This article deals with the use glass in modern rchitecture, with an emphasis on innovative approaches and technologies applied famous architects of the 20th and 21st centuries. The article analyses key projects demonstrating unique properties of glass as a material, conducive to the creation of dynamic, functional and visually expressive architectural forms. Special attention is paid to environmental aspects of glass and its impact on sustainability of architectural objects.
Keywords: "glass, architecture, energy efficiency, lighting, material, application, approach, shape, design, facade"
The integration of artificial intelligence into mobile devices is fraught with serious challenges, especially due to the limited resources available and the requirements for real-time data processing. The article discusses modern approaches to reducing computing costs and resources in systems for mobile objects with artificial intelligence, including model optimization, and computing allocation strategies for mobile platforms with limited resources.
Keywords: artificial intelligence, moving objects, lightweight models, peripheral models, hardware acceleration, knowledge distillation, quantization
The article discusses aspects of the implementation of the architecture of cultural and educational centres in industrial cities. This article reveals historical context of the formation of cultural and educational institutions in the structure of industrial cities. Some of the objects in cities of the Donbass region are given as examples, including the context of architectural revitalization. The term "rehabilitation" is analyzed in relation to architectural and urban planning activities. The factors that determine the need for social rehabilitation in industrial cities are given in this article, including those applicable to the cities of the Donbass region. The aspects of social rehabilitation are formulated in this paper, which make it possible to apply this concept to industrial territories. Some socio-economic aspects, that reveal the meaning of architectural reinterpretation of objects of industrial and post-industrial territories, are given in this paper. Special attention is paid to the potential of cultural and educational centers as a tool for integrating former industrial territories into modern urban space.
Keywords: architectural heritage, industrial city, culture, cultural and educational institution, social environment, leisure, rehabilitation, modernization, architectural transformation, sustainable urban development, regional specifics
Modern medicine is on the threshold of a technological transformation caused by the active introduction of artificial intelligence into clinical practice. These technologies not only speed up diagnostics and improve the accuracy of surgical interventions, but also enable the creation of individualized treatment plans, the development of new drugs, and remote access to medical services. The relevance of this research is determined by the growing role of artificial intelligence in healthcare and the need to systematize its existing applications. This article provides a comprehensive analysis of the application of artificial intelligence technologies in modern medicine. The article systematizes the application of AI, examines key examples of projects operating in Russia, and outlines the prospects for technology development over the next 5-10 years. Particular attention is paid to the ethical, legal, and organizational challenges associated with the implementation of AI in medical practice.
Keywords: artificial intelligence, medicine, telemedicine
This article presents a systematic review of methods for ensuring the trustworthiness and authenticity of devices in the Internet of Things (IoT) ecosystem. Key vulnerabilities, architectural features, and resource constraints of IoT systems that determine the choice of security mechanisms are analyzed. Cryptographic solutions, dynamic trust models, access control approaches, and authentication protocols for industrial and distributed environments are considered. A comparative analysis of methods identifies relevant research gaps and identifies promising areas for developing comprehensive, adaptive security systems for heterogeneous IoT infrastructures.
Keywords: Internet of Things system, security, reliability, authenticity, devices, methods
This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.
Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole
The article presents an analysis of the current state of the monitoring process in spacecraft (SC) flight control. It outlines the state of monitoring technologies currently used in the flight control of modern spacecraft. The shortcomings of the monitoring process, which are exacerbated by the development of space technology, are identified. To address these shortcomings, the use of new intelligent methods is proposed, which, by increasing the automation of the spacecraft flight monitoring process, will enhance the reliability and efficiency of control. Promising methods for improving the reliability of spacecraft monitoring using artificial intelligence technologies, in particular artificial neural networks (ANN), are considered.
An analysis of scientific publications on the application of ANNs in space technology was conducted; examples of ANN application in flight control, diagnostics, and data processing tasks are provided. The advantages and limitations of using neural networks in space technology are examined.
