×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Prospects for Enhancing Technological Approaches in Offshore Platform Construction with Regard to Efficiency Criteria

    The article examines the organizational and technological aspects of constructing offshore platform substructures and the factors influencing the pace of their erection. A comparison of foreign and Russian practice reveals key constraints related to the continuity of formwork-concrete operations and the applied form-shaping systems. The study presents classifications of materials and technologies, as well as a multicriteria efficiency assessment model that enables the comparison of alternative technological solutions. Based on the findings, the paper identifies promising directions for improving technological approaches to offshore platform construction.

    Keywords: offshore platforms, supports, construction, sliding formwork, concreting, technological processes, multi-criteria assessment

  • A Cooperative Game Analysis of Decision-Making in the UN Security Council with Different Agent Compositions

    This article examines the voting process in the UN Security Council. It describes the decision-making process from the perspective of cooperative voting games. A method for finding the distribution of payoffs between agents in a voting game is presented. An algorithm for formalizing a voting game with player vetoes and a variable number of agents is described. A comparison of player payoffs as a result of voting with different agent compositions is presented. An analysis of how voting would change in the event of a possible US withdrawal from the UN Security Council is conducted. Hypotheses are put forward regarding changes to the voting rules should the composition of the Council change. Conclusions are drawn regarding the use of cooperative games in analyzing the voting process. A conclusion is formulated regarding the consequences of a US withdrawal from the UN Security Council.

    Keywords: game theory, cooperative games, Shapley value, coalition, C-core, voting, UN, division, veto

  • Experiment on training and testing a computer vision model for determining the burnout of a steel casting pipe at a continuous steel casting plant

    The article describes an experiment on the compilation of a training sample, training and testing of a neural network model of a computer vision system for detecting burns of a tundish nozzle at a continuous steel casting plant. The issue of validity of augmentation of data for training is considered. The obtained results are analyzed.

    Keywords: computer vision, object detection, dataset, augmentation, steelmaking, continuous steel casting, burnout of a tundish nozzle

  • Development of a prototype for a Physical Protection Technical Means Control System of a facility based on the Astra Linux operating system

    The design of automated control systems for the physical protection of facilities is one of the most sought-after area in the development of domestic software products. The article presents the architecture of a hardware-software system, an assessment of the development tools required to implement a web application based on the Astra Linux operating system, and a description of an experiment to create a system prototype. The following tools were used to build the system: the Angular framework for the client layer; the FastAPI framework, the SQLAlchemy library, and the WebSocket protocol for the server layer; and the object-relational PostgreSQL database management system for data storage. The result of the work is a technical means control system that demonstrates interaction with devices and the database. The implemented prototype will serve as a basis for developing a hardware-software complex for the physical protection of a facility.

    Keywords: domestic operating system, web application, development tools, management system, database, sensor, monitoring

  • A method of protection against the Sybil attack based on the analysis of the correlogram of the electromagnetic field power map of network traffic

    This paper discusses a method for countering Sybil attacks in distributed systems based on the analysis of electromagnetic power maps of the temporal characteristics of network traffic. The key hypothesis is that multiple Sybil identifiers controlled by a single attacker node exhibit statistically significant correlation in their network activity patterns, which can be identified using a correlogram. A method for detecting Sybil attacks in wireless networks is proposed based on the analysis of correlograms of electromagnetic signal power maps. The method exploits the statistical properties of power profiles arising from the correlation of network activity of Sybil nodes controlled by a single attacker. A protection system architecture has been developed, including modules for network activity monitoring, correlogram calculation, clustering, and anomaly detection. A set of 10 correlogram parameters is introduced for attack identification, including profile variance, randomness and periodicity coefficients, spectral density, and correlation characteristics. Experimental testing on a millimeter-wave radar station demonstrated detection accuracy ranging from 83.2% to 97.4%. To improve the method's effectiveness, the use of deep neural networks after accumulating a sufficient amount of data is proposed. The proposed method enables the identification and denial of compromised identifiers, increasing the resilience of P2P networks, blockchain systems, and distributed ledgers.

