×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Visualization of a scientific hypothesis as a method of it's embodiment in an architectural image

    This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.

    Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole

  • An algorithm for circuit analysis of memristor robustness for use in artificial intelligence devices under conditions of interval uncertainty of parameters

    The article discusses the issues of assessing the robustness of memristor elements in order to increase the reliability of artificial intelligence systems based on nanoelectronic structures. The system of nonlinear equations describing the frequency response of a memristor, the input signals of which can strongly depend on various parameters, cannot be solved using methods accessible to standard mathematics.
    To achieve the result, it is proposed that the system of equations be solved using interval arithmetic methods. The value of intermediate solutions lies in the fact that they provide access to the most reliable solutions to basic problems, taking into account possible changes in the initial and calculated values.
    The main task of interval computing is to replace arithmetic operations and real functions on real numbers with interval operations and functions that transform intervals containing these numbers. In interval calculation, the main object of research is the interval, which is a closed numerical interval. The value of interval calculations lies in the fact that they contain accurate solutions to the initial problems. The interval calculation methods developed to date are based on the use of arithmetic operations with real and complex numbers.
    Using interval calculation can help reduce errors in calculations and data storage in electronic devices. For example, when using memristors to store information, interval calculation can help account for factors affecting data read and write errors. Interval arithmetic allows you to take into account possible errors and uncertainties that may arise during measurements and calculations. This helps to reduce the likelihood of errors and increase the accuracy of forecasting the operation of memristors.
    The proposed algorithm for estimating the robustness of a memristor in the mode, which takes into account significant increases in the nonlinearities of electrical parameters from the point of view of reliability, makes it possible to calculate the characteristics of the developed circuits and reduce the time spent on circuit engineering when searching for the best option.

    Keywords: memristor, multipole, topological graph, finite increments, structural-parametric model, algorithm

  • Identifying deepfake detection features for forming an input recognition vector

    The paper examines the key features of deepfakes and approaches to their recognition using computer vision and machine learning methods. In the course of the study, the signs of deepfake detection were identified and analyzed. Based on priorities, the features that ensure high recognition accuracy were identified and a conclusion was drawn about the significance of each feature.

    Keywords: generative artificial intelligence, disinformation, deepfake, deepfake detector, cybersecurity, fraud, recognition features, analysis, recognition vectors, machine learning, model

  • Context management in integrated development environments based on artificial intelligence using the Cursor IDE as an example

    The article discusses integrated development environments based on artificial intelligence as an innovative programming tool that provides automation of routine software development tasks. The Cursor development environment, developed by Anywhere, is the main object of research. The architectural features of the system are analyzed, including an agent-based approach to interacting with code, context management mechanisms through generation supplemented with extracted data, and code base indexing using vector representations and Merkle trees to optimize updates. The key limitations of modern integrated development environments based on artificial intelligence have been identified: problems with the size of the context window, indexing performance of large repositories, accuracy of context extraction, as well as privacy and security issues. Special attention is paid to the human factor – the lack of competence of developers in the field of effective context management and the creation of high-quality products. The article substantiates the need to create a preliminary context management agent capable of technically optimizing processes and directing users to effective practices of working with integrated development environments based on artificial intelligence.

    Keywords: integrated development environment, artificial intelligence, Cursor development environment, large language models, context management, generation with addition of extracted data, code base indexing, Merkle trees, agent-based approach, software developmen

  • Simulation of a continuous motion trajectory based on nodal feedback data for control with prediction of external load

    The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.

    Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object

  • A decision support model for forest fire response in mountainous areas using fuzzy logic

    This paper presents a decision support model for responding to forest fires in mountainous areas using fuzzy logic. The research methods include the Mamdani method for constructing a fuzzy inference system, the use of linguistic variables to describe environmental conditions and risk factors, and the formation of a rule base based on expert knowledge. The developed model implements the principles of situational management and enables determination of the fire danger level, selection of extinguishing methods, response tactics, and optimal resource allocation. Its practical significance lies in the potential application of the model in decision support systems of the Russian Ministry of Emergency Situations for operational planning and forecasting during forest fire suppression in challenging mountainous conditions.