Keywords: spacecraft, flight control, monitoring, state analysis, flight management, telemetry data
Decentralized parametric insurance represents a promising innovation in the decentralized finance industry, offering automated and transparent payments based on verifiable external data. However, this dependence on external data supplied by oracles creates a critical vulnerability. The complexity of smart contracts can lead to unforeseen consequences, as demonstrated by attacks using flash credit: an instant loan that must be repaid as part of the same blockchain transaction. These attacks have become one of the most destructive vectors of economic attacks, allowing attackers to manipulate price oracles and initiate fraudulent insurance payments. Existing defense mechanisms, such as time-weighted average price oracles, are passive and not always sufficient to prevent such attacks. This article presents an original model of preventive protection. The author formalizes an attack on oracles using flash credit as a game-theoretic model with three participants: an attacker, a Protocol, and an Arbitrageur, where the latter is an automatic trading program implemented in a smart contract. Using a mathematical framework based on the invariant of an automatic market maker, the author determines the exact "window of vulnerability" - the economic conditions under which an attack is beneficial for an attacker and unprofitable for market arbitrageurs. Based on this analysis, the architecture of "SC-Guard" is proposed — a system of smart contracts with preventive protection against attacks using flash credit. Such a system monitors transactions not yet included in the blocks in real time for threats and dynamically changes economic incentives, subsidizing the Arbitrageur to neutralize attacks before they are executed. Instead of passively resisting manipulation, a system architecture is proposed that actively makes flash credit attacks economically unprofitable, providing a higher level of security for decentralized parametric insurance protocols.
Keywords: decentralized finance, parametric insurance, flash loans, oracle attacks, game theory, smart contract security, maximum extractable value, preemptive defense.
The article discusses the issues of assessing the robustness of memristor elements in order to increase the reliability of artificial intelligence systems based on nanoelectronic structures. The system of nonlinear equations describing the frequency response of a memristor, the input signals of which can strongly depend on various parameters, cannot be solved using methods accessible to standard mathematics.
To achieve the result, it is proposed that the system of equations be solved using interval arithmetic methods. The value of intermediate solutions lies in the fact that they provide access to the most reliable solutions to basic problems, taking into account possible changes in the initial and calculated values.
The main task of interval computing is to replace arithmetic operations and real functions on real numbers with interval operations and functions that transform intervals containing these numbers. In interval calculation, the main object of research is the interval, which is a closed numerical interval. The value of interval calculations lies in the fact that they contain accurate solutions to the initial problems. The interval calculation methods developed to date are based on the use of arithmetic operations with real and complex numbers.
Using interval calculation can help reduce errors in calculations and data storage in electronic devices. For example, when using memristors to store information, interval calculation can help account for factors affecting data read and write errors. Interval arithmetic allows you to take into account possible errors and uncertainties that may arise during measurements and calculations. This helps to reduce the likelihood of errors and increase the accuracy of forecasting the operation of memristors.
The proposed algorithm for estimating the robustness of a memristor in the mode, which takes into account significant increases in the nonlinearities of electrical parameters from the point of view of reliability, makes it possible to calculate the characteristics of the developed circuits and reduce the time spent on circuit engineering when searching for the best option.
Keywords: memristor, multipole, topological graph, finite increments, structural-parametric model, algorithm
This paper examines the problem of assessing the influence of social network users and their groups in disseminating information among audiences. Forming a network of user subsets to initiate informational influence is a computationally complex problem with a stochastically uncertain outcome. Existing centrality metrics typically involve searching for all shortest paths in a graph or solving large-scale systemic sources. This paper provides approximate estimates of the influence of individual network participants and their subsets, based on modifications of the Flageolet-Martin algorithm. A greedy algorithm based on electronic metrics is also proposed, enabling coalition formation by iteratively supplementing it with quasi-optimal elements. The obtained results can be applied to problems of information analysis, forecasting, and planning in social networks.
Keywords: Social network, informational influence, coalition, influence, connection graph, centrality metric, closeness centrality, shortest path, route, approximate estimate, greedy algorithm
The article discusses the mechanism of creating an information security ecosystem and its organization model, as well as analyzes the requirements for information protection, functional areas of information protection, and rules for building information security ecosystems. Based on this analysis, the article formulates the main principles for building information security ecosystems, including the principles for developing the ecosystem architecture, the principles for organizing the protection of objects, the principles for applying technologies, and the principles for implementing management. The analysis of the main elements of the information security ecosystem has been carried out. Based on the traditional view of responding to a threat, the functionality of the elements of a typical information security ecosystem has been determined. An alternative approach to building an information security ecosystem has been proposed, based on defining the composition and functionality of its elements, taking into account the purpose, characteristics, and vulnerabilities of the protected objects themselves
Keywords: information security, ecosystem, building principles, standard, cybersecurity framework, information security tools
This research paper addresses the growing challenge of sophisticated, multi-stage cyberattacks that bypass traditional security measures like firewalls and intrusion detection systems. The study proposes a novel formal approach to model attacker behavior and analyze attack vectors, with a specific focus on estimating the total time required to execute an attack scenario. The core of the methodology is an extension of Labelled Transition Systems (LTS) into a Time-Labelled Transition System (TLTS). This model introduces a time function that assigns a delay to each event, enabling the calculation of the execution time for different attack paths. A formal language, utilizing sequence and choice operators, is developed for the compact description of complex attack scenarios. The paper formulates precise rules for generating all possible paths from a given attack vector and provides a method for calculating their total number. The practical application of the formalism is demonstrated through two detailed case studies: an attack leveraging a malicious mobile application and the compromise of an IoT video surveillance system. For each, the attack vector is presented both graphically and in the proposed notation, and all possible execution paths are explicitly derived. The concluded approach provides a valuable foundation for proactive security assessment, allowing for the formalization of attack surfaces and the estimation of implementation timeframes, which can be instrumental in developing enhanced defense mechanisms. Future work will involve modeling more complex scenarios incorporating active countermeasures.