    Keywords: Sybil attack, distributed systems security, correlogram, network traffic analysis, time series, autocorrelation, anomaly detection

  • Development of a Hybrid Deep-Learning Neural Network Using a Square-Root Sigma-Point Kalman Filter for Estimating Vehicle Mass and Road Grade

    The article presents a hybrid neural network for estimating the mass of a car and the longitudinal/transverse slopes of a road, combining a square-root sigma-point Kalman filter and a neural network model based on a transformer encoder using cross-attention to the evaluation residuals. The proposed approach combines the physical interpretability of the filter with the high approximation capability of the neural network. To ensure implementation on embedded electronic control units, the model was simplified by converting knowledge into a compact network of long-term short-term memory. The results of experiments in various scenarios showed a reduction in the average error by more than 25% with a computational delay of less than 0.3 ms.

    Keywords: vehicle condition assessment, road slope assessment, vehicle mass assessment, transformer neural network, cross-focus, adaptive filtering, knowledge distillation, square-root sigma-dot Kalman filter, intelligent vehicles, sensor fusion

  • The architecture of cultural and educational centers as a tool of social rehabilitation in industrial cities

    The article discusses aspects of the implementation of the architecture of cultural and educational centres in industrial cities. This article reveals historical context of the formation of cultural and educational institutions in the structure of industrial cities. Some of the objects in cities of the Donbass region are given as examples, including the context of architectural revitalization. The term "rehabilitation" is analyzed in relation to architectural and urban planning activities. The factors that determine the need for social rehabilitation in industrial cities are given in this article, including those applicable to the cities of the Donbass region. The aspects of social rehabilitation are formulated in this paper, which make it possible to apply this concept to industrial territories. Some socio-economic aspects, that reveal the meaning of architectural reinterpretation of objects of industrial and post-industrial territories, are given in this paper. Special attention is paid to the potential of cultural and educational centers as a tool for integrating former industrial territories into modern urban space.

    Keywords: architectural heritage, industrial city, culture, cultural and educational institution, social environment, leisure, rehabilitation, modernization, architectural transformation, sustainable urban development, regional specifics

  • Algorithm for calculating the mathematical submodel of the chain section of a rotary tubular kiln for sintering nepheline concentrate with limestone in alumina production

    The paper presents an algorithm for calculating thermal processes in the chain section of rotary tubular kilns used for sintering nepheline concentrate with limestone. The model is based on heat and mass balances and accounts for interactions between the gas flow, the material bed, dust particles, and the refractory lining. The algorithm considers the influence of the geometry and packing density of the chain curtain on heat transfer and is integrated with submodels of axial material movement and dust carryover. The calculation is implemented as an iterative scheme that ensures consistency between gas and material temperatures. The algorithm makes it possible to determine temperature distributions, heat fluxes and losses, as well as to perform parametric optimization of kiln operating conditions and design.

    Keywords: rotary tubular kiln, nepheline concentrate, mathematical model, chain section, heat transfer, material movement, dust carryover, algorithm

  • Visualization of a scientific hypothesis as a method of it's embodiment in an architectural image

    This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.

    Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole

  • Training of a neural network model for predicting electric motor failure using the example of AIMU 112 MV6 U1

    A method of applying mathematical analysis and machine learning to organize predictive maintenance of an electric motor is considered using the example of the AIMU 112 MV6 U1 electric motor. A comprehensive technique for diagnosing the technical condition of an electric motor based on the analysis of vibration signals recorded by a three-axis accelerometer is proposed, which can be adapted to monitor the condition of various types of rotating equipment in industrial conditions.

    Keywords: predictive maintenance, electric motor, vibration analysis, machine learning, neural networks, fault diagnosis, accelerometer, condition classification

  • A system model for detecting SQL injections based on a combined analysis of query syntax structures and behavioral characteristics

    The article presents a systematic study of information flows in the "application-DBMS" link and proposes a comprehensive model of protection against SQL injections based on multi-level analysis. The system analysis considers the full cycle of query processing, which allows overcoming the fragmentation of existing approaches. The limitations of existing methods based on signature analysis, machine learning, and syntax validation are analyzed. To improve the reliability and accuracy of detection, a new combined method is proposed that integrates static syntax analysis of abstract syntax trees (AST) of queries with dynamic behavioral analysis of sessions. A key feature of the syntax module is the application of the Jaccard coefficient to assess the structural similarity of paths in the AST, which ensures the efficient detection of polymorphic injections. The behavioral module analyzes the temporal and statistical patterns of the query sequence, which allows.

