×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Investigation of protection of the control command transmission channel from interception in unmanned aircraft

    The article presents the results of a study of the security of the command transmission channel for unmanned aircraft (UAV) using the example of an FPV drone. The research was carried out in an anechoic shielded chamber of a specialized landfill with certified measuring equipment. The results of measurements of the spectral panorama and the possibility of passive interception of signals in the radio are presented. The relevance of ensuring safe operation of the UAV is shown, as well as the vulnerability of the ELRS protocol to control interception. Recommendations on the use of cryptographic algorithms to neutralize security threats are given.

    Keywords: unmanned aircraft, UAV, FPV drone, ExpressLRS, FHSS, SDR receiver, safe operation, information protection, vulnerabilities, unauthorized access, control interception, identification phrase

  • The role of architecture in shaping the pilgrimage experience

    This article explores the mutual influence between the phenomenon of pilgrimage and the architecture of sacred structures on the Way of St. James to Santiago de Compostela, a route that gained paramount importance for European Christians after the Holy Land sites became inaccessible in the Middle Ages. The primary objective is to analyze how the architectural design of churches actively shaped the psychological and spiritual experience of pilgrims. The study employs Richard Sennett's concept of "Mind-Sight" (Умо-Зрение) as its theoretical framework, which posits that spatial perception is formed through movement, tactile sensations, and interaction with the environment, rather than through visual contemplation alone. The research is grounded in the examination of specific case studies along the route, including the churches of Le Puy-en-Velay, Rocamadour, Cahors, Burgos, Oviedo, and the Cathedral of Santiago de Compostela. The authors demonstrate that these churches functioned as multi-level shelters—providing physical protection, ecclesiastical sanctuary, and divine refuge—which directly determined their architectural appearance. Through massive walls, stone vaults, elevated locations, or integration into caves, the architecture evoked feelings of security, reverence, and humility. The study concludes that these structures were not passive backdrops but active participants in the pilgrim's journey, transforming the pilgrimage into a continuous architectural and psychological experience that prepared the traveler for the final encounter with the sacred.

    Keywords: the Way of St. James, pilgrimage churches, medieval architecture, Gothic architecture, Romanesque architecture

  • Deception platform - its functionality criteria, strengths and weaknesses, trends

    The purpose of the article is to review the criteria that affect the functionality of the platform to deceive attackers, to identify the strengths and weaknesses of the technology, to consider current trends and areas for further research. The method of study is analysis of existing articles in peer-reviewed Russian and foreign sources, aggregation of research, and formation of conclusions based on the analyzed sources. The article discusses basic and situational metrics to consider when selecting and evaluating a trap - cost of implementation, design complexity, risk of compromise, data collected, strength of deception, available connections, false positive rate, attack attribution, attack complexity, time to compromise, diversity of interactions, early warning, effectiveness of attack repellency, impact on attacker behavior, threats detected by the trap, resilience. A breakdown of the strengths and weaknesses of Deception technology, which are worth paying attention to when using it. Deception platform development trends are reviewed, as well as areas of research in which the platform is under-researched.

    Keywords: false target infrastructure, deception platform, honeypot, honeytoken, honeynet

  • Verification of the ring algorithm for distributed systems using the specification language of the temporal logic of actions

    The article is devoted to the problem of verification of distributed algorithms using formal methods. The classical leader selection algorithm in ring topology, the ring algorithm, is chosen as the object of research. For its analysis, the specification language of the Temporal Logic of Actions (TLA+) is used. The paper presents a detailed formal model of the algorithm, describing its states and transitions, taking into account the features of distributed systems, such as the lack of shared memory. The key properties of correctness are formulated and proved: the uniqueness of the leader (the property of security), the finality of elections (the property of liveliness) and consent. The correctness of the specification was confirmed using the model model verifier of the language of temporal logic of actions, which exhaustively checked all achievable states for the model with three processes. The results demonstrate the effectiveness of the Time Logic Specification language (TLA+) for providing a high degree of confidence in the reliability of distributed systems.

