×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • Planning structure and security of buildings of foreign embassies, consulates and diplomatic missions

    Abstract. The article examines the spatial planning solutions of buildings of foreign embassies from the point of view of general security, access control, protection from terrorist acts and other types of criminal encroachments. The relevance of the work is increasing as public safety in general and the growing tension in international relations become increasingly important. The main goal is to study architectural solutions, dividing the planning structure by access levels and identifying the most characteristic protective means used by designers. The object of the study is the buildings of embassies, the subject is their layout and functional zoning. As a research method, an analysis of modern buildings is carried out, divided into groups depending on the planning organization and volumetric structure. The examples demonstrate exactly how a volumetric structure can meet security requirements, how architectural techniques for separating human flows, restricting and controlling access, and others are used.

    Keywords: consulate, security, surveillance, planning, atrium, anti-terrorism, embassy, ​​architecture, control, protection

  • Modern tools used in the formation of intelligent control systems

    Modern intelligent control systems (ICS) are complex software and hardware systems that use artificial intelligence, machine learning, and big data processing to automate decision-making processes. The article discusses the main tools and technologies used in the development of ICS, such as neural networks, deep learning algorithms, expert systems and decision support systems. Special attention is paid to the role of cloud computing, the Internet of Things and cyber-physical systems in improving the efficiency of intelligent control systems. The prospects for the development of this field are analyzed, as well as challenges related to data security and interpretability of models. Examples of the successful implementation of ICS in industry, medicine and urban management are given.

    Keywords: intelligent control systems, artificial intelligence, machine learning, neural networks, big data, Internet of things, cyber-physical systems, deep learning, expert systems, automation

  • Technical science. Informatics, computer facilities and management

  • The use of digital resources to ensure transport security

    An optimization model has been developed for the minimum required number of employees carrying out transport security measures included in transport security units, taking into account the algorithm for distributing employees, including various groups according to individual functions performed at different security levels, as well as the likelihood of various threats to transport security.

    Keywords: transport strategy, digitalization of transport security, cost optimization, transport security units, requirements for ensuring transport security

  • Using the determining the similarity of words method to evaluate text vectorization algorithms

    The article presents the existing methods of reducing the dimensionality of data for teaching machine models of natural language. The concepts of text vectorization and word-form embedding are introduced. The task of text classification is being formed. The stages of classifier training are being formed. A classifying neural network is being designed. A series of experiments is being conducted to determine the effect of reducing the dimension of word-form embeddings on the quality of text classification. The results of evaluating the work of trained classifiers are compared.

    Keywords: natural language processing, vectorization, word-form embedding, text classification, data dimensionality reduction, classifier

  • Performance analysis of cloud storage systems based on queuing models

    The paper discusses the use of the M/M/n mass service model to analyze the performance of cloud storage systems. Simulations are performed to identify the impact of system parameters on average latency, blocking probability, and throughput. The results demonstrate how optimizing the number of servers and service intensity can improve system performance and minimize latency. The relevance of the study is due to the need to improve the performance of cloud solutions in the context of growing data volumes and increasing load on storage systems.

    Keywords: cloud storage, mass service theory, M/M/n model, Python, modeling, performance analysis

  • Digitalization of the police: creation of the chatbot "Service-02"

    The article discusses the development of the 'Service-02' chatbot, designed to receive and register reports of crimes, administrative offenses, and incidents at the police station. The algorithm of the chatbot's operation, its architecture, and main functional capabilities are described. Particular attention is paid to the advantages of using the chatbot to improve the efficiency and quality of interaction between citizens and law enforcement agencies. The stages of development and prospects for further system development are analyzed. The article highlights the significance of digitalization in police work and its impact on improving public safety.

