the situation that emerged as a result of the higher education reform of 2006-2012. in Russia there is a modern organizational and territorial structure of university campuses, which has different types of spatial and territorial location: urban local campus, urban dispersed campus, suburban local campus, mixed. Thus, almost all federal universities are located on several campuses within the territory of the city where they are located, and several of them have campuses in several cities. Some existing classifications of university campuses according to various criteria are considered and their insufficiency for a complete scientific description of modern campuses is revealed. The existing classification by spatial location relative to the city territory is supplemented by such types as regionally dispersed campus and locally dispersed campus. The supplemented classification reflects the current situation in the Russian Federation and allows for a scientific description of modern university campuses in Russia, taking into account their organizational and territorial specifics.

    Keywords: classification, university campus, organizational structure, territorial structure, locally dispersed campus, regionally dispersed campus