×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • Modeling Central Bank Digital Currency Circulation Architectures and Their Information Security

    Central bank digital currencies are a third form of currency, alongside cash and electronic money. As of 2026, 86% of the world's 65 leading central banks were involved in researching the introduction of their own digital currencies. However, central banks use different circulation architectures when developing digital currencies. This article describes these architectures and compares their information security using modeling. The scientific novelty lies in the creation of a mathematical model of a central bank digital currency platform with different architectures and a comparison of their characteristics. The research methods used in this article include analysis, synthesis of data from various sources, induction, and modeling. The result of this article is a model of a central bank digital currency platform and a quantitative assessment of the level of information security. The objective of the article is to quantitatively evaluate the key security indicators of a hybrid architecture and a fully permitted architecture under real-world cyberattack profiles.

    Keywords: centralized architecture, central banks, information security, modeling, digital ruble, hybrid architecture

  • Review of research on the integration of evolutionary game theory and multi-agent reinforcement learning

    The paper provides an overview of research on the integration of evolutionary game theory (EGT) and multi-agent reinforcement learning (MARL). The main problems of MARL and the corresponding advantages of EGT are analyzed. As a result of the analysis, it was found that the implementation of EGT can effectively solve the problems of instability, credit allocation and partial observability in MARL, providing stable strategic convergence and a new path for group optimization. It is shown that the integration of EGT and MARL forms a promising theoretical and technical basis for a breakthrough in multi-agent control. At the same time, in order to deeply merge the two directions, integration mechanisms will have to be optimized in the future, more reliable algorithms will have to be developed, and applied research in complex heterogeneous systems will have to be strengthened. 

    Keywords: evolutionary game theory, multi-agent reinforcement learning, multi-agent control, instability, credit allocation, partial observability

  • A Bayesian approach to condition diagnosis and residual life prediction of milling machines in aircraft manufacturing

    This article examines the practical implementation of a methodology based on Bayes' theorem in the field of technical diagnostics and residual life forecasting for industrial equipment. Emphasis is placed on the ability of this approach to support engineers' effective work under the uncertainty inherent in real-world production processes. Using a vibration monitoring system for multi-axis milling machines, which are critical for the aerospace industry in the production of high-precision aluminum aircraft components, as an example, the feasibility of quantitatively updating the probability of failures as new sensor data arrives is demonstrated. Initial signals, such as vibration, temperature, or acoustic emission levels, are transformed into probabilistic risk assessments with practical justification, providing a reliable basis for management decision-making.

     

    Keywords: "Technical diagnostics, residual life forecasting, predictive maintenance, engineering systems, decision theory, aircraft engineering, repair economics, uncertainty management, probabilistic models, monitoring systems, adaptive algorithms

  • About the approach to choosing a tool for Active Directory research

    The paper considers an approach to choosing a tool for investigating vulnerabilities in the Active Directory directory service, which contains information of primary value to intruders, making it possible to determine the best point of entry into the system and develop the optimal strategy and tactics to implement the most effective and fastest attack. As part of this work, an analysis of possible directory service threats has been carried out and a classification of attacks on Active Directory has been provided. The classification of tools used to obtain useful information from Active Directory is given. The possibilities of Cobalt Strike as a tool for threat emulation and post-operational tasks based on a hidden agent and an updated database of attacking scripts are considered. The analysis of the practical implementation of cyber attacks using the tool Cobalt Strike over the past few years has been carried out. The methodology of such cyber attacks has been studied and detailed step by step.

    Keywords: information security, cyberattack, attack scenarios, threat analysis, directory service, Active Directory, Cobalt Strike

  • Principles for the implementation of a humanitarian, environmentally-oriented approach to the design of residential complexes in the southern regions of Russia

    The search for new approaches to the design of residential complexes is relevant in many countries worldwide. A humanitarian, environmentally-oriented approach is particularly promising for implementing design solutions. This article presents a theoretical justification for the principles that correspond to this approach. Based on the general strategic directions tested during the development of the residential complex design solution, eight principles have been identified and adapted to the conditions of Russia's southern regions: cultural identity; meaningfulness; reasonable rationality; social adaptability; permeability; energy efficiency; environmental friendliness; and aesthetics. Their integrated application demonstrates the use of a humanitarian, environmentally-oriented approach in the project.

