The article considers the solution to the problem of increasing the autonomy and accuracy of controlling the movement of a transport trolley is inextricably linked to the accuracy of determining its current location. In this regard, a hardware and software system based on the integration of inertial and visual odometry data has been developed, which makes it possible to compensate for the disadvantages of some navigation methods with the advantages of others.
Keywords: trajectory of the control object, navigation system, inertial odometry, visual odometry, data aggregation, Kalman filter, location determination
This paper discusses a method for countering Sybil attacks in distributed systems based on the analysis of electromagnetic power maps of the temporal characteristics of network traffic. The key hypothesis is that multiple Sybil identifiers controlled by a single attacker node exhibit statistically significant correlation in their network activity patterns, which can be identified using a correlogram. A method for detecting Sybil attacks in wireless networks is proposed based on the analysis of correlograms of electromagnetic signal power maps. The method exploits the statistical properties of power profiles arising from the correlation of network activity of Sybil nodes controlled by a single attacker. A protection system architecture has been developed, including modules for network activity monitoring, correlogram calculation, clustering, and anomaly detection. A set of 10 correlogram parameters is introduced for attack identification, including profile variance, randomness and periodicity coefficients, spectral density, and correlation characteristics. Experimental testing on a millimeter-wave radar station demonstrated detection accuracy ranging from 83.2% to 97.4%. To improve the method's effectiveness, the use of deep neural networks after accumulating a sufficient amount of data is proposed. The proposed method enables the identification and denial of compromised identifiers, increasing the resilience of P2P networks, blockchain systems, and distributed ledgers.
Keywords: Sybil attack, distributed systems security, correlogram, network traffic analysis, time series, autocorrelation, anomaly detection
This article proposes a hybrid method for speckle noise reduction in radar images based on a combination of the wavelet transform and the U-Net neural network (NN) architecture with enhancement of low-frequency components in high-frequency subbands. The wavelet transform decomposes the radar images into frequency subbands, allowing noise to be localized primarily in high-frequency components. These components are processed using a U-Net neural network, whose effectiveness stems from its symmetric structure and skip connections, which allow for the accurate preservation and restoration of important image details. Furthermore, enhancing the low-frequency component in high-frequency subbands to improve the signal-to-noise ratio allows the neural network to more accurately separate useful signal structures from the noise. The combined approach demonstrates high speckle noise reduction efficiency with minimal loss of structural information, outperforming traditional methods in terms of restoration quality and image clarity.
Keywords: speckle noise, noise reduction, wavelet transform, neural networks, U-Net, neural networks, frequency subbands
This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.
Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole
The article discusses the issues of assessing the robustness of memristor elements in order to increase the reliability of artificial intelligence systems based on nanoelectronic structures. The system of nonlinear equations describing the frequency response of a memristor, the input signals of which can strongly depend on various parameters, cannot be solved using methods accessible to standard mathematics.
To achieve the result, it is proposed that the system of equations be solved using interval arithmetic methods. The value of intermediate solutions lies in the fact that they provide access to the most reliable solutions to basic problems, taking into account possible changes in the initial and calculated values.
The main task of interval computing is to replace arithmetic operations and real functions on real numbers with interval operations and functions that transform intervals containing these numbers. In interval calculation, the main object of research is the interval, which is a closed numerical interval. The value of interval calculations lies in the fact that they contain accurate solutions to the initial problems. The interval calculation methods developed to date are based on the use of arithmetic operations with real and complex numbers.
Using interval calculation can help reduce errors in calculations and data storage in electronic devices. For example, when using memristors to store information, interval calculation can help account for factors affecting data read and write errors. Interval arithmetic allows you to take into account possible errors and uncertainties that may arise during measurements and calculations. This helps to reduce the likelihood of errors and increase the accuracy of forecasting the operation of memristors.
