×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • The optimal multi-frequency modem for intermodule interaction of hybrid communications systems of a digital city

    The development, research and construction of devices that speed up the process of interaction between various modules (for example, telemetry and remote control systems), and in general, hybrid communication systems of a digital city that include a variety of systems used in an Intelligent Building is an urgent problem. One of these devices presented in the article is the optimal multi–frequency modem developed. In addition to the developed modem, the article presents examples of the development of similar types of devices and systems by both Russian and foreign researchers. At the same time, the authors proved that the use of the proposed modem provides a gain in spectral and energy efficiency in comparison with analogues. The proposed approach can be used to organize high-speed data transmission over frequency-limited communication channels based on new wired technologies of the digital subscriber line standard, as well as wireless systems.

    Keywords: telemetry and remote control system, intelligent building, digital city hybrid communications system, modem, multi-frequency modulation, digital subscriber line, optimal finite signal, modulator, demodulator, wireless communication system

  • Search for patent analogues based on a comparison of key phrases

    This study describes approaches to automating full-text keyword search in the field of patent information. Automating the search by keywords (n-grams) is a significantly more difficult task than searching by individual words, in addition, it requires morphological and syntactic analysis of the text. To achieve this goal, the following tasks were solved: (a) the full-text search systems were analyzed: Apache Solr, ElasticSearch and ClickHouse; (b) a comparison of the architectures and basic capabilities of each system was carried out; (c) search results in Apache Solr, ElasticSearch and ClickHouse were obtained on the same dataset. The following conclusions were drawn: (a) all the systems considered perform full-text keyword search; (b) Apache Solr is the system with the highest performance, it also has very convenient functions; (b) ElasticSearch has a fast and powerful architecture; (c) ClickHouse has a high data processing speed.

    Keywords: search, keyphrases, patent, Apache Solr, Elasticsearch, ClickHouse

  • A Systemic Approach to the Implementation and Development of Innovative Information Technologies for the Prevention of Offenses Committed by Foreign Citizens

    The article presents a comprehensive analysis of a systematic approach to the implementation and development of innovative information technologies aimed at preventing offenses committed by foreign citizens. The introduction provides an overview of the growing importance of employing advanced technological solutions in law enforcement, particularly in addressing challenges associated with foreign nationals. The main objectives of the study are to explore how the integration of technologies such as big data processing, artificial intelligence, and geographic information systems can enhance the efficiency of preventive measures. The article details the use of data analysis techniques, machine learning models, and system integration to create a unified information platform. This platform enables the consolidation of data from diverse sources, thereby improving the coordination between different law enforcement units and facilitating faster and more informed decision-making processes. The integration of these technologies also supports process standardization, reducing data inconsistencies and ensuring more reliable operations across various departments. The results highlight the benefits of utilizing big data analytics to process vast amounts of information that would be otherwise impossible to handle efficiently. Artificial intelligence, through predictive models and risk assessment tools, plays a crucial role in identifying potential threats and allocating resources effectively. Geographic information systems contribute by mapping crime hotspots and providing spatial analysis, which aids in targeted intervention strategies. The discussion emphasizes the importance of a unified approach to technology implementation, focusing on the creation of an integrated information system that can adapt to ongoing changes in the social and legal environment. The adaptability of the system is critical for maintaining its effectiveness in the face of new challenges and evolving regulatory requirements. The development of standardized data collection and processing protocols further enhances the system's resilience and operational efficiency. In conclusion, the article underscores that a systematic and integrated use of innovative information technologies significantly improves the effectiveness of crime prevention efforts and the overall efficiency of law enforcement agencies. The proposed approach not only facilitates proactive measures but also ensures a high level of responsiveness to emerging security threats, thereby strengthening public safety.

    Keywords: systemic approach, innovative information technologies, crime prevention, foreign citizens, big data, artificial intelligence, geoinformation systems, information platform, standardization, law enforcement agencies, efficiency management, data integration

  • Game-based training models in a simulation environment of organizational conflicts

    Abstract. It is revealed that specific forms of a simulation game combined with some peculiarities of training sessions in organizational systems could result in developing adaptable simulation models of a business situation. It is recommended to use a cognitive model in problem analysis of organizational systems, which allows switching from cognitive to simulation models naturally still being in visual topological descriptions. The AnyLogic software platform was chosen for developing a model which provides ample opportunities for creating an innovative educational environment with the elements of game simulations and AI. Cognitive analysis of a game learning process has revealed that the latter should have one cycle of a business game with two interactive nodes to introduce a host and a player into the game. It is noted that business games focused on developing management styles in a conflict are mostly in demand. Therefore, a simulation model has been developed to train executives to counteract an organizational conflict within the variability of authoritarian, democratic and liberal management styles. The model uses a paradigm of systems dynamics and is implemented in the AnyLogic software platform notation. To set the rules, the game host in the initial state or when starting the next game cycle sets the dynamics characteristics of a process while managing the organizational structure, as well as changes characteristics values of a pre-conflict situation. In response to conflict development the player performs management using auxiliary services available to him. In fact, the model is not limited by a list of the game’s tasks or possible options for a player’s decision.