    Keywords: forest fires, mountainous terrain, fuzzy logic, decision support, intelligent systems, situational management

  • Investigation of protection of the control command transmission channel from interception in unmanned aircraft

    The article presents the results of a study of the security of the command transmission channel for unmanned aircraft (UAV) using the example of an FPV drone. The research was carried out in an anechoic shielded chamber of a specialized landfill with certified measuring equipment. The results of measurements of the spectral panorama and the possibility of passive interception of signals in the radio are presented. The relevance of ensuring safe operation of the UAV is shown, as well as the vulnerability of the ELRS protocol to control interception. Recommendations on the use of cryptographic algorithms to neutralize security threats are given.

    Keywords: unmanned aircraft, UAV, FPV drone, ExpressLRS, FHSS, SDR receiver, safe operation, information protection, vulnerabilities, unauthorized access, control interception, identification phrase

  • Organization of modern lighting for multifunctional exhibition pavilions

    This article examines the potential of modern lighting technologies to address the need to select energy-efficient lighting equipment for outdoor urban portable pavilions. The article analyzes the technical characteristics of the main types of modern lighting systems based on LED and OLED technologies.

    Keywords: artificial lighting, energy saving, LED systems, OLED systems, hybrid systems, energy efficiency, autonomous structures, lighting technologies

  • Methods for automated determination of threshold values of parameters when assessing the critical condition of equipment

    The article discusses methods for automated determination of threshold values of parameters when assessing the critical state of technical systems. It explores the theoretical foundations and practical aspects of setting thresholds, including statistical, expert, and combined approaches. Particular attention is paid to mathematical models and algorithms for processing monitoring data. Various methods for determining threshold values are presented: computational, experimental, statistical, and expert. The features of applying adaptive thresholds, dynamic control, and machine learning systems are described. An analysis of existing approaches to determining critical conditions of equipment is conducted. Recommendations are developed for selecting optimal methods for determining thresholds, taking into account the specifics of technical systems. Comprehensive solutions are proposed that combine analytical and machine methods to improve the reliability and safety of computing complexes.

    Keywords: automated control, threshold values, technical diagnostics, critical state, computing systems, machine learning, statistical analysis, expert systems, equipment monitoring, technical safety

  • Sybil Attack Protection Without Cryptographic Key Distribution

    The relevance of this article stems from the need to develop lightweight and scalable solutions for decentralized systems (blockchain, IoT), where traditional cryptographic methods are inefficient or excessive. A theoretical-practical method for protecting unmanned transportation systems against Sybil attacks has been developed, based on a server robot’s analysis of each client robot’s unique directional electromagnetic signal power map signature. Experimental solutions for Sybil attack protection are demonstrated using two aerial servers deployed on quadcopters. The proposed keyless Sybil attack defense method utilizes WiFi signal parameter analysis (e.g., power scattering and variable antenna radiation patterns) to detect spoofed client robots. Experiments confirm that monitoring unique radio channel characteristics effectively limits signature forgery. This physical-layer approach is also applicable to detecting packet injection in robot Wi-Fi networks. The key advantages of the developed method include the elimination of cryptography, reducing computational overhead; the use of physical signal parameters as a "fingerprint" for legitimate devices; and the method's scalability to counter other threats, such as traffic injection.

    Keywords: protection against Sybil attacks, unmanned vehicle systems, electromagnetic signal power map, WiFi signal, signature falsification, spoofing, and synthetic aperture radar

  • System analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method

    Problem statement. When modeling a complex technical system, the issues of parameter estimation are of primary importance. To solve this problem, it is necessary to obtain a methodology that allows eliminating errors and inaccuracies in obtaining numerical parameters. Goal. The article is devoted to a systematic analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method. The research method. A systematic analysis of the methods of using interval estimates of numerical parameters is carried out. The decomposition and structuring of the methods were carried out. Results. The expediency of using a methodology for describing the parameters of a complex technical system using the interval estimation method is shown. An analysis of the use of various interval estimation models is presented. Practical significance. Application in the analysis and construction of complex systems is considered as a practical application option. The method of estimating the parameters of a complex technical system using the interval estimation method can be used as a practical guide.