    Keywords: architecture, residential buildings, energy efficiency, ecological construction, green construction, residential development, eco-urbanism

  • Markov models and exponential distribution in project management

    The paper examines the nature of exponential behavior and identifies the conditions under which the probabilistic distribution of the project completion period deviates from the exponential one. For this purpose, a model has been developed in which the evolution of the project is described as a Markov process with a transition matrix containing a constant in all elements of the first row. This structure corresponds to a situation in which the project can be restarted at any time. Project completion times can follow various statistical distributions, including normal, exponential, and more complex forms. Examples of such projects can be research, exploration, venture and other similar projects. An analysis of the dynamics shows that the model reliably reproduces the exponential distribution in cases where the probability of a restart remains moderate. This indicates the limit of applicability of the exponential description.: it is adequate for low and medium restart probabilities, but loses accuracy with a high level of uncertainty.

    Keywords: markov processes, project management, exponential distribution, project completion time, risk assessment, probabilistic forecasting, uncertainty in projects, risks of assumptions, dynamics of project evolution

  • On the approach to ensuring the security of mobile devices

    This paper examines an approach to comprehensively ensuring the security of mobile devices, which are the primary tools for communication, banking, and the use of medical services containing passwords, documents, and correspondence. Mobile device security is examined at several levels. Protection levels for mobile platforms, applications, telecom operators, and the user level are highlighted. An analysis of attacks on mobile devices is conducted, and the vectors of the most common attack types are identified. A comparative analysis of iOS and Android mobile platforms was conducted, highlighting their strengths and weaknesses. The main areas of mobile device security implemented by telecom operators were analyzed. Several successful attacks on mobile banking systems were analyzed, and a classification of the main threats to mobile banking was provided.

    Keywords: mobile device protection, cyberattack, attack vector, Android, iOS, application protection methods, mobile banking systems

  • Application server architectures as an object of system analysis

    The article is devoted to the application of systems analysis methodology to the study of application server architectures. The principles of the systems approach are considered in relation to software platforms. A classification of architectures is proposed based on the degree of distribution, component organization principles, request processing methods, and applied architectural patterns. A component-based analysis of a typical multi-tier architecture is carried out, identifying functional relationships and interaction mechanisms between elements. Evaluation criteria for application server architectures from the perspective of systems analysis are defined, including performance, scalability, availability, and modifiability. Methods of decomposition and architectural patterns are examined in the context of their systemic properties, providing a basis for a justified selection of design solutions depending on the requirements of specific tasks.

    Keywords: system analysis, application server architecture, architecture classification, component analysis, architectural patterns, system decomposition, architecture evaluation criteria

  • Ensuring confidentiality in generative multimodal systems: an overview of modern approaches for practical implementation

    The article examines the main aspects of confidentiality in generative multimodal systems, describes the mechanisms and methods of ensuring confidentiality. The analysis of a method for quantifying the level of confidentiality of generative multimodal systems is carried out. STRIDE, TRIKE, OCTAVE, PASTA, and VAST are among the most advanced approaches to building security models. An analysis of all the aforementioned policies, security models, threat models, and security criteria was conducted to develop a model for privacy protection. In the process of threat modeling using the STRIDE methodology for each of the threat categories, it was found out that existing threats arise primarily due to the lack of multifactor authentication, which could protect against attempts by an attacker to obtain information and create bypass accounts in case the main one is blocked. A general approach to assessing the confidentiality of the system is proposed. Each privacy metric meets a set of criteria by which the GMS privacy is assessed.
    Introduction
    One of the components of the reliability of computer systems is their confidentiality. Confidentiality in generative multimodal systems (GMS) is reduced to ensuring that private or other confidential information is protected, as its unauthorized disclosure can lead to significant material losses.
    Aims and objectives
    The purpose of the article is to consider the issues of ensuring confidentiality in generative multimodal systems and to review modern approaches for their practical implementation.
    The objectives of the article are to explore the theoretical aspects of privacy. Analyze security policies and models, threat models, and security criteria. To investigate each of the component criteria for the security of complex information systems. To carry out the threat modeling process using the STRIDE methodology. To evaluate the specified methodology and perform calculations to assess the confidentiality of the system.
    Methods
    Mathematical and computer modeling. Statistical analysis. Comparative analysis. Literature analysis. Generalization and systematization of the material.

