This article explores various architectures of neural networks in order to create models in the field of agriculture, with an emphasis on their use in livestock farms. The paper describes the architecture of Kolmogorov-Arnold networks, considers the stages of data collection and preliminary preparation, the learning process of neural networks, as well as their implementation. As a result, models were developed using Kolmogorov-Arnold networks and a multilayer perceptron. The study compared the effectiveness of the proposed architectures. The experiment demonstrates that Kolmogorov-Arnold networks have higher accuracy in predictions, which makes them a promising tool for forecasting. The developed model has been integrated into the livestock information system being developed to predict the growth, health and other indicators of animals, allowing for more accurate management of the growing process.
Keywords: precision animal husbandry, Kolmogorov-Arnold network, modeling, neural network, monitoring, cultivation, data modeling, forecasting
In this paper, we present a study dedicated to implementing a neural network approach to face recognition. We conducted a comprehensive review of existing face recognition methods. We developed a neural network model, trained on the DigiFace-1M dataset. This paper details the architecture of our developed neural network model and the step-by-step training process. The model achieved an accuracy of 78% on the validation set and 92% on the training set. We also addressed the integration of our model into the Russian Amvera Cloud service. As a result, we created a web application that allows users to identify themselves using uploaded images of their faces. This research demonstrates the potential of neural networks for face recognition tasks and offers a practical solution for implementing such systems in various fields.
Keywords: face recognition, deep learning, neural networks, user identification, model architecture, model training, model integration, cloud services, security, biometric technologies
This article presents the results of theoretical research in the field of methods for determining the forces arising in the traction return ropes of the balloon system used in transport, cargo and construction works. The emphasis is placed on the accuracy of the swivel positioning when exposed to a wind flow on the balloon. Theoretical calculations of the main parameters are given, such as: high-speed head, resultant lifting force, rope span, rope force, rope deflection, swivel movement and others. A technique is proposed that allows for a relatively simple and rapid calculation of rope forces in the process of performing cargo operations by an aerostat crane on a construction and installation site.
Keywords: balloon system, balloon crane, traction and return ropes, rope forces, drag, aerial construction and installation work, swivel
The development of business analytics, decision-making and resource planning systems is one of the most important components of almost any enterprise. In these matters, enterprises and production facilities of the penitentiary system are no exception. The paper examines the problem of the relationship between existing databases and statistical reporting forms of the production, economic and labor sectors of the penitentiary system. It has been established that indirectly interrelated parameters are quite difficult to compare due to different data recording systems, as well as approved statistical forms. One of the first steps in solving this problem could be the introduction of a generalized data indexing system. The paper discusses data indexing systems, the construction of their hierarchical structures, as well as the possibility of practical application using SQL. Examples of implementation using ORM technology and the Python language are considered.
Keywords: databases, indexing, ORM, SQL, Python, manufacturing sector, economic indicators, penitentiary system
The article considers modeling of nonlinear electrical conductivity of a biological cell using the equivalent circuit method. The paper proposes a nonlinear model of the electrical conductivity of a biological cell based on the use of nonlinear active and passive elements. The main mechanisms that determine the nonlinear nature of the electrical characteristics of a cell, including the phenomena of cell membrane polarization, are considered. To verify the model, a comparison of calculated and experimental data on the electrical parameters of biological cells is carried out. It is shown that the use of a nonlinear equivalent circuit allows more accurately reproducing the real behavior of cells in a wide range of applied voltages. The presented modeling technique can be applied to study the electrical properties of various types of biological cells, as well as to develop new electronic devices interacting with living systems. The article considers a complex nonlinear dependence of the electrical conductivity of a biological cell on voltage, which is caused by the interaction of two ion channels with different characteristics and resonance effects created by a series circuit. The method of equivalent circuits made it possible to create a single model that combines components responsible for ionic conductivity, capacitive properties of the membrane and resonance phenomena associated with the presence of electropores.
Keywords: mathematical modeling, equivalent circuit method, software, biological cell, computational research, electrical conductivity
In the modern world, it is increasingly necessary to process geographical information in a variety of forms. This paper discusses the concept of «tile», its purpose, features, as well as the process of retiling, which is a method of creating and updating tiles. This technology helps to increase the efficiency of modern cartographic services, reducing the loading time of maps. The main stages of the development of a microservice implementing the retiling logic are presented sequentially. The main data provider is the OpenStreetMap (OSM) open source project. The spatial data set is a core OSM product and contains up-to-date geographic data and information from around the world. The technology stack is based on the Python language, to which specialized modules for working with tiles are added, as well as a library for implementing a simple and high-quality API.