The proposed algorithm for estimating the robustness of a memristor in the mode, which takes into account significant increases in the nonlinearities of electrical parameters from the point of view of reliability, makes it possible to calculate the characteristics of the developed circuits and reduce the time spent on circuit engineering when searching for the best option.
Keywords: memristor, multipole, topological graph, finite increments, structural-parametric model, algorithm
The paper examines the key features of deepfakes and approaches to their recognition using computer vision and machine learning methods. In the course of the study, the signs of deepfake detection were identified and analyzed. Based on priorities, the features that ensure high recognition accuracy were identified and a conclusion was drawn about the significance of each feature.
Keywords: generative artificial intelligence, disinformation, deepfake, deepfake detector, cybersecurity, fraud, recognition features, analysis, recognition vectors, machine learning, model
The article discusses integrated development environments based on artificial intelligence as an innovative programming tool that provides automation of routine software development tasks. The Cursor development environment, developed by Anywhere, is the main object of research. The architectural features of the system are analyzed, including an agent-based approach to interacting with code, context management mechanisms through generation supplemented with extracted data, and code base indexing using vector representations and Merkle trees to optimize updates. The key limitations of modern integrated development environments based on artificial intelligence have been identified: problems with the size of the context window, indexing performance of large repositories, accuracy of context extraction, as well as privacy and security issues. Special attention is paid to the human factor – the lack of competence of developers in the field of effective context management and the creation of high-quality products. The article substantiates the need to create a preliminary context management agent capable of technically optimizing processes and directing users to effective practices of working with integrated development environments based on artificial intelligence.
Keywords: integrated development environment, artificial intelligence, Cursor development environment, large language models, context management, generation with addition of extracted data, code base indexing, Merkle trees, agent-based approach, software developmen
The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.
Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object
This paper presents a decision support model for responding to forest fires in mountainous areas using fuzzy logic. The research methods include the Mamdani method for constructing a fuzzy inference system, the use of linguistic variables to describe environmental conditions and risk factors, and the formation of a rule base based on expert knowledge. The developed model implements the principles of situational management and enables determination of the fire danger level, selection of extinguishing methods, response tactics, and optimal resource allocation. Its practical significance lies in the potential application of the model in decision support systems of the Russian Ministry of Emergency Situations for operational planning and forecasting during forest fire suppression in challenging mountainous conditions.
Keywords: forest fires, mountainous terrain, fuzzy logic, decision support, intelligent systems, situational management
The article presents the results of a study of the security of the command transmission channel for unmanned aircraft (UAV) using the example of an FPV drone. The research was carried out in an anechoic shielded chamber of a specialized landfill with certified measuring equipment. The results of measurements of the spectral panorama and the possibility of passive interception of signals in the radio are presented. The relevance of ensuring safe operation of the UAV is shown, as well as the vulnerability of the ELRS protocol to control interception. Recommendations on the use of cryptographic algorithms to neutralize security threats are given.
Keywords: unmanned aircraft, UAV, FPV drone, ExpressLRS, FHSS, SDR receiver, safe operation, information protection, vulnerabilities, unauthorized access, control interception, identification phrase
This article examines the potential of modern lighting technologies to address the need to select energy-efficient lighting equipment for outdoor urban portable pavilions. The article analyzes the technical characteristics of the main types of modern lighting systems based on LED and OLED technologies.
Keywords: artificial lighting, energy saving, LED systems, OLED systems, hybrid systems, energy efficiency, autonomous structures, lighting technologies
The article discusses methods for automated determination of threshold values of parameters when assessing the critical state of technical systems. It explores the theoretical foundations and practical aspects of setting thresholds, including statistical, expert, and combined approaches. Particular attention is paid to mathematical models and algorithms for processing monitoring data. Various methods for determining threshold values are presented: computational, experimental, statistical, and expert. The features of applying adaptive thresholds, dynamic control, and machine learning systems are described. An analysis of existing approaches to determining critical conditions of equipment is conducted. Recommendations are developed for selecting optimal methods for determining thresholds, taking into account the specifics of technical systems. Comprehensive solutions are proposed that combine analytical and machine methods to improve the reliability and safety of computing complexes.