    Keywords: chatbot, duty unit, Ministry of the Interior of Russia, police, digitalization, Service-02, internal affairs agencies, Telegram

  • Development and Analysis of a Feature Model for Dynamic Handwritten Signature Recognition

    In this work, we present the development and analysis of a feature model for dynamic handwritten signature recognition to improve its effectiveness. The feature model is based on the extraction of both global features (signature length, average angle between signature vectors, range of dynamic characteristics, proportionality coefficient, average input speed) and local features (pen coordinates, pressure, azimuth, and tilt angle). We utilized the method of potentials to generate a signature template that accounts for variations in writing style. Experimental evaluation was conducted using the MCYT_Signature_100 signature database, which contains 2500 genuine and 2500 forged samples. We determined optimal compactness values for each feature, enabling us to accommodate signature writing variability and enhance recognition accuracy. The obtained results confirm the effectiveness of the proposed feature model and its potential for biometric authentication systems, presenting practical interest for information security specialists.

    Keywords: dynamic handwritten signature, signature recognition, biometric authentication, feature model, potential method, MCYT_Signature_100, FRR, FAR

  • The effect of data replacement and expansion using transformations on the recognition accuracy of the deep neural network ResNet - 50

    The article examines how the replacement of the original data with transformed data affects the quality of training of deep neural network models. The author conducts four experiments to assess the impact of data substitution in tasks with small datasets. The first experiment consists in training the model without making changes to the original data set, the second is to replace all images in the original set with transformed ones, the third is to reduce the number of original images and expand the original data set using transformations applied to images, and also in the fourth experiment, the data set is expanded in order to balance the number of images There are more in each class.

    Keywords: dataset, extension, neural network models, classification, image transformation, data replacement

  • Development of an integrated method for assessing the security level of an organization's server infrastructure

    Information security management at the enterprise is an important task, as the number of threats is growing and constant improvement of protection mechanisms is necessary. The server infrastructure of the enterprise is used to publish corporate services and the requirements for it are high in terms of performance, reliability and security. This article discusses the developed method of integral assessment of the level of security of the server infrastructure of the enterprise from attacks of various types.

    Keywords: data protection, information technology, comprehensive assessment, systems analysis, information systems, information security

  • Neural networks with wavelet transform in the task of detection of overwater objects under low visibility conditions

    This paper considered the problem of detection and classification of surface objects in low visibility conditions such as rain and fog. The focus is on the application of state-of-the-art deep learning algorithms, in particular the YOLO architecture , to improve detection accuracy and speed. The introduction to the problem includes a discussion of the limitations of visibility degradation, the change in shape and size of objects depending on the viewing angle, and the lack of training data. The paper also presents the use of discrete wavelet transform to improve image quality and increase the robustness of the systems to adverse conditions. Experimental results show that the proposed algorithm achieves high accuracy and speed, which makes it suitable for application in drone video monitoring systems.

    Keywords: YOLO, wavelet transform, overwater objects, drones, low visibility condition, Fourier transforms, Haar

  • Implementation adaptation of extreme filtering to real time

    In the work describes the extreme filtering method and the author's approaches that allow adapting it to work in real time: frame-by-frame processing and the method with signal loading. Further, solutions are presented that can be used to implement the above on real devices. The first solution is to use the Multiprocessing library for the Python language. The second approach involves creating a client-server application and sending asynchronous POST requests to implement the frame-by-frame signal processing method. The third method is also associated with the development of a client-server application, but with the WebSocket protocol, not HTTP, as in the previous approach. Then, the results are presented, and conclusions are made about the suitability of the author's approaches and solutions for working on real devices. It is noted that the solution based on the use of the WebSocket protocol is of particular interest. This solution is suitable for both the frame-by-frame signal processing method and the method with value loading. It is also noted that all approaches proposed by the author are workable, which is confirmed by the time values ​​and the coincidence of the graphs.

