×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Statical algorithms for identifying unique features from a person's handwritten signature

    One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.

    Keywords: static algorithms, metrics, signature length, scaling, signature angle

  • Dynamic algorithms for identifying unique features from a person's handwritten signature

    Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.

    Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform

  • Development of a mathematical model and a software package for automating scientific research in the field of financial industry news analysis

    The article is devoted to the development of a mathematical model and a software package designed to automate scientific research in the field of financial industry news analysis. The authors propose an approach based on the use of graph theory methods to identify the most significant scientific hypotheses, the methods used, as well as the obtained qualitative and quantitative results of the scientific community in this field. The proposed model and software package make it possible to automate the process of scientific research, which contributes to a more effective analysis of it. The research results can be useful both for professional participants in financial markets and for the academic community, since the identification of the most cited and fundamental works serves as the starting point of any scientific work.

    Keywords: software package, modeling, graph theory, news streams, Russian stock market, stocks, citation graph

  • A website for debugging of robots artificial intelligence technologies

    The article presents the state of technology of websites for designing robots with artificial intelligence. The image of a modern technical site-book as a place for the development of artificial intelligence applications is considered, the possibility of executing algorithms from the page to ensure the connection of robots with real and virtual objects is shown.

    Keywords: mathematical network, technical website-book, artificial intelligence, algorithms executed on the website-book, network development of robots

  • Developing a Piecewise Linear Regression Model for a Steel Company Using Continuous Form of Maximum Consistency Method

    The paper presents a brief overview of publications describing the experience of using mathematical modeling methods to solve various problems. A multivariate piecewise linear regression model of a steel company was built using the continuous form of the maximum consistency method. To assess the adequacy of the model, the following criteria were used: average relative error of approximation, continuous criterion of consistency of behavior, sum of modules of approximation errors. It is concluded that the resulting model has sufficient accuracy and can be used for forecasting.

    Keywords: mathematical modeling, piecewise linear regression, least modulus method, continuous form of maximum consistency method, steel company

  • On image masking as the basis for building a visual cryptography scheme

    The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.

    Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding

  • Modeling the probabilistic characteristics of blocking requests for access to radio resources of a wireless network

    Fifth-generation networks are of great interest for various studies. One of the most important and relevant technologies for efficient use of resources in fifth-generation networks is Network Slicing technology. The main purpose of the work is to simulate the probabilistic characteristics of blocking requests for access to wireless network radio resources. The main task is to analyze one of the options for implementing a two–service model of a wireless network radio access scheme with two slices and BG traffic. In the course of the work, the dependence of the probability of blocking a request depending on the intensity of receipt of applications of various types was considered. It turned out that the probability of blocking a type i application has the form of an exponential function. According to the results of the analysis, request blocking occurs predictably, taking into account the nature of incoming traffic. Previously, there are no significant drawbacks in the considered model. The developed model is of great interest for future, deeper and long-term research, for example, using simulation modeling, with the choice of optimal network parameters.

    Keywords: queuing system, 5G, two - service queuing system, resource allocation, Network Slicing, elastic traffic, minimum guaranteed bitrate

  • Development of a behavior pattern for a game bot with artificial intelligence elements based on Markov chains

    The subject of this article is the development of a behavior pattern with AI elements for an opponent bot in the single-player game Steal Tower. The essence of which is to collect resources to build a tower faster than opponents. To create the illusion that the same people are playing against the player, an imitation stochastic model based on the Monte Carlo method for Markov chains has been developed. Based on the results of its tests, balanced system parameters were determined, which are embedded in the behavioral pattern of the bot, which is implemented using the Enum AIStates enumeration consisting of five states: Idle (inactivity), GoTo (movement) and GoToWarehouse (return to the warehouse), Win (victory), Loose (scoring). Each of them has developed functions for the optimal behavior of the bot given in the article. So for the GoTo state, functions have been created that analyze the benefits of different types of behavior: steal or collect, or walk to the warehouse or to the tower.

    Keywords: game intelligence, behavioral pattern, live world emulation, bot behavior scenario, state structure, Markov chains, Monte Carlo method, simulation model, Unity environment, C# language

  • Impact of energy-efficient building envelopes on the operating costs of a high-rise residential building

    The problem of increasing consumption of heat and energy resources in the high-rise residential sector in the conditions of dense urban development becomes more relevant every year both for its population and for management companies. In order to reduce operating costs, to reduce the dependence of engineering systems of high-rise residential building on urban infrastructure, it is proposed to introduce some energy-efficient organisational and technological solutions in the designed apartment building. In the course of the study, on the example of a high-rise 25-storey residential building in the city of Rostov-on-Don, a comparison of operating costs of thermal energy for heating with the use of energy-saving materials and structures, and costs in typical conditions of construction. The results of this work will allow, from a practical point of view, to analyse the feasibility of using such energy-efficient building envelopes and materials as foil PIR-insulation, low-emission four-chamber glazing, "green" roofing in high-rise housing construction.

    Keywords: energy efficient building envelopes, heat consumption, heating costs, high-rise apartment block, economic analysis, sustainable construction

  • Calculation of spatial filtration of water to a horizontal drain of finite length in a homogeneous stream

    When studying the problems of water filtration to a single horizontal imperfect drain of finite length, in a system of interacting horizontal imperfect drains, it is necessary to consider spatial (three-dimensional) filtration problems. Unlike flat (two-dimensional) problems, spatial filtering has been studied in less detail, since it is difficult to obtain rigorous solutions to their problems.

