×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Genetic search as a tool for overcoming linguistic uncertainty

    This article describes a developed method for automatically optimizing the parameters of an intelligent controller based on an adaptive genetic algorithm. The key goal of this development is to improve the mechanism for generating an intelligent controller rule base through multiparameter optimization. The genetic algorithm is used to eliminate linguistic uncertainty in the design of control systems based on intelligent controllers. A unique algorithm is proposed that implements a comprehensive optimization procedure structured in three sequential stages: identifying optimal control system parameters, optimizing the structure of the intelligent controller rule base, simulating the automatic generation process, and then optimizing the intelligent controller parameters. Implementation of this approach optimizes the weights of fuzzy logic rules and the centers of the membership functions of linguistic variables.

    Keywords: intelligent controller, optimization, genetic algorithm, uncertainty, term set

  • Development of a fine-grained concrete mix based on fine sand, modified with a complex three-component additive

    A fine-grained concrete mix based on fine sand and modified with a complex three-component additive including metakaolin, a superplasticizer, and a hardening accelerator has been developed. The study was conducted using the Box-Behnken factorial design and mathematical modeling in the R environment. The obtained values of compressive strength, flexural strength, and average density exceed those of the control composition. The research results were analyzed for reliability, descriptive statistics were obtained, and their correlation analysis was performed. A quadratic regression model of compressive strength was constructed and three-dimensional surfaces for the studied response functions were visualized. It was established that the synergistic effect of the complex additive is due to matrix compaction, a decrease in the water-cement ratio, and acceleration of the hydration process. The results confirm the possibility of using fine-grained concrete modified with a complex additive for the manufacture of prefabricated and monolithic structures, additive technologies, and have the potential to reduce the carbon footprint.

    Keywords: fine-grained concrete, fine sand, three-component additive, model, polynomial regression, descriptive statistics, response surface, strength

  • Representation of the aggregated structure of texts using a generalized context-dependent graph-theoretic model

    The paper discusses issues related to the use of graph-theoretic models in text analysis. One of the tasks is to aggregate such models to identify more "simple" graphs, the vertices of which correspond to subsets of the vertices of the original model, and the edges reflect the "strong connections" between the vertices. Using the example of a Russian folk tale plot, it is shown how to build an aggregated model with a given threshold of significance and present it for further analysis. To conduct the experiments, a set of graph-theoretical models for fairy-tale plots from the collection of A.M. Afanasyev was built using the Folklore information system, where the graph aggregation module was improved.

    Keywords: text analysis, graph-theoretical model, aggregation, significance threshold, storage format, folklore text, fairy tale plot, information system "Folklore"

  • Mathematical modeling of the security assessment of a penal system facility based on a modified genetic algorithm

    The article deals with the problem of quantifying the security of objects of the penal correction system based on mathematical modeling. The authors propose a modified genetic algorithm in which the traditional fitness function is replaced by a mechanism of "virtual movement" of individuals in a discrete space, which allows taking into account both the individual characteristics of safety measures and their cumulative impact. A step-by-step example of applying the algorithm to choosing the optimal set of protective measures based on expert assessments based on several criteria is given. The results demonstrate the effectiveness of the proposed approach for solving multi-criteria tasks of assessing and improving security in conditions of uncertainty and the absence of an explicit analytical relationship between system parameters.

    Keywords: security, vulnerability, event, penal enforcement system, genetic algorithm, mathematical modeling, optimization, expert assessment, criterion, security, security regime, discrete space, coalition, crossing, fitness function

  • A Review of Verification Methods for Zero-Knowledge Proof Protocols

    Information technologies have become increasingly used in various fields, be it document management or payment systems. One of the most popular and promising technologies is cryptocurrency. Since they require ensuring the security and reliability of data in the system, most of them use blockchain and complex cryptographic protocols, such as zero-knowledge proof protocols (ZKP). Therefore, an important aspect for achieving the security of these systems is verification, since it can be used to assess the system's resistance to various attacks, as well as its compliance with security requirements. This paper will consider both the concept of verification itself and the methods for its implementation. A comparison of methods for identifying a proof suitable for zero-knowledge protocols is also carried out. And as a result, a conclusion is made that an integrated approach to verification is needed, since choosing only one method cannot cover all potential vulnerabilities. In this regard, it is necessary to apply various verification methods at various stages of system design.