    Keywords: formal verification, distributed systems, ring algorithm, leader selection, specification language for temporal logic of actions, model verification, security properties, vivacity properties.formal verification, distributed systems, ring algorithm

  • Methodology of preliminary assessment of frost resistance of elastomeric materials for transport facilities: theoretical approach and analysis of results

    Due to the active development of the Northern and Arctic regions, modern damping materials for transport and construction infrastructure are subject to increased demands in terms of performance at low ambient temperatures. Theoretically, it has been shown that the restriction of segmental mobility and cold crystallization of polymers lead to an increase in stiffness and a decrease in damping and sealing functions. Formulations evolve through a controlled combination of base polymers, the introduction of "smart" fillers, technologically active additives, and the hybridization of elastomeric matrices. The evaluation of the low-temperature performance of elastomers is carried out based on the results of regulatory operational tests that simulate the maximum operating conditions of the product, and thermoanalytical / viscoelastic methods that reveal the physical nature of the transition to vitrification. However, these methods often lead to disparate results, are quite complex and require special high-precision equipment. In this regard, a method is proposed for rapid assessment of the low-temperature performance of elastomers based on the temperature dependence of Shore A hardness with the allocation of the T*hard criterion (fracture HRA(T)), which correlates with the glass transition temperature Tg, the brittleness temperature and the coefficient of frost resistance. The approbation was carried out on six polymer compositions of different nature, which showed that rubber elastomers (TPRK/TPRK-D) retain a highly elastic state up to minus 60 ° C (without the HRA(T) plateau), while thermoplastics demonstrate a sharp increase in hardness with saturation from minus 20 ° C, which indicates glass transition and limitation of use at lower temperatures. Statistical consistency (σ ≤ 3.6 units Shore A) confirms the reliability of the method. The proposed method is technologically advanced, recipe-sensitive, and suitable for primary ranking of frost resistance of seal and damper materials.

    Keywords: elastomers, low-temperature performance, glass transition temperature, temperature limit of brittleness, coefficient of frost resistance, express assessment of low-temperature performance of elastomers based on the temperature dependence of Shore A

  • Wastewater treatment plants in civil engineering

    The article is devoted to the design of local treatment facilities in the city of Borovsk, Kaluga Region. Treatment facilities play an important role in the modern world. They are necessary for processing wastewater so that it becomes safe for the environment and can be discharged into water bodies or drainage networks. Since the discharge of untreated water can cause irreparable harm to the ecosystem, it is important to provide treatment facilities in the sewerage system of the settlement. The article considers the tasks and importance of treatment systems, their role in the life of modern cities, and also presents in detail the step-by-step organization of work on the device of local treatment systems and their subsequent commissioning

    Keywords: wastewater treatment plants, ecosystem, water disposal, wastewater, modular structures

  • A building that has transcended centuries

    The article examines the Lepeshinsky House in Nalchik as a significant architectural and cultural heritage site. It describes the historical aspects of its construction in the late 19th century, architectural features and artistic elements that make the building unique. The authors emphasize the importance of preserving this monument for future generations and its role in shaping the cultural identity of the region. The article also discusses current problems of the building’s operation and plans for its restoration aimed at restoring its historical appearance and preventing further destruction. Key aspects include the need to protect cultural heritage and draw public attention to the significance of such objects for the history and culture of the people.

    Keywords: Lepeshinsky House, Nalchik, architectural heritage, cultural heritage, historical building, restoration, preservation, architectural features, mansion, Kabardino-Balkarian Republic

  • The methodology of choosing the location of industrial zones for territorial planning purposes (using the example of the Zhukovsky Industrial Park in Zhukovsky, Moscow Region

    In territorial planning, the choice of industrial territories is crucial for the state. The advantageous location will allow for the creation of labor application points to ensure stable economic growth. Understanding and taking into account the parameters of the formation and further functioning of such territories always require an integrated approach, that is, taking into account both economic and social, spatial and environmental factors. When planning, the accessibility of transport infrastructure, the availability of raw materials, tax incentives and other economic incentives can be key when choosing a particular area for the location of industrial facilities on it. An integrated approach can become especially relevant not only when planning new undeveloped territories, but also when converting existing large production areas.

    Keywords: socio-economic development, comprehensive assessment, factors of the urban planning system, industrial park, industrial zone

  • Comparative analysis of ResNet18 and ResNet50 neural network resilience to adversarial attacks on training sets

    This article is devoted to a comparative analysis of the resilience of ResNet18 and ResNet50 neural networks to adversarial attacks on training sets. The issue of the importance of ensuring the safety of learning sets is considered, taking into account the growing scope of artificial intelligence applications. The process of conducting an adversarial attack is described using the example of an animal recognition task. The results of two experiments are analyzed. The purpose of the first experiment was to identify the dependence of the number of epochs required for the successful execution of an adversarial attack on the training set on the neural network version of the ResNet architecture using the example of ResNet18 and ResNet50. The purpose of the second experiment was to get an answer to the question: how successful are attacks on one neural network using modified images of the second neural network. An analysis of the experimental results showed that ResNet50 is more resistant to competitive attacks, but further improvement is still necessary.

