The article discusses the current threats posed by unmanned aerial vehicles and their impact on the development of the legal and regulatory framework for construction safety in Russia. Based on an analysis of regulatory documents, the article explores the phenomenon of law substitution and the obsolescence of the legal and regulatory framework for construction safety. The author proposes an initial approach to addressing these issues by modernizing the legal framework for building and structure safety. To achieve this, the author has formulated new concepts that are recommended for inclusion in the key law and that lay the foundation for a new institution of unmanned (anti-drone) security in the construction industry.
Keywords: regulatory legal act, regulatory technical act, law replacement, unmanned aerial vehicle, threat of an unmanned aerial vehicle, unmanned anti-drone security, unmanned danger
Electrocardiogram (ECG)-based biometric authentication systems offer intrinsic resistance to spoofing due to their physiological uniqueness. However, their performance in dynamic real-world settings, such as wearable devices or stress-induced conditions, is often compromised by noise, electrode displacement, and intra-subject variability. This study proposes a novel hybrid framework that enhances robustness, ensuring high authentication accuracy and reliability in adverse conditions, through integrated wavelet-based signal processing for noise suppression and a deep-learning classifier for adaptive feature recognition. The system employs preprocessing, QRS complex detection, distance–deviation modeling, a statistical comparison method that quantifies morphological similarity between ECG templates by analyzing amplitude and shape deviations and an averaging-threshold mechanism, combined with a feedforward Multi-Layer Perceptron (MLP) neural network for classification. The MLP is trained on extracted ECG features to capture complex nonlinear relationships between waveform morphology and user identity, ensuring adaptability to variable signal conditions. Experimental validation on the ECG-ID dataset achieved 98.8% accuracy, 95% sensitivity, an Area Under the Curve (AUC) of 0.98, and a low false acceptance rate, outperforming typical wearable ECG authentication systems that report accuracies between 90% and 95%. With an average processing time of 8 seconds, the proposed method supports near real-time biometric verification suitable for healthcare information systems, telehealth platforms, and IoT-based access control. These findings establish a scalable, adaptive, and noise-resilient foundation for next-generation physiological biometric authentication in real-world environments
Keywords: electrocardiogram biometrics, wavelet decomposition, QRS complex detection, feedforward neural network, deep learning classification, noise-resilient authentication, biometric security
The article discusses methods for automated determination of threshold values of parameters when assessing the critical state of technical systems. It explores the theoretical foundations and practical aspects of setting thresholds, including statistical, expert, and combined approaches. Particular attention is paid to mathematical models and algorithms for processing monitoring data. Various methods for determining threshold values are presented: computational, experimental, statistical, and expert. The features of applying adaptive thresholds, dynamic control, and machine learning systems are described. An analysis of existing approaches to determining critical conditions of equipment is conducted. Recommendations are developed for selecting optimal methods for determining thresholds, taking into account the specifics of technical systems. Comprehensive solutions are proposed that combine analytical and machine methods to improve the reliability and safety of computing complexes.
Keywords: automated control, threshold values, technical diagnostics, critical state, computing systems, machine learning, statistical analysis, expert systems, equipment monitoring, technical safety
The purpose of the article is to study the possibility of the influence of various factors affecting the process of eliminating a water pipeline accident based on its modeling using fuzzy logic methods. The article discusses various options for managing the process of eliminating a water pipeline accident and, during the analysis, determines a set of qualitative parameters that are used in the fuzzy inference model based on the Mamdani method. To build a mathematical model, 37 products were formulated with the help of a group of experts, so that the model can work with selected qualitative variables as with quantitative ones and track the changes that occur in the process. The result of the inference cycle is a clear value of the parameters describing the possible actions necessary to eliminate the accident. The resulting mathematical model allows you to analyze the input parameters at a qualitative level, gives a qualitative representation of the result at the output, which will increase the effectiveness of actions aimed at eliminating a water pipeline accident. The quality of functioning of the described model is verified by a group of experts.
