×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • A method for determining the coordinates and sector parameters of base stations of fourth-generation mobile radio networks for mobile device positioning tasksс

    A reproducible method is presented for the autonomous determination of the coordinates of the base stations of fourth-generation mobile radio networks and the parameters of their sectors, based solely on field observations of the modem without using time delay and methods for estimating the angles of arrival of the signal. The approach combines robust allocation of an informative "core" of measurements, weighted minimization of distances and aggregation at the site level, providing stable estimates in urban environments. Experimental verification in a real scene demonstrates a significant reduction in localization error compared to the basic centroid and median methods, which confirms the practical applicability of the proposed solution.

    Keywords: LTE, positioning, localization, base station, site coordinate, signal strength, angular distribution, sectorization, optimization, observation, geometric median, field recording, minimization method, radio signal

  • Control of the flight altitude of a helicopter-type aircraft

    The paper considers a detailed mathematical model of a helicopter-type aircraft autopilot implemented in the Matlab/Simulink simulation environment. Computer simulation is used to examine the behaviour of the system without the application of control laws, confirming the need for correction. To compare the performance of controllers, a comparison is made between a proportional-derivative type fuzzy logic controller with linear and nonlinear control laws.

    Keywords: helicopter, altitude control, fuzzy logic controller, automatic control system, flight safety

  • Implementation of a Stabilized Biconjugate Gradient Method for Block-Sparse Matrices on the CUDA Platform

    The article addresses the solution of systems of linear algebraic equations arising in static and steady-state vibration problems solved by the finite element method. A block-sparse matrix format based on the CSR (Compressed Sparse Row) format is presented, along with its GPU implementation using CUDA. A stabilized biconjugate gradient method is implemented and applied to model problems of varying dimensions; a comparison with a reference implementation in MATLAB is also conducted.

    Keywords: sparse matrices, finite element method, block matrices, GPU, parallel computing, systems of linear algebraic equations, biconjugate gradient method

  • Research on the vulnerabilities of a telephone subscriber from the perspective of destructive social engineering

    The article discusses current threats and vulnerabilities of telephone subscribers in the context of mass digitalization, the development of artificial intelligence and machine learning technologies, and their use in fraudulent scenarios. The study analyzes the main vulnerability factors and provides statistical data on telephone fraud incidents in Russia and abroad. Special attention is given to the phenomena of trust in authority, insufficient digital literacy, and the use of voice synthesis and deepfake technologies for social engineering attacks.

    Keywords: social engineering, fraud, vishing, deepfake, artificial intelligence, digital literacy, information security

  • Gagarin as a Global Cultural Phenomenon: The History and Symbolism of Monuments Dedicated to the First Cosmonaut

    This article explores the phenomenon of Yuri Gagarin as a cultural symbol embodied in monumental art across various countries. Using interdisciplinary analysis, it traces the evolution of his image—from a historical figure to a universal cultural archetype. It reveals the mechanisms of the sacralization and mythologization of the first cosmonaut, as well as the transformation of his biographical narrative into a symbolic construct imbued with ideological and existential meanings.
    Particular attention is paid to a comparative analysis of key monuments to Gagarin as bearers of collective memory. Their artistic features, semiotic codes, and regional differences in representation from the Soviet period to the present are examined. Using specific cities as examples, it demonstrates how monumental images and "Gagarin toponymy" contribute to the formation of national and global identity.
    This work contributes to discussions on the construction of cultural heroes, the role of art in historical politics, and the visual representation of scientific and technological progress.

    Keywords: Yuri Gagarin, monuments, space age, cultural symbol, collective memory, mythologization, monumental art, historical heritage, cultural diplomacy, Soviet cosmonautics

  • Analysis of the quality of work of programs that evaluate the originality of a text using a text generated by a neural network

    The article presents an analysis of the quality of services to assess the originality of the "anti-plagiarism" text using the example of texts generated by a neural network. For the analysis, three originality assessment services and texts generated by three different neural networks were used.

    Keywords: text originality, anti-plagiarism, neural networks, text analysis, borrowings

  • Simulation of a continuous motion trajectory based on nodal feedback data for control with prediction of external load

    The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.

    Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object

  • A decision support model for forest fire response in mountainous areas using fuzzy logic

    This paper presents a decision support model for responding to forest fires in mountainous areas using fuzzy logic. The research methods include the Mamdani method for constructing a fuzzy inference system, the use of linguistic variables to describe environmental conditions and risk factors, and the formation of a rule base based on expert knowledge. The developed model implements the principles of situational management and enables determination of the fire danger level, selection of extinguishing methods, response tactics, and optimal resource allocation. Its practical significance lies in the potential application of the model in decision support systems of the Russian Ministry of Emergency Situations for operational planning and forecasting during forest fire suppression in challenging mountainous conditions.

    Keywords: forest fires, mountainous terrain, fuzzy logic, decision support, intelligent systems, situational management

  • Modeling of a project network schedule under resource constraints

    Construction work often involves risks when carrying out complex sets of tasks described in the form of network schedules, in particular, risks of violating tender deadlines and project costs. One of the main reasons for increased project risks is a lack of resources. The main objective of this study is to develop a methodology for modeling network schedules under resource constraints, taking into account the stochastic influence of risks on project completion deadlines. The paper analyzes tools for modeling project schedules; describes a mathematical model for estimating project cost based on a network schedule under resource constraints; proposes a method for modeling a network schedule in the AnyLogic environment; develops an algorithm for modeling parallel branches of a project schedule under resource constraints; and describes a method for modeling a network schedule for project work. Testing was conducted based on a network schedule for a project to construct a contact line support. It has been shown that the method allows for obtaining probabilistic estimates of project deadlines and costs under conditions of risk and limited resources. The methodology can be applied to various projects described by network schedules and will allow solving a number of practical tasks: optimizing resources allocated for project implementation, taking into account the time and cost of the project, analyzing risks affecting project implementation, and developing optimal solutions for project risk management.