Keywords: attack modeling, information security, transition system, time delay, formal language, attack scenario, attack trajectory, attack vector, cybersecurity, vulnerability analysis, information protection, attacker behavior
An algorithm for modeling smooth hysteresis nonlinearities is proposed, taking into account the slope coefficient k and the saturation level c. The developed model provides accuracy and ease of adjustment while maintaining intuitive physical parameters of the hysteresis loop, which makes it effective for practical application in the tasks of analysis and synthesis of nonlinear control systems.
Keywords: unambiguous nonlinearities, hysteresis, automatic control systems, backlash with saturation, ambiguous nonlinearities, algorithm, modeling of automatic control systems, relay, static characteristic, approximation
The paper proposes a modified method for the parametric synthesis of nonlinear automatic control systems with ambiguous nonlinearities based on the generalized Galerkin method. To eliminate the need to determine switching points, the transient process is approximated by two sections: a polynomial before the time tp and a constant value after it. This allows us to obtain recurrent formulas for Bqi integrals, simplify calculations, and maintain the absolute stability of the system.
Keywords: parametric synthesis, nonlinear automatic control systems, generalized Galerkin method, ambiguous (multi-valued) nonlinearities, hysteresis, switching points, polynomial approximation, impulse automatic control systems, recurrent relations
The study addresses the problem of reducing the probability of emergency situations involving unmanned aerial systems. Accidents are regarded as outcomes of combinations of events that are individually of relatively low hazard. Causal relationships are represented by fault trees, in which the root node corresponds to an accident, the leaves correspond to basic events, and intermediate nodes describe their logical combinations. Accident scenarios are associated with the minimal cut sets of the fault tree. To identify accident prevention strategies, the concept of successful-operation paths is employed. Each such path is defined as a set of nodes having a non-empty intersection with all minimal cut sets. It is assumed that preventing all events included in a successful-operation path renders the development of accident scenarios impossible.
The study additionally accounts for the fact that the same flight mission may be executed along routes of differing complexity. Route complexity influences the cost estimates of measures aimed at preventing the events that form accident-related combinations. A model example is provided that includes the assessment of the complexity of two routes, a table of mitigation costs for basic events, and the selection of an appropriate successful-operation path for accident prevention. The proposed methodology is intended to reduce the probability of the realization of accident-inducing event combinations to an acceptable level while adhering to operational constraints and the mission-specific requirements of the flight task.
Keywords: unmanned aerial systems, emergency combination of events, fault tree, route complexity, logical-probabilistic security analysis
An analytical review of relevant scientific publications in the field of detecting abnormal user activity when working with information systems is conducted. Behavioral analysis in combination with machine and deep learning algorithms opens up new opportunities for early detection of insider threats.
Methods for improving the effectiveness of countering insiders in information systems are analyzed by building an adequate model of the abnormal behavioral profile of users of the customer relationship management system.
The article substantiates the feasibility of an approach to detecting insiders in a computer network based on the use of machine learning methods and big data processing, which allows for the consideration of a variety of parameters that are not directly related to each other, as well as the automation of this process.
Keywords: information systems, information security, insider, abnormal activity, behavioral profile, cluster neighborhood
The paper examines the key features of deepfakes and approaches to their recognition using computer vision and machine learning methods. In the course of the study, the signs of deepfake detection were identified and analyzed. Based on priorities, the features that ensure high recognition accuracy were identified and a conclusion was drawn about the significance of each feature.