    Keywords: extreme filtering, frame-by-frame signal processing method, method with value loading, Multiprocessing, HTTP, WebSocket, REST, JSON, Python, microcontrollers, single-board computers

  • Application of scheduling theory to solve the problem of personnel training

    The article is devoted to the development of a methodology for forming student groups to optimize learning. The study includes a mathematical model and methods for its optimization. The development of a key model for optimizing the schedule and improving learning efficiency is planned.

    Keywords: class scheduling, scheduling algorithms, class schedule, academic workload, automated information system, computer simulation experiments, resource allocation

  • Modeling Paid Parking Occupancy: A Regression Analysis Taking into Account Customer Behavior

    The article describes the methodology for constructing a regression model of occupancy of paid parking zones taking into account the uneven distribution of sessions during the day and the behavioral characteristics of two groups of clients - the regression model consists of two equations that take into account the characteristics of each group. In addition, the process of creating a data model, collecting, processing and analyzing data, distribution of occupancy during the day is described. Also, the methodology for modeling a phenomenon whose distribution has the shape of a bell and depends on the time of day is given. The results can be used by commercial enterprises managing parking lots and city administrations, researchers when modeling similar indicators that demonstrate a normal distribution characteristic of many natural processes (customer flow in bank branches, replenishment and / or withdrawal of funds during the life of replenished deposits, etc.).

    Keywords: paid parking, occupancy, regression model, customer behavior, behavioral segmentation, model robustness, model, forecast, parking management, distribution

  • Software for calculating the surface characteristics of liquid media

    Software has been developed to evaluate the surface characteristics of liquids, solutions and suspensions in the Microsoft Visual Studio environment. The module with a user-friendly interface does not require special skills from the user and allows for a numerical calculation of the energy characteristics of the liquid in a time of ~ 1 second: adhesion, cohesion, wetting energy, spreading coefficient and adhesion of the liquid composition to the contact surface. Using the example of a test liquid - distilled water and an initial liquid separation lubricant of the Penta-100 series, an example of calculating the wetting of a steel surface with liquid media is demonstrated. Optical microscopy methods have shown that good lubrication of the steel surface ensures the formation of a homogeneous, defect-free coating. The use of the proposed module allows for an express assessment of the compatibility of liquid formulations with the protected surface and is of interest to manufacturers of paint and varnish materials in product quality control.

    Keywords: computer program, C# programming language, wetting, surface, adhesion

  • Analysis of the feasibility of using fractional-degree regulators in a control system of parallel robot

    within the framework of the conducted research, the task of controlling a robot of a parallel structure was considered. This paper presents a model of a 3-RPR type flat parallel robot in the Matlab package, developed for conducting computational experiments. Implementation of two types motion trajectories have been simulated in order to determine the optimal structure of the position regulators of the drive joint used in the robot control system. Six structure of regulators were compared: three classical ones: PD, PID, PDD and three of their fractional-degree analogues: FOPD, FOPID, FOPDD. The FOMCON tool was used to model fractional-degree regulators. The best results for type 3-PPR robot were shown by a control system with a FOPID regulator, which indicates the expediency of using fractional-degree regulators to control parallel robots.

    Keywords: parallel robot, inverse kinematics problem, 3-RPR robot, computational experiment, working out the trajectory of movement, control system accuracy, fractional-degree regulator, parametric optimization of the regulator, comparative modeling, FOMCON tool

  • Implementation of the algorithm for updating the lists of cancelled certificates of the certifying center

    The most important problem in using an electronic signature is updating the lists of revoked certificates. Currently, there is no single solution to automate this process. This paper presents one of the solutions to this problem using the example of integrated use of the capabilities of the operating system, cryptography tools and standard certificate management libraries.