    Keywords: network schedule, work plan, simulation modeling, risk analysis, project duration, project cost

  • Genetic search as a tool for overcoming linguistic uncertainty

    This article describes a developed method for automatically optimizing the parameters of an intelligent controller based on an adaptive genetic algorithm. The key goal of this development is to improve the mechanism for generating an intelligent controller rule base through multiparameter optimization. The genetic algorithm is used to eliminate linguistic uncertainty in the design of control systems based on intelligent controllers. A unique algorithm is proposed that implements a comprehensive optimization procedure structured in three sequential stages: identifying optimal control system parameters, optimizing the structure of the intelligent controller rule base, simulating the automatic generation process, and then optimizing the intelligent controller parameters. Implementation of this approach optimizes the weights of fuzzy logic rules and the centers of the membership functions of linguistic variables.

    Keywords: intelligent controller, optimization, genetic algorithm, uncertainty, term set

  • Representation of the aggregated structure of texts using a generalized context-dependent graph-theoretic model

    The paper discusses issues related to the use of graph-theoretic models in text analysis. One of the tasks is to aggregate such models to identify more "simple" graphs, the vertices of which correspond to subsets of the vertices of the original model, and the edges reflect the "strong connections" between the vertices. Using the example of a Russian folk tale plot, it is shown how to build an aggregated model with a given threshold of significance and present it for further analysis. To conduct the experiments, a set of graph-theoretical models for fairy-tale plots from the collection of A.M. Afanasyev was built using the Folklore information system, where the graph aggregation module was improved.

    Keywords: text analysis, graph-theoretical model, aggregation, significance threshold, storage format, folklore text, fairy tale plot, information system "Folklore"

  • Mathematical modeling of the security assessment of a penal system facility based on a modified genetic algorithm

    The article deals with the problem of quantifying the security of objects of the penal correction system based on mathematical modeling. The authors propose a modified genetic algorithm in which the traditional fitness function is replaced by a mechanism of "virtual movement" of individuals in a discrete space, which allows taking into account both the individual characteristics of safety measures and their cumulative impact. A step-by-step example of applying the algorithm to choosing the optimal set of protective measures based on expert assessments based on several criteria is given. The results demonstrate the effectiveness of the proposed approach for solving multi-criteria tasks of assessing and improving security in conditions of uncertainty and the absence of an explicit analytical relationship between system parameters.

    Keywords: security, vulnerability, event, penal enforcement system, genetic algorithm, mathematical modeling, optimization, expert assessment, criterion, security, security regime, discrete space, coalition, crossing, fitness function

  • A Review of Verification Methods for Zero-Knowledge Proof Protocols

    Information technologies have become increasingly used in various fields, be it document management or payment systems. One of the most popular and promising technologies is cryptocurrency. Since they require ensuring the security and reliability of data in the system, most of them use blockchain and complex cryptographic protocols, such as zero-knowledge proof protocols (ZKP). Therefore, an important aspect for achieving the security of these systems is verification, since it can be used to assess the system's resistance to various attacks, as well as its compliance with security requirements. This paper will consider both the concept of verification itself and the methods for its implementation. A comparison of methods for identifying a proof suitable for zero-knowledge protocols is also carried out. And as a result, a conclusion is made that an integrated approach to verification is needed, since choosing only one method cannot cover all potential vulnerabilities. In this regard, it is necessary to apply various verification methods at various stages of system design.

    Keywords: cryptocurrency, blockchain, verification, formal method, static analysis, dynamic method, zero-knowledge proof protocol

  • A Model for representing weighted multi-label dependencies for detecting rare anomalous events in information security tasks

    This paper proposes a novel model of computer network behavior that incorporates weighted multi-label dependencies to identify rare anomalous events. The model accounts for multi-label dependencies not previously encountered in the source data, enabling a "preemptive" assessment of their potential destructive impact on the network. An algorithm for calculating the potential damage from the realization of a multi-label dependency is presented. The proposed model is applicable for analyzing a broad spectrum of rare events in information security and for developing new methods and algorithms for information protection based on multi-label patterns. The approach allows for fine-tuning the parameters of multi-label dependency accounting within the model, depending on the specific goals and operating conditions of the computer network.

    Keywords: multi-label classification, multi-label dependency, attribute space, computer attacks, information security, network traffic classification, attack detection, attribute informativeness, model, rare anomalous events, anomalous events

  • Digital control of double synchronization of a dual-rotor vibration unit

    The paper investigates the specifics of the digital implementation of a rotor synchronization control algorithm for the SV-2M two-rotor vibration unit. The influence of the sampling period on the stability of the synchronous mode is evaluated using computer simulations in MATLAB/Simulink, with time quantization and zero-order hold delay explicitly accounted for. A comparative analysis of the digital and analog versions of the algorithm has been performed. The boundary values of the discretization periods for different values of the given total energy of the system have been determined. The obtained results confirm the applicability of the proposed approach for digital control systems of vibratory equipment.

    Keywords: digital control, rotor synchronization, two-rotor vibration unit, speed-gradient algorithm, extrapolator