    Keywords: interval estimation, parameter estimation, numerical data, fuzzy data, complex technical systems

  • Development of a new mathematical method for modeling a modified radial bearing design taking into account nonlinear factors

    This paper proposes a mathematical model of the laminar flow of a truly viscous lubricant in the clearance of a radial plain bearing with a nonstandard support profile. The influence of a fluoroplastic-containing polymer coating and a groove on the shaft surface is considered, taking into account nonlinear effects, which improves the accuracy of the description of hydrodynamic processes. Thin-film approximations and continuity equations are used to determine the hydrodynamic pressure, load capacity, and friction coefficient. A comparison with existing calculation models demonstrated improved performance prediction. The results demonstrate the feasibility of ensuring stable shaft floatation, confirming the applicability of the developed model for engineering calculations of bearings with a polymer coating and a groove.

    Keywords: radial plain bearing, mathematical modeling, true viscous lubricant, polymer composite coating, hydrodynamic regime, tribotechnical characteristics

  • Development of an environmental monitoring portal

    The article focuses on the development of a web portal for monitoring and forecasting atmospheric air quality in the Khabarovsk Territory. The study analyzes existing solutions in the field of environmental monitoring, identifying their key shortcomings, such as the lack of real-time data, limited functionality, and outdated interfaces. The authors propose a modern solution based on the Python/Django and PostgreSQL technology stack, which enables the collection, processing, and visualization of air quality sensor data. Special attention is given to the implementation of harmful gas concentration forecasting using a recurrent neural network, as well as the creation of an intuitive user interface with an interactive map based on OpenStreetMap. The article provides a detailed description of the system architecture, including the backend, database, and frontend implementation, along with the methods used to ensure performance and security. The result of this work is a functional web portal that provides up-to-date information on atmospheric air conditions, forecast data, and user-friendly visualization tools. The developed solution demonstrates high efficiency and can be scaled for use in other regions.

    Keywords: environmental monitoring, air quality, web portal, forecasting, Django, Python, PostgreSQL, neural networks, OpenStreetMap

  • The complex effect of carbon modifiers and magnetic treatment on the mobility and strength of fine-grained concrete

    The article presents the compositions and technology of preparation of fine-grained concrete using modifying additives and superplasticizers. It is proposed to use waste from thermal power plants in the form of carbon black as a modifying additive. Depending on the amount of soot, parameters of the mobility of the mixture and indicators of compressive and flexural strength were determined. The optimal consumption of soot waste in the amount of 1.0% of the binder weight was established, at which the maximum parameters of the mobility of the mixture and the strength of fine-grained concrete were obtained. The complex effect of soot waste and super-plasticizer on the change in the physical and mechanical properties of concrete is considered. The combined use of soot and a plasticizing additive in a 1:1 ratio contributed to an increase in the mobility and tensile strength of the hardened fine-grained concrete during compression and flexural stress. The method of electromagnetic activation in a linear induction rotator was used to prepare dry mixtures.

    Keywords: fine-grained concretes, soot waste, superplasticizer, electromechanical reinforcement, mobility, strength

  • Technologies for managing practice-oriented and career-oriented activities in the field of engineering education

    The article describes the experience in the field of practice-oriented and career-oriented activities aimed at modernizing modern engineering education, taking into account an interdisciplinary approach. An example of training an engineer of a new formation based on school engineering classes is given. Attention is paid to project activities that can involve students in both creative and production projects. The issues of "career guidance filtering" necessary for selecting the necessary professional qualities of students through a cycle of mini introductory and training cases are highlighted. The emphasis is placed on the contact and information access of parents and schoolchildren to the university's research sector.

    Keywords: management of engineering education, project activities, engineering classes, priority 2030, career guidance activities