    Keywords: confidentiality, violation of confidentiality, methods of ensuring confidentiality, generative multimodal system, threat model, security model, threat criteria, unauthorized access, STRIDE, security assurance

  • Technical science. Informatics, computer facilities and management

  • Game-theoretic model of control in the system of sales of rolled metal products

    In this article a hierarchical game in a two-level system for the distribution of rolled metal products is constructed.  Stackelberg equilibria for vertically connected participants and Nash equilibria for horizontally connected participants are found. There are several dealer organizations that sell rolled metal products, purchasing them from suppliers and delivering them via carriers either to their warehouse or directly to the customer. It's preferable for a dealer to have the product in their warehouse when a customer orders it. Otherwise, to avoid losing the order, the company must arrange for additional funds to purchase the product from the supplier and transport it to the customer. However, demand is far from constant and depends on several factors, including season, weather conditions, and the current socio-economic conditions in the region. Therefore, it's difficult to predict how much product to stock and when to do it. Suppliers, in turn, set prices for their products, including discounts for dealers. The system consists of several producers at the top level, several dealers at the bottom level, and their customers. An algorithm for sequentially coordinating transactions between a specific dealer and a specific supplier is proposed.

    Keywords: Knyazev I.I., Gorbaneva O.I.

  • Synthetic data generation methods for predicting defect distribution in power plants using deep learning

    In recent years, the safe operation of energy facilities has increasingly been ensured by probabilistic non-destructive testing systems. This article examines a method for predicting and estimating the number of missed defects by solving an inverse problem. A detailed analysis of indirect manifestations and prediction of an indirect parameter is conducted using the Keras deep learning library, which determines the quantitative characteristics of the facility under study. The results of the study demonstrate encouraging prediction accuracy with easily correctable signs of model overfitting.

    Keywords: non-destructive testing, defects, defect detection probability distribution curves, synthetic data for deep learning, regression forecasting, Keras, structural and semantic features, non-linear dependencies

  • Intelligent Monitoring System for Carton Packaging Defects Based on Computer Vision

    Introduction. Ensuring the quality of cardboard packaging is a critical challenge for modern warehouse logistics, as damaged packaging increases the risk of product loss and negatively affects customer satisfaction. With the rapid growth of e-commerce, there is a growing need for automated and reliable quality control solutions based on computer vision technologies.
    Aim and objectives. The aim of this study is to develop an automated monitoring system capable of detecting and classifying defects in cardboard boxes in real time under warehouse conditions. The objectives include designing a defect detection model, integrating it into a web-based system, and evaluating its performance in practical scenarios.
    Methods. The proposed solution is implemented as a web application that integrates a YOLOv8-based deep learning model trained on a custom dataset of defective and intact packaging images. The backend is built with Flask for real-time video stream processing, while Apache Superset is used to provide analytical dashboards for visualizing defect statistics.
    Results. Experimental testing in storage, sorting, and delivery scenarios demonstrated high detection accuracy exceeding 95% and stable performance under varying lighting conditions and partial occlusions. The system successfully identified major defect types such as dents, tears, and deformations with minimal false positives.
    Conclusion. The developed monitoring system proves to be an effective tool for improving packaging quality control in warehouse operations, reducing operational risks, and supporting data-driven management decisions in logistics environments.

    Keywords: computer vision, defect detection, carton packaging, YOLOv8, deep learning, monitoring system, video analytics

  • Development of a diagnostic model for monitoring welding production of nuclear power plant equipment

    This paper presents the results of research into the synthesis of a mathematical model for the welding process of critical power engineering structures. To quantitatively assess the condition of welding components, an entropy approach is proposed, allowing for the study of objects taking into account the stochastic nature of the processes occurring within them. An information and analytical system is proposed as a means of obtaining information, enabling measurement procedures to be performed under real production conditions. Electrical signals of welding current and voltage are measured. In the first stage, the signals are converted into time series and subjected to entropy parameterization. Next, the condition is monitored using a vector entropy model. The model is constructed based on a procedure for comparing vector entropies characterizing the states of components from the previous and current welding processes.