    Keywords: artificial intelligence, computer vision, Reset, ResNet18, ResNet50, adversarial attacks, learning set, learning set security, neural networks, comparative analysis

  • System for detecting voice deepfake attacks

    This paper addresses the limited accuracy of existing automatic systems for detecting deepfake audio content in real time. A solution is proposed to increase the efficiency of detecting signs of deepfake use by improving neural network models and algorithms for analyzing audio recordings of human voices. An algorithm and corresponding software for a voice attack detection system have been developed. For training and testing, datasets were created containing real voice audio recordings and deepfake audio samples. Evaluation on a real-world test set demonstrated an accuracy rate of 83%, confirming the effectiveness and practical applicability of the proposed solution in combating audio deepfake threats.

    Keywords: deepfake, speech audio signal, machine learning models, convolutional neural network, vishing

  • The actor model in the Elixir programming language: fundamentals and application

    The article explores the actor model as implemented in the Elixir programming language, which builds upon the principles of the Erlang language. The actor model is an approach to parallel programming where independent entities, called actors, communicate with each other through asynchronous messages. The article details the main concepts of Elixir, such as comparison with a sample, data immutability, types and collections, and mechanisms for working with the actors. Special attention is paid to the practical aspects of creating and managing actors, their interaction and maintenance. This article will be valuable for researchers and developers interested in parallel programming and functional programming languages.

    Keywords: actor model, elixir, parallel programming, pattern matching, data immutability, processes, messages, mailbox, state, recursion, asynchrony, distributed systems, functional programming, fault tolerance, scalability

  • Calculation of the area of ​​the image of a flat region using mathematical analysis methods

    The paper proposes a method for calculating the area of a flat area from a photograph based on the use of mathematical analysis methods. To calculate the area, a curved integral of the second kind is used along a closed contour bounding the area under consideration. Defining the boundary in the form of a Bezier spline reduces the calculation of a curved integral to the calculation of several definite integrals from the Bernstein basis polynomials. An explicit form is obtained for integrals of Bernstein basis polynomials. For a third-order Bezier spline, a formula is derived for calculating the area of the area in terms of the coordinates of the reference points of the Bezier curves.

    Keywords: cubic spline, Bernstein basis polynomials. Bezier curve, Bezier spline, Green's formula, beta function, gamma function

  • Methods and Technologies for Developing Digital Twins for Industrial Internet of Things Systems

    Digital twin technology shows significant potential in transforming various industries by enabling the modeling, analysis, and optimization of complex systems in real time. The integration of digital twin with the Industrial Internet of Things has opened up new opportunities for innovation and efficiency. In this regard, this article describes the methods and technologies that can be used to develop digital twins in Industrial Internet of Things applications and systems. Special attention is paid to such methods as: multiphysics and multiscale modeling, system life cycle method, data-driven modeling. Some technologies and architectures that can be used at three levels of creating a digital twin for Industrial Internet of Things systems are also described.

    Keywords: digital twin, model, system, data, architecture, Industrial Internet of Things, communication, network, analysis, sensors

  • Fortifications of Kabarda of the medieval period

    The ancient fortress located on the territory of the prince's estate of Zabota, on the left bank of the Chegema River, currently located between Lechinkai and Chegem II, is the subject of this article. The article examines the unique Kabardian stone structures, analyzes their distinctive characteristics and compares them with typical stone buildings of the late Middle Ages in Kabardino-Balkaria. In addition, the article examines how the culture and traditions of the region influenced the design of stone products, as evidenced by the architectural solutions used in the construction. The research conducted in this article focuses on the study of archaeological finds in order to reconstruct the history of a particular region and track socio-cultural changes that have occurred over a long period of time. The scientific basis of this study is based on materials collected in museums and bibliographic research.

    Keywords: architecture, fortress, hillforts, fortifications, settlements, residence, fortification, stone structure, North Caucasus, Kabarda

  • Automated control system of regional electric networks

    This article is devoted to the issues of implementation of automated control system of regional electric networks based on intelligent technologies. The significance of the issue under consideration is expressed in the fact that along with the development of technologies and their active use, electric loads in networks where large losses of electric power occur are increasing. Some issues of increasing the efficiency of production and consumption of energy resources at the regional level are considered. The main elements of the system approach to the analysis of the automated process control system of the regional energy system (APCS RES) are described. An example of the design and implementation of a pilot project for the introduction of intelligent technologies in the electrical networks of the Chechen Republic, in particular in the electrical networks of the city of Argun, is given. The most significant entities of the regional electric power industry are considered, which determine the process of functioning of the automated process control system of the power grid, as well as those that have or are capable of having an impact on the structure and process of functioning of the automated process control system of the power grid, where the degree of influence, situations and moments of influence for all the entities given are absolutely different. The conducted methodology of forming entities represents their dependence on each other to varying degrees.

    Keywords: electricity metering, electrical network, intelligent technologies, automated process control system, regional energy system, electricity tariff