    Keywords: water supply facilities, filtration, equipotentials, drainage, borehole, pressure reservoir, drain, pressure, inflow, reservoir, watercourse

  • Development of a numerical method for assessing the energy requirements for airborne radars for weather navigation in polar latitudes

    A new numerical method for calculating weather conditions has been developed for airborne radar systems for Arctic purposes. Based on the numerical method obtained in the study, software was developed that takes into account various models of electromagnetic wave propagation in various weather conditions. The results of calculations for estimating the detection range of dangerous weather conditions are presented. This assessment indicates that the threshold for detecting adverse weather conditions can be reduced. The basis for lowering the threshold without deteriorating the resulting probabilities of correct detection and false alarm is the fact that the occurrence of cases of false detection is possible only when a certain total extent of difficult weather conditions is reached, which can already be considered dangerous for the flight. The features of the formation of reflected signals from Arctic rain clouds, turbulence over a snowy desert and wind shear are considered. It is shown that all of them are characterized by lower radar reflectivity, therefore the resulting detection ranges are less than those that can be obtained at more southern latitudes, but at the same time they are sufficient for the navigation of UAVs or small aircraft.

    Keywords: airborne radar, numerical methods for assessing weather conditions, weather navigation in polar latitudes, UAV navigation, hazardous weather formation

  • Implementation of neural network models for predicting performance in a smart greenhouse

    This article explores the introduction and implementation of neural network models in the field of agriculture, with an emphasis on their use in smart greenhouses. Smart greenhouses are innovative systems for controlling the microclimate and other factors affecting plant growth. Using neural networks trained on data on soil moisture, temperature, illumination and other parameters, it is possible to predict future indicators with high accuracy. The article discusses the stages of data collection and preparation, the learning process of neural networks, as well as the practical implementation of this approach. The results of the study highlight the prospects for the introduction of neural networks in the agricultural sector and their important role in optimizing plant growth processes and increasing the productivity of agricultural enterprises.

    Keywords: neural network, predicting indicators, smart greenhouse, artificial intelligence, data modeling, microclimate

  • The main directions of development of architecture of the North Caucasus are a symbiosis of modern technologies and national traditions

    The article examines the unique symbiosis of modern technologies and national traditions, analyzes the stages of formation and development of the main directions of architecture development in the North Caucasus in the context of modern trends. The subject of the study is the architecture of the North Caucasus, taking into account modern design trends. The object of the study is buildings and structures, urban conglomerates of the North Caucasus region. The most striking example of this symbiosis is the new projects in the Caucasus, where architecture literally combines with the landscape, showing the unique interaction between man and nature. Thanks to modern construction methods, these buildings combine traditional architecture and modern construction technologies, creating a harmonious space. The architecture of the future, despite its subjectivity, has readability because culture and technological progress always affect architecture. In general, we can identify a number of features characteristic of the architecture of the future: cost-effectiveness, ergonomics, environmental friendliness and versatility. It is also necessary to mention new modern construction technologies, which include elements such as artificial intelligence, automation and robotization of processes, the use of 3D printing and digital modeling of building information (BIM).The symbiosis of modern construction and Caucasian culture is a unique combination of architecture of the past and the present. The synergy between modern construction technologies and traditional Caucasian culture can be very promising. It has the potential to simultaneously revive local cultural identity, contribute to sustainable practices, and create unique architectural designs that harmonize innovation and tradition. Historical forms and materials are actively combined with modern technology and materials, resulting in an architecture that simultaneously preserves its roots and looks to the future. This close interaction and symbiosis highlights the importance of culture in architecture and shows how innovations can be used to preserve and update cultural heritage.

    Keywords: construction, architectural design, modern trends, energy efficiency, thermal protection of buildings, construction industry, ecology, green construction, architectural bionics, North Caucasus

  • Mechanisms for adapting the development of development strategies for a modern mining enterprise

    The factors of sustainable development of a modern mining enterprise are considered. The main operating factors of the external and internal environment of the enterprise are determined. The basic conceptual provisions underlying the formation of an effective, modern, strategic platform for the formation of strategies for the development of a mining enterprise are considered. The possibilities of applying a particular strategy for the development of a mining enterprise are analyzed, depending on the combination of phases of rise or decline in the level of impact of factors of the external and internal environment of the enterprise. The algorithm developed by the authors of this work for choosing the optimal model of enterprise development is proposed, taking into account the phases of the impact of external and internal environmental factors and the development strategy of a modern mining enterprise chosen in accordance with them. Recommendations on choosing the optimal strategy for the development of a mining enterprise and building a development model based on it are proposed.

    Keywords: mining enterprise, economics, risk management, innovative development, development strategy, ecology, social policy

  • Vulnerabilities and methods of protection of the ROS operating system when implementing a multi-agent system based on the Turtlebot3 robot

    The problem of vulnerabilities in the Robot Operating System (ROS) operating system when implementing a multi-agent system based on the Turtlebot3 robot is considered. ROS provides powerful tools for communication and data exchange between various components of the system. However, when exchanging data between Turtlebot3 robots, vulnerabilities may arise that can be used by attackers for unauthorized access or attacks on the system. One of the possible vulnerabilities is the interception and substitution of data between robots. An attacker can intercept the data, change it and resend it, which can lead to unpredictable consequences. Another possible vulnerability is unauthorized access to the commands and control of Turtlebot3 robots, which can lead to loss of control over the system. To solve these vulnerabilities, methods of protection against possible security threats arising during the operation of these systems have been developed and presented.

    Keywords: Robotic operating system (ROS), multi-agent system, system packages, encryption, SSL, TLS, authentication and authorization system, communication channel, access restriction, threat analysis, Turtlebot3