    Keywords: monitoring, information, entropy, welding production, modeling of complex systems

  • Optimization of the process of preparing families of methodological materials using multi-variant documents

    This work focuses on improving the processes for preparing families of methodological materials, including those used in higher education. Materials are generated using the LuaLaTeX desktop publishing system. The proposed solution is based on the integration of the Lua scripting language and the TeX desktop publishing language. This approach enables the implementation of the concept of a multi-variant document, in which assembly logic and content management are managed at the software level. The practical significance of this work lies in increasing the efficiency of developing and modernizing families of methodological materials, which is achieved through automated document assembly from a single source.

    Keywords: family of teaching materials, multi-variant document, automated layout, educational content, data consistency

  • Security Analysis of an (m, m) Visual Cryptography Scheme Using Quasi-Orthogonal Matrices under Conditions of Partial Key Compromise

    This paper considers a modification of the (m, m) visual cryptography scheme using quasi-orthogonal matrices. The use of Mersenne matrices with two-level values {a, -b} is proposed. The scenario of partial key compromise is investigated, where a potential attacker knows the structure of the key matrix but lacks information about its specific level values {a, -b}. Numerical modeling of the restoration process for grayscale secret images using Mersenne matrices of a fixed order and structure with different sets of level parameters has been conducted. It is shown that even with extremely small deviations of the level values from the true ones, the restoration of a visually distinguishable image becomes impossible. The obtained results confirm that the use of Mersenne matrices expands the key space compared to the earlier (m, m) scheme using Hadamard matrices and provides an additional layer of protection in visual cryptography tasks.

    Keywords: Image with a secret, Hadamard matrices, Mersenne matrices, matrix multiplication

  • Quantification of quality assessment criteria at the stages of design preparation of production

    The article is devoted to the quantitative formalization of quality assessment criteria for use in an automated quality management system at the stages of design preparation of production (KPP). The article discusses the stages of a technical proposal, a draft design, a technical design and the development of working design documentation. A unified evaluation procedure is proposed for five key groups of criteria for the quality of a machine-building product: the quality of technical solutions, reliability and operability, safety, adaptability and uniformity, as well as operational properties. Grouping criteria into groups allows for an end-to-end assessment of the CHECKPOINT between the stages, which provides an opportunity for experts to conduct an assessment. For each group, a method has been formulated to obtain a final indicator that provides a comparable numerical estimate that is practically suitable for further use in an automated quality management system at the stages of the CHECKPOINT. The methodological basis of the study was the analysis of sources that make it possible to identify the most characteristic problems and requirements for quality assessment at the stages of the CHECKPOINT. The results obtained contribute to increasing the degree of formalization of the quality assessment procedure at the early stages of the product life cycle, which creates conditions for improving the quality of products through systematic and reproducible evaluation of innovative solutions. Procedures for rationing scales and setting thresholds are provided.

    Keywords: design preparation of production, quality assessment, formal criteria, terms of reference

  • Using a neural network approach in the task of evaluating the characteristics of queuing systems

    In this paper, we propose a method for evaluating the key indicators of a multichannel queuing system with an unlimited queue and multiphase Erlang-type service. It is shown that the transition to the multichannel case leads to a sharp increase in the dimension of the state space and a complication of the system of Kolmogorov equations, which often makes direct analytical calculation unavailable. A meta-model based on machine learning methods, trained on discrete event simulation data, is proposed for an approximate forecast of the average waiting time, average queue length and the proportion of applications served. A comparison of basic regression and neural network models is performed and the stability of the approximation with a change in the load factor is considered.

