This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.
Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole
A method of applying mathematical analysis and machine learning to organize predictive maintenance of an electric motor is considered using the example of the AIMU 112 MV6 U1 electric motor. A comprehensive technique for diagnosing the technical condition of an electric motor based on the analysis of vibration signals recorded by a three-axis accelerometer is proposed, which can be adapted to monitor the condition of various types of rotating equipment in industrial conditions.
Keywords: predictive maintenance, electric motor, vibration analysis, machine learning, neural networks, fault diagnosis, accelerometer, condition classification
The article presents a systematic study of information flows in the "application-DBMS" link and proposes a comprehensive model of protection against SQL injections based on multi-level analysis. The system analysis considers the full cycle of query processing, which allows overcoming the fragmentation of existing approaches. The limitations of existing methods based on signature analysis, machine learning, and syntax validation are analyzed. To improve the reliability and accuracy of detection, a new combined method is proposed that integrates static syntax analysis of abstract syntax trees (AST) of queries with dynamic behavioral analysis of sessions. A key feature of the syntax module is the application of the Jaccard coefficient to assess the structural similarity of paths in the AST, which ensures the efficient detection of polymorphic injections. The behavioral module analyzes the temporal and statistical patterns of the query sequence, which allows.
Keywords: SQL injections, system analysis, machine learning, parsing, abstract syntax tree, behavioral analysis, Jaccard coefficient, polymorphic attacks, time-based attacks
This article describes a method for filtering speckle noise from synthetic aperture radar images using wavelet transforms and nonlocal means. The proposed method utilizes a spatial-frequency representation of the image and analyzes the similarity of local wavelet coefficient structures in subbands. Experimental results demonstrate that the developed method outperforms some known methods in terms of metrics such as mean square error, peak signal-to-noise ratio, and structural similarity index, as well as subjective visual assessment. The method effectively filters speckle while preserving fine details, contrasting edges, and correctly restoring background brightness without introducing noticeable artifacts.
Keywords: radar image, synthetic aperture radar, speckle noise, image filtering, wavelet transform, thresholding, non-local means
This work presents the Multi-Agent Coverage Controller (MACC)—a specialized deep reinforcement learning method designed to solve the coverage path planning problem in multi-agent systems. The method addresses key challenges inherent to coverage path planning, including sparse and noisy rewards, high gradient variance, the difficulty of credit assignment among agents, and the need to scale to a variable number of agents. MACC integrates a specific set of mechanisms: an adaptive clipping-interval width, advantage-modulation gating, a counterfactual baseline for the centralized critic, and a multi-head self-attention mechanism with a presence mask. Theoretical properties of the method are provided, demonstrating optimization stability and reduced variance of gradient estimates. A comprehensive ablation study is conducted, showing the contribution of each mechanism to agent coordination, spatial distribution of trajectories, and overall coverage speed. Experiments on a set of satellite maps indicate that MACC achieves substantial improvements in coverage completeness and speed compared to the baseline configuration, delivering the best results when all integrated mechanisms are used jointly.
Keywords: multi-agent system, coverage path planning, deep reinforcement learning, adaptive trim interval width, modulated advantage gateway, counterfactual basis, multi-head self-awareness mechanism, agent coordination
This paper examines the problem of assessing the influence of social network users and their groups in disseminating information among audiences. Forming a network of user subsets to initiate informational influence is a computationally complex problem with a stochastically uncertain outcome. Existing centrality metrics typically involve searching for all shortest paths in a graph or solving large-scale systemic sources. This paper provides approximate estimates of the influence of individual network participants and their subsets, based on modifications of the Flageolet-Martin algorithm. A greedy algorithm based on electronic metrics is also proposed, enabling coalition formation by iteratively supplementing it with quasi-optimal elements. The obtained results can be applied to problems of information analysis, forecasting, and planning in social networks.
Keywords: Social network, informational influence, coalition, influence, connection graph, centrality metric, closeness centrality, shortest path, route, approximate estimate, greedy algorithm
The article discusses modern methods for protecting bank customers' personal information based on differential anonymization of data using trusted neural networks. It provides an overview of the regulatory framework, analyzes technological approaches and describes a developed multi-level anonymization model that combines cryptographic and machine learning techniques. Special attention is paid to balancing between preserving data utility and minimizing the risk of customer identity disclosure.