Keywords: fuzzification, defazziification, Mamdani method, system analysis, fuzzy logic, qualitative parameters, water pipe accident, mathematical model
The article addresses the issues of integration and processing heterogeneous data within a single company as well as during interaction between various participants of business processes under conditions of digital transformation. Special attention is given to collaboration between equipment manufacturers and industrial enterprises, emphasizing the importance of aligning and transforming data when interacting with heterogeneous information systems. The problem of integrating historical data, challenges arising from transitioning to new infrastructure, and a solution based on principles similar to those used by open standards such as OpenCL are discussed. Particular emphasis is placed on providing complete and consistent datasets, developing effective mechanisms for semantic integration, and using ontological approaches to address difficulties in comparing and interpreting diverse data formats. It highlights the necessity of continuously updating metadata dictionaries and establishing connections between different data sources to ensure high-quality and reliable integration. The proposed methods aim at creating sustainable mechanisms for exchanging information among multiple business entities for making informed management decisions.
Keywords: digital transformation, heterogeneous systems, erp/mes systems, ontology, semantic integration, metadata, data mapping
The article examines the unique environment of the historical district of Parusinka in Ivangorod, which has been formed over more than two hundred years. The typology of the architectural and spatial environment has been determined based on a comprehensive analysis; each type of environment has its own unique potential and specific problems. The study highlights the need for an individual and fragmented approach to the revitalization of each territorial unit in order to preserve the "spirit of the place" and comprehensively optimize the district of the border city.
Keywords: Ivangorod, Narva Manufactory, historical environment, architectural and spatial environment, urban environment optimization, reconstruction, place identity
The article describes practical experience in restoring the author's paintings using the example of the Stone Church of the Descent of the Holy Spirit at the Danilovsky Cemetery, Moscow. The purpose of this article is to show specific methodological solutions in the restoration process that help avoid design errors and preserve the historicism of the object. The essence of the restoration problems lies in the fact that there is an extensive scientific base, large scientific libraries, passports of restoration of objects, expert opinions and reviews, which include official data on the object, but do not have a description of the restoration process and descriptions of problems solved during the production process.
Keywords: architecture, restoration, scientific restoration, painting in the temple, cultural heritage sites, authenticity, historicism
An ensemble of models for predicting the position of a mobile robot moving in an unstructured environment is presented. An architecture has been developed that integrates a kinematic motion model with trainable models utilizing elevation map data and semantic segmentation. The principles for constructing a spatial feature map are described, incorporating geometric characteristics such as the terrain roughness index and a fuzzy traversability index. A modular structure of the following blocks is proposed: data preprocessing, geometric property computation, segmentation, and decision-making. Test results demonstrate the advantage of combining kinematic and sensor-based models for autonomous navigation in complex environments.
Keywords: traversability model, elevation map, point cloud, kinematic model, segmentation, machine learning, feature map
Abstract: During the colonial period, the urban development policy of Guangzhou changed dramatically. These changes were the result of the collision and interaction of social, economic, cultural and other factors. This article examines the features of Guangzhou's urban development policy during the colonial period. By identifying and analyzing the features of Guangzhou's urban planning at different times during the colonial period, its changing urban development characteristics are explored. Knowledge of the spatial characteristics of Guangzhou's architectural environment during the colonial period provides a basis for future development of the foundations for the preservation and sustainable development of modern Guangzhou and other cities in China.
Keywords: Guangzhou, colonial period, opium wars, urban development policy, features of urban planning
The article presents research in the form of comparison of safety factors in guy ropes of building structures designed using the limit state method and ropes of mast structures related to power engineering facilities, specified in federal norms and rules. It is demonstrated that the use of safety factors for guy ropes of mast structures, justified by the theory of reliability, allows to effectively solve the problem of assigning rejection criteria for guy ropes, and can be used in developing recommendations for their inspection, technical diagnostics, and operation based on the existing known rejection criteria used for lifting structures.
Keywords: building structures, wooden structures, membrane panel, stress-strain state, radial beam dome, dome, membrane, design, experimental study
The purpose of the study is to develop a platform that allows for various types of checks to identify weaknesses in the subsystems of unmanned automated systems.