Keywords: Python, tile, retiling, OpenStreetMap, microservice, Flask-RESTX, mercantile
One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.
Keywords: static algorithms, metrics, signature length, scaling, signature angle
Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.
Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform
The article is devoted to the development of a mathematical model and a software package designed to automate scientific research in the field of financial industry news analysis. The authors propose an approach based on the use of graph theory methods to identify the most significant scientific hypotheses, the methods used, as well as the obtained qualitative and quantitative results of the scientific community in this field. The proposed model and software package make it possible to automate the process of scientific research, which contributes to a more effective analysis of it. The research results can be useful both for professional participants in financial markets and for the academic community, since the identification of the most cited and fundamental works serves as the starting point of any scientific work.
Keywords: software package, modeling, graph theory, news streams, Russian stock market, stocks, citation graph
The article presents the state of technology of websites for designing robots with artificial intelligence. The image of a modern technical site-book as a place for the development of artificial intelligence applications is considered, the possibility of executing algorithms from the page to ensure the connection of robots with real and virtual objects is shown.
Keywords: mathematical network, technical website-book, artificial intelligence, algorithms executed on the website-book, network development of robots
The paper presents a brief overview of publications describing the experience of using mathematical modeling methods to solve various problems. A multivariate piecewise linear regression model of a steel company was built using the continuous form of the maximum consistency method. To assess the adequacy of the model, the following criteria were used: average relative error of approximation, continuous criterion of consistency of behavior, sum of modules of approximation errors. It is concluded that the resulting model has sufficient accuracy and can be used for forecasting.
Keywords: mathematical modeling, piecewise linear regression, least modulus method, continuous form of maximum consistency method, steel company
The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.
Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding
The article deals with the issues of major repairs of rooms for radiation diagnostics in medical institutions, which is becoming more and more relevant in modern conditions. Functional diagnostics plays a key role in early detection of diseases, correct diagnosis and effective treatment of patients. With the development of technology and the advent of high-tech diagnostic equipment, there is a need to upgrade medical institutions to integrate such equipment. The study, conducted on the basis of an analysis of regulatory and technical documentation and scientific papers, highlighted the main stages of major repairs of radiation diagnostics facilities, identified the main participants in these stages. Organizational charts have also been developed for each stage, which emphasize the importance of coordination between all project participants, including builders, engineers, architects and medical specialists. The implementation of such schemes helps to minimize time and financial costs, ensures the implementation of all necessary requirements and standards, and guarantees the high quality of the work performed. As a result, we receive an organized repair process that allows medical institutions to effectively use new diagnostic equipment to improve the quality of medical services and improve the diagnosis and treatment of patients.
Keywords: major repairs, healthcare facilities, radiation diagnostics facilities, medical organization, project documentation
Fifth-generation networks are of great interest for various studies. One of the most important and relevant technologies for efficient use of resources in fifth-generation networks is Network Slicing technology. The main purpose of the work is to simulate the probabilistic characteristics of blocking requests for access to wireless network radio resources. The main task is to analyze one of the options for implementing a two–service model of a wireless network radio access scheme with two slices and BG traffic. In the course of the work, the dependence of the probability of blocking a request depending on the intensity of receipt of applications of various types was considered. It turned out that the probability of blocking a type i application has the form of an exponential function. According to the results of the analysis, request blocking occurs predictably, taking into account the nature of incoming traffic. Previously, there are no significant drawbacks in the considered model. The developed model is of great interest for future, deeper and long-term research, for example, using simulation modeling, with the choice of optimal network parameters.
Keywords: queuing system, 5G, two - service queuing system, resource allocation, Network Slicing, elastic traffic, minimum guaranteed bitrate
The paper deals with the problem of choosing the most rational form of spatial metallic cross-barrel coating. Mathematical models of flat structural coating, elliptical paraboloid and hyperbolic paraboloid coatings in SCAD software package based on finite element method are analyzed. Nodal connections of rod elements of coatings are taken according to the system “Kislovodsk”. The obtained parameters of stress-strain state of three different structural coverings allow us to speak about practically identical operation of the structures.
Keywords: structural covering, spatial covering, cross-bar covering, stress-strain state, “Kislovodsk” system, SCAD program complex, finite element method, hyperbolic paraboloid, elliptic paraboloid