Keywords: automated control, threshold values, technical diagnostics, critical state, computing systems, machine learning, statistical analysis, expert systems, equipment monitoring, technical safety
Abstract: The scope of applying fiber-reinforced concrete in critical load-bearing structures, such as aerodrome pavements, is often limited by insufficient information regarding material behavior and life-cycle economics. This study addresses this gap by developing and evaluating an optimal hybrid mix of micro and macro-basalt fibers consisting of 1.5% and 0.5% of cement mass, respectively for high-performance airfield concrete, followed by a 30-year Life-Cycle Cost Analysis (LCCA). Mechanical testing confirmed the technical feasibility, showing significant performance gains over baseline concrete: 14.5% increase in compressive strength 72.8MPa and 18.2% increase in flexural strength 10.4MPa. These gains are attributed to enhanced durability, multi-scale crack control, and superior post-crack load-carrying capacity. The LCCA, conducted using a 6% discount rate, revealed that the hybrid option, which incurs a 13.03% higher upfront material cost, is economically viable only under the optimistic scenario where the improved durability eliminates the need for major rehabilitation over 30 years. This scenario yields a marginal LCC saving of 4% compared to the baseline. In conservative and moderate scenarios, the upfront cost outweighed the delayed or reduced rehabilitation costs. Overall, Hybrid Basalt Fiber Reinforced Concrete is a promising high-performance material that achieves cost parity if its durability benefits are maximized to prevent major rehabilitation. Future work should involve field trials and expanded LCCA incorporating operational downtime and risk-based performance modeling.
Keywords: aerodrome pavement, basalt fiber, hybrid fiber-reinforced concrete, life-cycle cost analysis, rehabilitation, discount rate, microfiber, macrofiber, net present value
The relevance of this article stems from the need to develop lightweight and scalable solutions for decentralized systems (blockchain, IoT), where traditional cryptographic methods are inefficient or excessive. A theoretical-practical method for protecting unmanned transportation systems against Sybil attacks has been developed, based on a server robot’s analysis of each client robot’s unique directional electromagnetic signal power map signature. Experimental solutions for Sybil attack protection are demonstrated using two aerial servers deployed on quadcopters. The proposed keyless Sybil attack defense method utilizes WiFi signal parameter analysis (e.g., power scattering and variable antenna radiation patterns) to detect spoofed client robots. Experiments confirm that monitoring unique radio channel characteristics effectively limits signature forgery. This physical-layer approach is also applicable to detecting packet injection in robot Wi-Fi networks. The key advantages of the developed method include the elimination of cryptography, reducing computational overhead; the use of physical signal parameters as a "fingerprint" for legitimate devices; and the method's scalability to counter other threats, such as traffic injection.
Keywords: protection against Sybil attacks, unmanned vehicle systems, electromagnetic signal power map, WiFi signal, signature falsification, spoofing, and synthetic aperture radar
Problem statement. When modeling a complex technical system, the issues of parameter estimation are of primary importance. To solve this problem, it is necessary to obtain a methodology that allows eliminating errors and inaccuracies in obtaining numerical parameters. Goal. The article is devoted to a systematic analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method. The research method. A systematic analysis of the methods of using interval estimates of numerical parameters is carried out. The decomposition and structuring of the methods were carried out. Results. The expediency of using a methodology for describing the parameters of a complex technical system using the interval estimation method is shown. An analysis of the use of various interval estimation models is presented. Practical significance. Application in the analysis and construction of complex systems is considered as a practical application option. The method of estimating the parameters of a complex technical system using the interval estimation method can be used as a practical guide.
Keywords: interval estimation, parameter estimation, numerical data, fuzzy data, complex technical systems