    Keywords: queuing system, queue, simulation modeling, meta-model, machine learning, neural network, multi-channel service, Erlang distribution, impatience, Kolmogorov equation, regression, gradient boosting, random forest, perceptron

  • Development and Verification of an Information Security System for Protection Against Destructive Content Based on Transformer Models

    The paper addresses the problem of automated detection of destructive verbal impacts in user-generated content of digital platforms as an element of information security assurance. A method for context-semantic identification of aggressive and discriminatory statements based on the RuBERT transformer model fine-tuned on a specialized annotated corpus of Russian-language messages is proposed. The procedures of data preparation, training of a binary classifier, and probabilistic interpretation of the results are described. Experimental evaluation confirms the effectiveness and robustness of the method with respect to lexical variability and context-dependent forms of verbal aggression, as well as the possibility of its integration into automated systems for monitoring and protection of the information space.

    Keywords: information security, destructive content, verbal aggression, automatic moderation, context-semantic analysis, transformer model, RuBERT, binary classification, machine learning, natural language processing, monitoring system, intelligent filtering

  • DevSecOps-based software information security methodology: integrating automated tools into the development lifecycle

    The article is devoted to the current problems of information security in software development. The main purpose of the research is to increase the level of security in software development by implementing security tools and DevSecOps practices. The main threats to information security that arise at each stage of software development, from planning to product operation, are considered. The analysis of the main tools used to ensure the overall security of the developed software such as Jenkins, SonarQube, Zed Attack Proxy, Osquery, Trivy, Docker is carried out. The proposed methodology makes it possible to integrate security measures into the development process, minimize the human factor, reduce the response time to vulnerabilities, and ensure information security control throughout the software lifecycle.

    Keywords: secure software development, software lifecycle, threats, secure development tools, information security

  • Optimization of administrative processes in the field of individual housing construction based on a multi-channel mass service system

    The article discusses the problem of significant delays in processing applications for administrative permits in the sphere of individual housing construction, due to the uneven distribution of load between processing channels. The relevance of the work is related to the need to optimize bureaucratic processes in the context of increasing the volume of individual housing construction within the framework of the implementation of public housing programs. The aim of the study is to develop a mathematical model of a multi-channel mass service system, adapted to the specificity of administrative procedures in the sphere of individual housing construction, with the aim of reducing the average waiting time for processing applications by at least 25%. The article analyzes the structure of administrative procedures and regulatory and legal regulation of housing construction, identifies key stages and "bottlenecks" of the harmonization process. Based on the theory of mass service flows, applications are formalized as a Pusonian process and a model with exponentially distributed service time is constructed. Optimization techniques developed and evaluated, including dynamic allocation of requests between channels, prioritization and adaptive load management to account for seasonal fluctuations. The results of the study confirm the possibility of achieving the goal of reducing waiting times. It is shown that the proposed solutions increase the system’s capacity by 15-22% and reduce the downtime of administrative resources by 18-25%. Scientific novelty consists in the complex application of the apparatus of mass service theory to optimize administrative processes in housing construction, taking into account real constraints.

    Keywords: individual housing construction, administrative procedures, queuing system, mathematical modeling, optimization, processing delay, Poisson Stream, bandwidth

  • The Role of Access Control in Preventing Data Loss During Anomalous Insider Attacks

    The article examines the characteristics of insider threats, analyzes typical insider motivations, and identifies the main technical vectors used to carry out attacks, including unauthorized data copying, the use of cloud services, instant messengers, and remote access mechanisms. Particular attention is paid to the role of access control systems in preventing personal data leaks, as well as to contemporary scientific and practical approaches to countering insider activity. It is demonstrated that effective minimization of the risks associated with insider incidents is achievable only through a comprehensive combination of organizational, technical, and legal measures, along with systematic enhancement of personnel awareness in the field of information security.

    Keywords: insider threats, personal data leakage, access control, dynamic access control, behavioral analysis

  • Measuring Volterra kernels of systems with nonlinearities of analytical and piecewise in the form of a deadband

    This paper concerns the problems of identification of systems with mixed-type nonlinearities. An improved method of frequency identification using a system of correlators, which allows recording a bilinear frequency response is shown. An approach is proposed that provides a more accurate measurement frequency response of Volterra kernels, which consists of output correction. The efficiency of the proposed approach is demonstrated using the example of a nonlinear system including a deadband block. Based on known analytical values, the errors of the methods are calculated.

    Keywords: Volterra series, system identification, nonlinear systems, piecewise nonlinearities, frequency responses, Riccati equation

  • Technical science. Building and architecture