    Keywords: cryptocurrency, blockchain, verification, formal method, static analysis, dynamic method, zero-knowledge proof protocol

  • Features of the ensemble's architecture in the Barer tract as a patronymic center of worship for Tusholi

    The article is devoted to a comprehensive study of the unique architectural and sacred ensemble located in the Bareer tract in Ingushetia, which is an important monument of the medieval cultural heritage of the North Caucasus. The article examines in detail the architectural features of the tower structures, their typology, functions, and symbolism. The author provides a detailed analysis of the planning structure, construction techniques, and compares the architectural elements with their counterparts in the North Caucasus, emphasizing the uniqueness of the complex and its relationship with the landscape.
    The conducted comprehensive analysis suggests that this ensemble was a common patronage center that united various peoples of the North Caucasus and performed a sacred function associated with the goddess Tusholi. The presence of a well-thought-out architectural composition, key elements, and access routes confirms the hypothesis of the complex's religious purpose.

    Keywords: architecture, ensemble, Baer, monument, medieval heritage, tower structures, sacred function, rituals, petroglyphs, cult complexes, temples

  • A Model for representing weighted multi-label dependencies for detecting rare anomalous events in information security tasks

    This paper proposes a novel model of computer network behavior that incorporates weighted multi-label dependencies to identify rare anomalous events. The model accounts for multi-label dependencies not previously encountered in the source data, enabling a "preemptive" assessment of their potential destructive impact on the network. An algorithm for calculating the potential damage from the realization of a multi-label dependency is presented. The proposed model is applicable for analyzing a broad spectrum of rare events in information security and for developing new methods and algorithms for information protection based on multi-label patterns. The approach allows for fine-tuning the parameters of multi-label dependency accounting within the model, depending on the specific goals and operating conditions of the computer network.

    Keywords: multi-label classification, multi-label dependency, attribute space, computer attacks, information security, network traffic classification, attack detection, attribute informativeness, model, rare anomalous events, anomalous events

  • Digital control of double synchronization of a dual-rotor vibration unit

    The paper investigates the specifics of the digital implementation of a rotor synchronization control algorithm for the SV-2M two-rotor vibration unit. The influence of the sampling period on the stability of the synchronous mode is evaluated using computer simulations in MATLAB/Simulink, with time quantization and zero-order hold delay explicitly accounted for. A comparative analysis of the digital and analog versions of the algorithm has been performed. The boundary values of the discretization periods for different values of the given total energy of the system have been determined. The obtained results confirm the applicability of the proposed approach for digital control systems of vibratory equipment.

    Keywords: digital control, rotor synchronization, two-rotor vibration unit, speed-gradient algorithm, extrapolator

  • Micro-housing as a tool for solving urban challenges

    Many major cities around the world are seeing a trend toward compact housing units, typically located in central areas and fully integrated with existing urban infrastructure. Despite similarities in size and location, each project offers unique architectural and social solutions to address the housing crisis and adapt to limited space. With urban density increasing and real estate prices rising, compact housing projects, typically located in central areas and fully integrated with existing infrastructure, are becoming increasingly relevant. Despite the general trend toward smaller spaces, each project offers unique architectural and social responses to the challenges of modern urbanism.

    Keywords: micro-housing, urbanization, architecture, city, infrastructure, mobility, sustainability, renovation, miniaturization, accessibility, autonomy, flexibility, project, space, concept

  • Development of a method for protecting confidential files in a messenger based on an adaptive authentication system and blocking abnormal activity

    The article discusses the development of a method for protecting confidential images in instant messengers based on masking with orthogonal matrices. The vulnerability of the system to brute-force attacks and account compromise is analyzed. The main focus is on the development of an architecture for analyzing abnormal activity and adaptive authentication. The article presents a system structure with independent security components that provide blocking based on brute-force attacks and flexible session management. The interaction of the modules within a unified security system is described, with the distribution of functions between server and client components.

    Keywords: information security, messenger, messaging, communications, instant messaging systems, security audits, and brute-force attacks

  • Creating a C# Application for Modeling Maximum Flow in a Transportation Network

    This article examines transportation network modeling using the Ford–Fulkerson algorithm. It describes the process of finding a minimum cut using a graphical editor and library developed in the C# programming language. Key concepts of graph and network theory are presented to clarify the problem statement. An example of solving a transportation problem using the developed software is shown, and the program's results are compared with a control example.