Research methods: when developing the platform, a methodology based on the construction of ontological models was used, which made it possible to link the structural and functional characteristics of unmanned automated systems with threats and vulnerabilities, as well as with attacks on such systems. The process parallelization method was used to scan radio frequency ranges. The decision-making system is based on risk assessment methods.
Research results: the platform allows for optimizing the security testing process of unmanned automated systems. For automated testing, a database is used that includes a catalog of structural and functional characteristics, threats, vulnerabilities, and attacks. The platform can determine which types of structural and functional characteristics correspond to the vulnerabilities of unmanned automated systems. A system consisting of individual components (a sensor for scanning unmanned automated systems, an intelligent system for active analysis of unmanned automated systems). The sensor for scanning unmanned automated systems is implemented as a small-sized device. The system of intelligent active analysis of unmanned automated systems is implemented as software.
The scientific novelty lies in the development of a concept for a system for analyzing the safety of unmanned automated systems based on ontological models and radio frequency range analysis to identify system vulnerabilities during pre-operational checks.
Keywords: data analysis, statistics, attacks, risks, unmanned automated systems
The article presents the application of fuzzy modeling to solve the systemic task of qualitative assessment of the properties of land plots by an expert method using fuzzy modeling. The set of factors by which the suitability of the plot is estimated depends on the goals of the development project. The technique includes the decomposition of the model into additive models of internal and external factors and a combining multiplicative model, which reduces the dimensionality of the task of assessing the properties of the plot. At the second stage, a fuzzy model of expert assessment of the properties of land plots is formed. It includes a fuzzyification block using linear membership functions, max-min fuzzy inference technology, and defuzzification using the height method, which most adequately translates fuzzy expert assessments into clear numerical (point) values. At the third stage, the contribution coefficients of each factor in the assessment of the properties of plots are determined using the hierarchy analysis method and the fuzzy pairwise comparison scale.
Keywords: land plot, individual assessment, expert method, fuzzy modeling
Disposal of drilling waste in construction The methods of disposal of drilling waste are considered and the mechanisms of their biological purification by microorganisms are described. A technology for the disposal of biologically purified drilling mud is proposed by manufacturing concrete structures of marine artificial reefs, barrier breakwaters and other products on an offshore platform. Compositions of fine-grained fiber-concrete mixtures have been developed, including Portland cement, biologically purified well drilling waste, basalt fiber fibers and superplasticizer "SP-3". The sufficiently high parameters of the strength characteristics and frost resistance of the obtained fiber concrete compositions have shown the possibility of their use in harsh climatic conditions. materials
Keywords: drilling waste, biodegradation, fine-grained fiber concrete, dispersed reinforcement, mechanical properties, offshore platform
A project is a single system, an interconnected network of elements: participants, resources, processes, and goals. This relationship is critically important for successful implementation by the technical customer service. Processes that are clearly defined and managed ensure consistency and efficiency. Therefore, project design and management requires a systematic approach that takes into account all relationships and strives to optimize each element to achieve a common goal. A system approach is a method that considers a problem or task in terms of its interrelationships and interactions of all elements of the system. In the context of a technical customer service, this approach can be particularly useful for project management, process optimization, and work efficiency improvement.
Keywords: construction project, technical customer, planning, technologies, risks, system approach, project management, documentation of processes, construction site, system
In modern conditions of digital transformation, companies are actively implementing customer Relationship Management systems (CRM systems) to manage customer relationships. However, the issues of data protection, confidentiality and transparency of interaction remain critically important. This article explores the possibilities of using blockchain technology to enhance the security of CRM systems and improve trust between businesses and customers. The purpose of the work is to analyze the potential of using blockchain in data protection of CRM systems, as well as to assess its impact on the transparency of customer transactions. The paper examines the main threats to data security in CRM, the principles of blockchain technology and its key advantages in this context, including decentralization, immutability of records and protection from unauthorized access. Based on the analysis, promising areas of blockchain integration into CRM systems have been identified, practical recommendations for its application have been proposed, and the potential effectiveness of this technology has been assessed. The results of the study may be useful to companies interested in strengthening the protection of customer data and increasing the transparency of user interaction processes.
Keywords: blockchain, CRM-system, security, data protection, transparency, customer interaction