Keywords: generative artificial intelligence, disinformation, deepfake, deepfake detector, cybersecurity, fraud, recognition features, analysis, recognition vectors, machine learning, model
This article analyzes the limitations of the standalone use of Kalman filters in complex dynamic systems and systematizes modern advances in the integration of deep learning methods. Practical aspects of the combined application of deep learning and Kalman filters are explored, demonstrating improved accuracy and reliability of solutions under dynamic conditions, noisy environments, and complex environmental factors. Finally, promising directions for the development of multisensor data fusion methods are outlined.
Keywords: deep learning, integrated navigation, multi-source data fusion, Kalman filter, extended Kalman filter
The purpose of the research is to develop a solution that allows optimizing the number and functionality of information security specialists involved in ensuring the information security of an automated system in a secure execution of the organization. The methods used in the article include a description and analysis of various governing documents, professional standards and regulations of the Russian Federation, and a number of scientific author's works that disclose the requirements for the functionality and qualifications of information security specialists. As a result of the work carried out, significant shortcomings were identified in the current regulatory and methodological documents describing the labor actions of personnel ensuring the protection of the facility's information, and a tendency to reduce the number of positions and simultaneously expand the functionality of the remaining employees. The need to comply with the qualification requirements for the reliable functioning of an automated system in a secure design and the exclusion of the "human" factor in information security incidents is emphasized. A new, optimal organizational structure of the department responsible for monitoring the protection of information circulating in an automated system is proposed, and the job responsibilities and areas of responsibility of the automated system administrator and the information security administrator are specified in detail. The solution presented in this paper can be used for daily information security in any automated system for various organizations. It emphasizes the importance of improving the skills and unifying the competencies of information security workers to ensure their interchangeability and reduce the risks associated with lack of control if highly specialized employees are excluded, which will increase the stability and effectiveness of the information security system at the enterprise.
Keywords: information security, administrator, staffing, functionality of information security personnel, automated system in a secure design
A reproducible method is presented for the autonomous determination of the coordinates of the base stations of fourth-generation mobile radio networks and the parameters of their sectors, based solely on field observations of the modem without using time delay and methods for estimating the angles of arrival of the signal. The approach combines robust allocation of an informative "core" of measurements, weighted minimization of distances and aggregation at the site level, providing stable estimates in urban environments. Experimental verification in a real scene demonstrates a significant reduction in localization error compared to the basic centroid and median methods, which confirms the practical applicability of the proposed solution.
Keywords: LTE, positioning, localization, base station, site coordinate, signal strength, angular distribution, sectorization, optimization, observation, geometric median, field recording, minimization method, radio signal
The work compares the use of recurrent networks and models based on transformer architecture to solve the problem of predicting the completion time of a business process. Models, by definition, model the sequence of actions and are able to take into account a variety of attributes in determining target characteristics. For comparison, a recurrent model of long-term short-term memory and a transformer encoder of its own architecture were used, the operation of which was tested on openly presented real data from the logs of the support service. The models were trained and tested using Python using the pandas, numpy, and torch libraries with the same data preparation, prefix generation, and time division for both models. The comparison as a result of experiments on the average absolute error showed the advantage of the transformer encoder; approximately the same accuracy of the models with a slightly higher accuracy of the transformer model was recorded for the standard deviation.
Keywords: predictive monitoring, event log, machine learning, transformer encoder, neural networks, data preparation, regression model, normalization, padding, recurrent network, model architecture
The study addresses the problem of identifying key points on three-dimensional surfaces of physical objects that are required for placement or fixation of elements in engineering and medical applications. Direct determination of such points on real objects is limited by restricted access, geometric variability, and high accuracy requirements; therefore, digital 3D models incorporating both external and internal structure are used as the basis for analysis. An interpretable multi-criteria suitability evaluation approach is proposed, based on fuzzy logic inference, enabling integration of strict constraints and preferential criteria originating from different subject domains. The methodological framework combines systematic literature analysis, expert knowledge integration, and mathematical formalization of multi-criteria decision making. Particular attention is given to explainability and transferability, which are critical for medical scenarios (anatomical landmarks) as well as engineering and robotics scenarios (geometric and technological landmarks). The developed model generates suitability heatmaps and automatically identifies a set of admissible points that is consistent with expert annotations and safety requirements.
Keywords: key point detection; fuzzy logic inference; decision support expert system
The paper considers a detailed mathematical model of a helicopter-type aircraft autopilot implemented in the Matlab/Simulink simulation environment. Computer simulation is used to examine the behaviour of the system without the application of control laws, confirming the need for correction. To compare the performance of controllers, a comparison is made between a proportional-derivative type fuzzy logic controller with linear and nonlinear control laws.
Keywords: helicopter, altitude control, fuzzy logic controller, automatic control system, flight safety