Keywords: differential anonymization, trusted neural network, personal data, banking technologies, information security, cybersecurity
The purpose of the research is to develop a solution that allows optimizing the number and functionality of information security specialists involved in ensuring the information security of an automated system in a secure execution of the organization. The methods used in the article include a description and analysis of various governing documents, professional standards and regulations of the Russian Federation, and a number of scientific author's works that disclose the requirements for the functionality and qualifications of information security specialists. As a result of the work carried out, significant shortcomings were identified in the current regulatory and methodological documents describing the labor actions of personnel ensuring the protection of the facility's information, and a tendency to reduce the number of positions and simultaneously expand the functionality of the remaining employees. The need to comply with the qualification requirements for the reliable functioning of an automated system in a secure design and the exclusion of the "human" factor in information security incidents is emphasized. A new, optimal organizational structure of the department responsible for monitoring the protection of information circulating in an automated system is proposed, and the job responsibilities and areas of responsibility of the automated system administrator and the information security administrator are specified in detail. The solution presented in this paper can be used for daily information security in any automated system for various organizations. It emphasizes the importance of improving the skills and unifying the competencies of information security workers to ensure their interchangeability and reduce the risks associated with lack of control if highly specialized employees are excluded, which will increase the stability and effectiveness of the information security system at the enterprise.
Keywords: information security, administrator, staffing, functionality of information security personnel, automated system in a secure design
A reproducible method is presented for the autonomous determination of the coordinates of the base stations of fourth-generation mobile radio networks and the parameters of their sectors, based solely on field observations of the modem without using time delay and methods for estimating the angles of arrival of the signal. The approach combines robust allocation of an informative "core" of measurements, weighted minimization of distances and aggregation at the site level, providing stable estimates in urban environments. Experimental verification in a real scene demonstrates a significant reduction in localization error compared to the basic centroid and median methods, which confirms the practical applicability of the proposed solution.
Keywords: LTE, positioning, localization, base station, site coordinate, signal strength, angular distribution, sectorization, optimization, observation, geometric median, field recording, minimization method, radio signal
The paper considers a detailed mathematical model of a helicopter-type aircraft autopilot implemented in the Matlab/Simulink simulation environment. Computer simulation is used to examine the behaviour of the system without the application of control laws, confirming the need for correction. To compare the performance of controllers, a comparison is made between a proportional-derivative type fuzzy logic controller with linear and nonlinear control laws.
Keywords: helicopter, altitude control, fuzzy logic controller, automatic control system, flight safety
The article addresses the solution of systems of linear algebraic equations arising in static and steady-state vibration problems solved by the finite element method. A block-sparse matrix format based on the CSR (Compressed Sparse Row) format is presented, along with its GPU implementation using CUDA. A stabilized biconjugate gradient method is implemented and applied to model problems of varying dimensions; a comparison with a reference implementation in MATLAB is also conducted.
Keywords: sparse matrices, finite element method, block matrices, GPU, parallel computing, systems of linear algebraic equations, biconjugate gradient method
The article discusses current threats and vulnerabilities of telephone subscribers in the context of mass digitalization, the development of artificial intelligence and machine learning technologies, and their use in fraudulent scenarios. The study analyzes the main vulnerability factors and provides statistical data on telephone fraud incidents in Russia and abroad. Special attention is given to the phenomena of trust in authority, insufficient digital literacy, and the use of voice synthesis and deepfake technologies for social engineering attacks.
Keywords: social engineering, fraud, vishing, deepfake, artificial intelligence, digital literacy, information security
This article explores the phenomenon of Yuri Gagarin as a cultural symbol embodied in monumental art across various countries. Using interdisciplinary analysis, it traces the evolution of his image—from a historical figure to a universal cultural archetype. It reveals the mechanisms of the sacralization and mythologization of the first cosmonaut, as well as the transformation of his biographical narrative into a symbolic construct imbued with ideological and existential meanings.
Particular attention is paid to a comparative analysis of key monuments to Gagarin as bearers of collective memory. Their artistic features, semiotic codes, and regional differences in representation from the Soviet period to the present are examined. Using specific cities as examples, it demonstrates how monumental images and "Gagarin toponymy" contribute to the formation of national and global identity.
This work contributes to discussions on the construction of cultural heroes, the role of art in historical politics, and the visual representation of scientific and technological progress.
Keywords: Yuri Gagarin, monuments, space age, cultural symbol, collective memory, mythologization, monumental art, historical heritage, cultural diplomacy, Soviet cosmonautics
The article presents an analysis of the quality of services to assess the originality of the "anti-plagiarism" text using the example of texts generated by a neural network. For the analysis, three originality assessment services and texts generated by three different neural networks were used.
Keywords: text originality, anti-plagiarism, neural networks, text analysis, borrowings
The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.
Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object