    Keywords: transportation network, maximum flow problem, Ford–Fulkerson algorithm, minimum cut in the network, software library, graphical editor, C# programming language

  • Comparative analysis of the performance of the lpSolve, Microsoft Solver Foundation, and Google OR-Tools libraries using the example of a high-dimensional linear Boolean programming problem

    The article presents a comparative analysis of the performance of three solver programs (based on the libraries lpSolve, Microsoft Solver Foundation and Google OR-Tools) when solving a large-dimensional linear Boolean programming problem. The study was conducted using the example of the problem of identifying the parameters of a homogeneous nested piecewise linear regression of the first type. The authors have developed a testing methodology that includes generating test data, selecting hardware platforms, and identifying key performance metrics. The results showed that Google OR-Tools (especially the SCIP solver) demonstrates the best performance, surpassing analogues by 2-3 times. The Microsoft Solver Foundation has shown stable results, while the lpSolve IDE has proven to be the least productive, but the easiest to use. All solvers provided comparable accuracy of the solution. Based on the analysis, recommendations are formulated for choosing a solver depending on performance requirements and integration conditions. The article is of practical value for specialists working with optimization problems and researchers in the field of mathematical modeling.

    Keywords: regression model, homogeneous nested piecewise linear regression, parameter estimation, method of least modules, linear Boolean programming problem, index set, comparative analysis, software solvers, algorithm performance, Google OR-Tools

  • Development of a model for optimizing the management of fire and rescue units during a fire using neural networks

    The article is devoted to the development of an innovative neural network decision support system for firefighting in conditions of limited visibility. A comprehensive approach based on the integration of data from multispectral sensors (lidar, ultrasonic phased array, temperature and hygrometric sensors) is presented. The architecture includes a hybrid network that combines three-dimensional convolutional and bidirectional LSTM neurons. To improve the quality of processing, a cross-modal attention mechanism is used to evaluate the physical nature and reliability of incoming signals. A Bayesian approach is used to account for the uncertainty of forecasts using the Monte Carlo dropout method. Adaptive routing algorithms allow for quick response to changing situations. This solution significantly improves the efficiency of firefighting operations and reduces the risk to personnel.

    Keywords: mathematical model, intelligence, organizational model, gas and smoke protection service, neural networks, limited visibility, fire department, management, intelligent systems, decision support

  • Modeling the steel-jacket strengthening of a reinforced concrete pipe rack column, accounting for material nonlinearity

    The paper presents a finite element model of a reinforced concrete viaduct column retrofitted with a steel jacket. The model was developed in ANSYS software, accounting for material nonlinearity and contact interactions between the concrete column and the steel jacket. The selection of finite element types, material constitutive laws, and the friction coefficient is justified. Numerical simulations revealed three distinct stages in the composite behavior of the column–jacket system under loading. Particular attention was given to the analysis of the contact interface and the investigation of the steel–concrete friction coefficient, which significantly influences the system response at each loading stage and serves as the basis for distinguishing these stages. The study demonstrates that accounting for the composite action between the reinforced concrete column and the steel jacket yields an additional load-carrying capacity reserve of up to 16% compared to separate, non-composite design calculations. Furthermore, the paper includes an analysis of the influence of the spacing of transverse tie plates of the jacket on the load-carrying capacity of the retrofitted column and identifies optimal ranges for this spacing.

    Keywords: material nonlinearity, stress–strain relationship или Constitutive law, steel jacket, Pipe rack column, coefficient of friction, strengthening, finite element model, reinforced concrete, composite action, nonlinear stress–strain model

  • System analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method

    Problem statement. When modeling a complex technical system, the issues of parameter estimation are of primary importance. To solve this problem, it is necessary to obtain a methodology that allows eliminating errors and inaccuracies in obtaining numerical parameters. Goal. The article is devoted to a systematic analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method. The research method. A systematic analysis of the methods of using interval estimates of numerical parameters is carried out. The decomposition and structuring of the methods were carried out. Results. The expediency of using a methodology for describing the parameters of a complex technical system using the interval estimation method is shown. An analysis of the use of various interval estimation models is presented. Practical significance. Application in the analysis and construction of complex systems is considered as a practical application option. The method of estimating the parameters of a complex technical system using the interval estimation method can be used as a practical guide.

    Keywords: interval estimation, parameter estimation, numerical data, fuzzy data, complex technical systems