    Keywords: management diversification, production diversification, financial and economic diversification goals, production and technical goals to ensure production flexibility

  • A fuzzy comparison method for managing the functioning of an organizational system

    Modern digitalization processes involve the use of intelligent systems at key stages of information processing. Given that the data available for intelligent analysis in organizational systems are often fuzzy, there is a problem of comparing the corresponding units of information with each other. There are several known methods for such a comparison. In particular, for random fuzzy variables with known distribution laws, the degree of coincidence of these distribution laws can be used as a criterion for the correspondence of one random variable to another. However, this approach does not have the necessary flexibility required to solve practical problems. The approach we propose allows you to compare fuzzy, fuzzy and clear, as well as clear and clear data. The paper will provide an example illustrating this approach. The material presented in the study was initially focused on managing organizational systems in education. However, its results can be extended to other organizational systems.

    Keywords: fuzzy data, weakly structured problems, comparison criteria, hierarchy analysis method, systems analysis, fuzzy benchmarking

  • A mathematical model of a fault-tolerant nonlinear conversion unit for OFDM wireless systems with frequency hopping

    With the development of low-orbit satellite Internet systems (NSIS), issues of ensuring effective operation in conditions of intentional interference come to the fore. One of the solutions is related to the use of systems using both OFDM methods and generators implementing frequency hopping (HF). Obviously, the more complex the algorithm for selecting operating frequencies, the more efficient the operation of the microwave. In the article, it is proposed to use the SPN cipher "Grasshopper" as a generator for selecting operating frequencies. As a result, the CCF system will have a high resistance to calculating operating frequency numbers by electronic warfare systems. However, failures and failures may occur during the operation of the SSC. To prevent their consequences, it is proposed to implement an SPN cipher using polynomial modular codes of residue classes (PMCC). One of the transformations in the "Grasshopper" is a nonlinear transformation that performs the substitution operation. It is obvious that the creation of a new mathematical model for performing a nonlinear transformation using MCCS will ensure the operation of the SPN-cipher-based RF generator in conditions of failures and failures.

    Keywords: low-orbit satellite Internet systems, the Grasshopper SPN cipher, nonlinear transformations, modular codes of residue classes, mathematical model, fault tolerance, frequency hopping, polynomial modular code of residue classes

  • One of the Approaches to Analyzing Source Code in Student Projects

    When evaluating student work, the analysis of written assignments, particularly the analysis of source code, becomes particularly relevant. This article discusses an approach for evaluating the dynamics of feature changes in students' source code. Various metrics of source code are analyzed and key metrics are identified, including quantitative metrics, program control flow complexity metrics, and the TIOBE quality indicator. A set of text data containing program source codes from a website dedicated to practical programming, was used to determine threshold values for each metric and categorize them. The obtained results were used to conduct an analysis of students' source code using a developed service that allows for the evaluation of work based on key features, the observation of dynamics in code indicators, and the understanding of a student's position within the group based on the obtained values.

    Keywords: machine learning, text data analysis, program code analysis, digital footprint, data visualization

  • Sufficient condition for stability of a dynamic system of stabilization of equilibrium position and programmed motions

    In the article, based on the estimate of the Euclidean norm of the deviation of the coordinates of the transition and stationary states of the dynamic system, the compression condition of the generalized projection operator of the dynamic system with restrictions is derived. From the principle of contracting mappings, taking into account the derived compression condition of the projection operator, estimates are obtained for the sufficient condition for the stability of the dynamic system of stabilization of the equilibrium position and program motions. The obtained estimates generalize the previously obtained results. Ensuring the stability of the operator of a limited dynamic system is demonstrated experimentally.

    Keywords: sufficient condition for stability, projection operator, stabilization of equilibrium position. stabilization of program motions, SimInTech

  • Evaluation of the complexity of algorithms for building a dominator tree in the context of the implementation of algorithms for data flow analysis in the implementation of the frontend compiler of the Solidity programming language

    This article discusses two of the most popular algorithms for constructing dominator trees in the context of static code analysis in the Solidity programming language. Both algorithms, the Cooper, Harvey, Kennedy iterative algorithm and the Lengauer-Tarjan algorithm, are considered effective and widely used in practice. The article compares these algorithms, evaluates their complexity, and selects the most preferable option in the context of Solidity. Criteria such as execution time and memory usage were used for comparison. The Cooper, Harvey, Kennedy iterative algorithm showed higher performance when working with small projects, while the Lengauer-Tarjan algorithm performed better when analyzing larger projects. However, overall, the Cooper, Harvey, Kennedy iterative algorithm was found to be more preferable in the context of Solidity as it showed higher efficiency and accuracy when analyzing smart contracts in this programming language. In conclusion, this article may be useful for developers and researchers who are involved in static code analysis in the Solidity language, and who can use the results and conclusions of this study in their work.