    Keywords: information security, software, lists of revoked certificates

  • Technical science. Building and architecture

  • Strength of concrete under dynamic loading under uniaxial and biaxial compression conditions

    The paper presents the methodology and results of experimental studies of concrete strength under uniaxial and biaxial compression under dynamic impact. The research results are presented in the form of illustrative tables and graphs. The effect of loading rate and the second principal stress on concrete strength is assessed. Ways for further research development are proposed. The studies have shown that under both static and dynamic loading, the type of stress state and the stress level σ2 significantly affect the strength of concrete. The most noticeable increase in strength occurs during the transition from uniaxial compression to biaxial, even with a small value of the second principal stress σ2. With an increase in the level of lateral compression from 0.2Rb to 0.6Rb, the strength of concrete also increases. Thus, the increase in strength at σ2 = 0.6Rb both under statics and dynamics is more than 40% compared to the strength in uniaxial tests with the corresponding loading rate. The type of stress state and the level of lateral compression affect the dynamic hardening coefficient, but to a lesser extent than the loading rate. A slight increase in k_(b,v) (σ_2) compared to kb,v was observed under biaxial compression with a lateral compression level of 0.4Rb and 0.6Rb.

    Keywords: concrete, strength, strength criterion, experimental study, uniaxial compression, biaxial compression, dynamic loading, dynamic hardening coefficient

  • Analysis of contemporary domestic and international experience in designing children's development centers. Urban planning and spatial planning aspects of design

    This article is devoted to the study of domestic and international experience in designing children’s educational centers. The purpose of the study is to identify urban planning and spatial-planning aspects of design, as well as trends and approaches to designing children’s educational centers, taking into account the specific features of architectural development.

    Keywords: education, design, leisure, culture, planning solution, structure, multifunctionality, unique facility, environment, public space

  • Improving the processes of concreting monolithic structures

    The article reveals the topic of improving the processes of concreting monolithic structures. An absentee survey of respondents from among the existing manufacturers of works, construction control engineers and foremen was conducted. Information was obtained that is not always reflected in documentary sources or direct observation. The direct processes of transportation, feeding, laying and care of the concrete mix, as well as related processes, were monitored and analyzed.

    Keywords: technologies, organization, technological process, concrete works, monolithic structures, operational control, construction control, economic potential

  • The dependence of the specific deflation of grain dust on the air flow velocity

    This article presents a study of the dependence of the deflation of fine grain dust on the air flow rate, as well as other factors affecting it. This study is important for the summary calculation of the dispersion of emissions of harmful substances from unorganized sources of enterprises into the atmospheric urban air, as well as for the selection of dust suppression measures and a better understanding of the processes of dust propagation.

    Keywords: grain dust, dispersed composition, aerodynamic characteristics, specific deflation, dust propagation, atmospheric air

  • Investigation of parametric dependencies in the safe operation of cylindrical mesh shells

    The article discusses the parametric dependencies of cylindrical rod shells in terms of their effect on the state of force and movement of nodes in the grid area. Critical condition factors are analyzed, taking into account the degree of cell filling and the magnitude of the discrepancy between the specified characteristics. The analysis of the formative parameters is carried out and the rational limits of their possible use are established. The factor of taking into account the size of the cell with the location of the rods inside the faces has been introduced. The basic ratios are obtained and the degree of sensitivity of the calculated models to changes in geometric shape is estimated. The limiting angle of the outlined circle has been found, beyond which the operation of the structure is impossible. The level of dangerous increase in the total parameter along the arc at the lowest possible height of the structure has been determined.

    Keywords: cylindrical rod shells, mesh area, degree of cell filling, parametric dependencies, force state, stiffness

  • Optimization of the composition of fast-hardening heavy cement concretes with a complex additive from industrial waste

    Optimization of the composition of heavy cement concretes modified with a complex additive based on industrial waste (alumina-containing component - aluminum slag (ASH), spent molding mixture (OFS) using the PlanExp B-D13 software package is a three-factor planned experiment, according to the criteria: compressive strength on the 2nd and 28th days of hardening.

    Keywords: heavy cement concretes, fast-hardening concretes, optimization, experiment planning, strength indicators, industrial waste, spent molding mixture, aluminum slag