    Keywords: SQL injections, system analysis, machine learning, parsing, abstract syntax tree, behavioral analysis, Jaccard coefficient, polymorphic attacks, time-based attacks

  • A Method for Filtering Speckle Noise in Synthesis Aperture Radar Images Based on Wavelet Transform and Non-local Means

    This article describes a method for filtering speckle noise from synthetic aperture radar images using wavelet transforms and nonlocal means. The proposed method utilizes a spatial-frequency representation of the image and analyzes the similarity of local wavelet coefficient structures in subbands. Experimental results demonstrate that the developed method outperforms some known methods in terms of metrics such as mean square error, peak signal-to-noise ratio, and structural similarity index, as well as subjective visual assessment. The method effectively filters speckle while preserving fine details, contrasting edges, and correctly restoring background brightness without introducing noticeable artifacts.

    Keywords: radar image, synthetic aperture radar, speckle noise, image filtering, wavelet transform, thresholding, non-local means

  • Maximizing the influence of a social network users' coalition based on approximated centrality metrics and a greedy algorithm

    This paper examines the problem of assessing the influence of social network users and their groups in disseminating information among audiences. Forming a network of user subsets to initiate informational influence is a computationally complex problem with a stochastically uncertain outcome. Existing centrality metrics typically involve searching for all shortest paths in a graph or solving large-scale systemic sources. This paper provides approximate estimates of the influence of individual network participants and their subsets, based on modifications of the Flageolet-Martin algorithm. A greedy algorithm based on electronic metrics is also proposed, enabling coalition formation by iteratively supplementing it with quasi-optimal elements. The obtained results can be applied to problems of information analysis, forecasting, and planning in social networks.

    Keywords: Social network, informational influence, coalition, influence, connection graph, centrality metric, closeness centrality, shortest path, route, approximate estimate, greedy algorithm

  • Methods of differential anonymization of data based on a trustworthy neural network for protecting bank customers personal information

    The article discusses modern methods for protecting bank customers' personal information based on differential anonymization of data using trusted neural networks. It provides an overview of the regulatory framework, analyzes technological approaches and describes a developed multi-level anonymization model that combines cryptographic and machine learning techniques. Special attention is paid to balancing between preserving data utility and minimizing the risk of customer identity disclosure.

    Keywords: differential anonymization, trusted neural network, personal data, banking technologies, information security, cybersecurity

  • The method for optimizing the organizational structure and functionality of employees of the information protection unit operating an automated system in a secure design

    The purpose of the research is to develop a solution that allows optimizing the number and functionality of information security specialists involved in ensuring the information security of an automated system in a secure execution of the organization. The methods used in the article include a description and analysis of various governing documents, professional standards and regulations of the Russian Federation, and a number of scientific author's works that disclose the requirements for the functionality and qualifications of information security specialists. As a result of the work carried out, significant shortcomings were identified in the current regulatory and methodological documents describing the labor actions of personnel ensuring the protection of the facility's information, and a tendency to reduce the number of positions and simultaneously expand the functionality of the remaining employees. The need to comply with the qualification requirements for the reliable functioning of an automated system in a secure design and the exclusion of the "human" factor in information security incidents is emphasized. A new, optimal organizational structure of the department responsible for monitoring the protection of information circulating in an automated system is proposed, and the job responsibilities and areas of responsibility of the automated system administrator and the information security administrator are specified in detail. The solution presented in this paper can be used for daily information security in any automated system for various organizations. It emphasizes the importance of improving the skills and unifying the competencies of information security workers to ensure their interchangeability and reduce the risks associated with lack of control if highly specialized employees are excluded, which will increase the stability and effectiveness of the information security system at the enterprise.

    Keywords: information security, administrator, staffing, functionality of information security personnel, automated system in a secure design