    Keywords: dominator tree, Solidity, algorithm comparison

  • Development of an algorithm and software implementation of a module for correlation and regression analysis and visualization of user activity

    The purpose of the article is a software implementation of a module for analyzing the activity of site users based on a heat map of clicks, compatible with domestic web services, for example, combining the functionality of correlation and regression analysis and visualization in the form of dashboards before and after making changes to site elements. All functionality is carried out directly in the web analytics service. Based on the data obtained on the analyzed site element, a decision is made to adjust the design and/or content to increase the click rate. Thus, the proposed solution allows us to expand the functionality of the web analytics service and reduce labor costs. The software module has been successfully tested. As a result of the analysis and making the necessary adjustments to the site, the click rate increased

    Keywords: user activity, correlation and regression analysis, dashboard, program module, trend line, coefficient of determination

  • Modeling the Random Forest Machine Learning Algorithm Using the Mathematical Apparatus of Petri Net Theory

    The article considers the possibility of modeling the random forest machine learning algorithm using the mathematical apparatus of Petri net theory. The proposed approach is based on the use of three types of Petri net extensions: classical, colored nets, and nested nets. For this purpose, the paper considers the general structure of decision trees and the rules for constructing models based on a bipartite directed graph with a subsequent transition to the random forest machine learning algorithm. The article provides examples of modeling this algorithm using Petri nets with the formation of a tree of reachable markings, which corresponds to the operation of both decision trees and a random forest.

    Keywords: Petri net, decision tree, random forest, machine learning, Petri net theory, bipartite directed graph, intelligent systems, evolutionary algorithms, decision support systems, mathematical modeling, graph theory, simulation modeling

  • Analysis of fatal injuries in the construction industry of the Russian Federation and a number of other foreign countries

    This article analyzes the main causes of fatal injuries in the construction industry of the Russian Federation and a number of other foreign countries, including falls from heights, electric shock, injuries associated with the use of construction machinery and mechanisms, as well as exposure to harmful substances. In conclusion, the article highlights the importance of joint efforts by employers, employees and regulators to create a safer and healthier work environment in the construction industry. The implementation of the preventive measures described in the article can significantly reduce the risk of accidents and improve the well-being of employees.

    Keywords: construction industry, industrial injuries, accidents, causes of injuries, working conditions, occupational risks, working at height, occupational safety, environmental factors, workplace organization, training

  • A current review and evaluation of modern log trucks

    The work presents the review of modern log trucks under the recent sanctions imposed. The author states that the problem of renewing the existing log trucks becomes urgent for forest transporting and logging companies nowadays. There is a wide range of new basic chassis and trucks at the market to build log trucks with a wheel formula 6x4 and 6x6 produced by Russian, Belorussian and Chinese factories. A great number of trailer links is produced to build log trucks. There is an opportunity to buy used trucks of other companies. For the first stage of the technical and economic analysis and preliminary selection of the optimal type and composition of a logging truck, a comparative assessment of the effectiveness of logging trucks was carried out. The analysis shows that Russian log trucks with engine power more than 400 HP (horsepower) can compete with the best foreign models. Nevertheless, the problem of reliability of Russian, Belorussian and Chinese log trucks needs further research.

    Keywords: log trucks, trailer links, productivity, effectiveness

  • Features of functional relationships of parameters of a time-varying diagnostic signal in modeling, recognition of states and monitoring of systems

    In operational diagnostics and recognition of states of complex technical systems, an important task is to identify small time-determined changes in complex measured diagnostic signals of the controlled object. For these purposes, the signal is transformed into a small-sized image in the diagnostic feature space, moving along trajectories of different shapes, depending on the nature and magnitude of the changes. It is important to identify stable and deterministic patterns of changes in these complex-shaped diagnostic signals. Identification of such patterns largely depends on the principles of constructing a small-sized feature space. In the article, the space of decomposition coefficients of the measured signal in the adaptive orthonormal basis of canonical transformations is considered as such a space. In this case, the basis is constructed based on a representative sample of realizations of the controlled signal for various states of the system using the proposed algorithm. The identified shapes of the trajectories of the images correspond to specific types of deterministic changes in the signal. Analytical functional dependencies were discovered linking a specific type of signal change with the shape of the trajectory of the image in the feature space. The proposed approach, when used, simplifies modeling, operational diagnostics and condition monitoring during the implementation of, for example, low-frequency diagnostics and defectoscopy of structures, vibration diagnostics, monitoring of the stress state of an object by analyzing the time characteristics of response functions to impact.

    Keywords: modeling, functional dependencies, state recognition, diagnostic image, image movement trajectories, small changes in diagnostic signals, canonical decomposition basis, analytical description of image trajectory

  • Development of a fuzzy classifier of incoming requests for providing user access to the information infrastructure

    Currently, one of the most extensive issues in the field of information security is the organization of user access control to information infrastructure objects. Taking into account the volume of corporate information resources, as well as the number of users requesting access, there is a need to automate the access approval process taking into account possible risks. In this case, the most optimal solution to this problem is the use of fuzzy logic. The article analyzes the process of providing access to the information infrastructure using a fuzzy classifier and develops a conceptual model of the fuzzy classifier algorithm for incoming requests for access in order to automate the process and minimize information security risks associated with possible destructive actions aimed at the confidentiality, integrity and availability of the information infrastructure.

    Keywords: neural network, machine learning, information security, cybersecurity, properties and structure of a neural network, mathematical model, threats and information vulnerabilities