This work presents the Multi-Agent Coverage Controller (MACC)—a specialized deep reinforcement learning method designed to solve the coverage path planning problem in multi-agent systems. The method addresses key challenges inherent to coverage path planning, including sparse and noisy rewards, high gradient variance, the difficulty of credit assignment among agents, and the need to scale to a variable number of agents. MACC integrates a specific set of mechanisms: an adaptive clipping-interval width, advantage-modulation gating, a counterfactual baseline for the centralized critic, and a multi-head self-attention mechanism with a presence mask. Theoretical properties of the method are provided, demonstrating optimization stability and reduced variance of gradient estimates. A comprehensive ablation study is conducted, showing the contribution of each mechanism to agent coordination, spatial distribution of trajectories, and overall coverage speed. Experiments on a set of satellite maps indicate that MACC achieves substantial improvements in coverage completeness and speed compared to the baseline configuration, delivering the best results when all integrated mechanisms are used jointly.
Keywords: multi-agent system, coverage path planning, deep reinforcement learning, adaptive trim interval width, modulated advantage gateway, counterfactual basis, multi-head self-awareness mechanism, agent coordination
This paper examines the problem of assessing the influence of social network users and their groups in disseminating information among audiences. Forming a network of user subsets to initiate informational influence is a computationally complex problem with a stochastically uncertain outcome. Existing centrality metrics typically involve searching for all shortest paths in a graph or solving large-scale systemic sources. This paper provides approximate estimates of the influence of individual network participants and their subsets, based on modifications of the Flageolet-Martin algorithm. A greedy algorithm based on electronic metrics is also proposed, enabling coalition formation by iteratively supplementing it with quasi-optimal elements. The obtained results can be applied to problems of information analysis, forecasting, and planning in social networks.
Keywords: Social network, informational influence, coalition, influence, connection graph, centrality metric, closeness centrality, shortest path, route, approximate estimate, greedy algorithm
The article discusses modern methods for protecting bank customers' personal information based on differential anonymization of data using trusted neural networks. It provides an overview of the regulatory framework, analyzes technological approaches and describes a developed multi-level anonymization model that combines cryptographic and machine learning techniques. Special attention is paid to balancing between preserving data utility and minimizing the risk of customer identity disclosure.
Keywords: differential anonymization, trusted neural network, personal data, banking technologies, information security, cybersecurity
The purpose of the research is to develop a solution that allows optimizing the number and functionality of information security specialists involved in ensuring the information security of an automated system in a secure execution of the organization. The methods used in the article include a description and analysis of various governing documents, professional standards and regulations of the Russian Federation, and a number of scientific author's works that disclose the requirements for the functionality and qualifications of information security specialists. As a result of the work carried out, significant shortcomings were identified in the current regulatory and methodological documents describing the labor actions of personnel ensuring the protection of the facility's information, and a tendency to reduce the number of positions and simultaneously expand the functionality of the remaining employees. The need to comply with the qualification requirements for the reliable functioning of an automated system in a secure design and the exclusion of the "human" factor in information security incidents is emphasized. A new, optimal organizational structure of the department responsible for monitoring the protection of information circulating in an automated system is proposed, and the job responsibilities and areas of responsibility of the automated system administrator and the information security administrator are specified in detail. The solution presented in this paper can be used for daily information security in any automated system for various organizations. It emphasizes the importance of improving the skills and unifying the competencies of information security workers to ensure their interchangeability and reduce the risks associated with lack of control if highly specialized employees are excluded, which will increase the stability and effectiveness of the information security system at the enterprise.
Keywords: information security, administrator, staffing, functionality of information security personnel, automated system in a secure design
A reproducible method is presented for the autonomous determination of the coordinates of the base stations of fourth-generation mobile radio networks and the parameters of their sectors, based solely on field observations of the modem without using time delay and methods for estimating the angles of arrival of the signal. The approach combines robust allocation of an informative "core" of measurements, weighted minimization of distances and aggregation at the site level, providing stable estimates in urban environments. Experimental verification in a real scene demonstrates a significant reduction in localization error compared to the basic centroid and median methods, which confirms the practical applicability of the proposed solution.
Keywords: LTE, positioning, localization, base station, site coordinate, signal strength, angular distribution, sectorization, optimization, observation, geometric median, field recording, minimization method, radio signal
The paper considers a detailed mathematical model of a helicopter-type aircraft autopilot implemented in the Matlab/Simulink simulation environment. Computer simulation is used to examine the behaviour of the system without the application of control laws, confirming the need for correction. To compare the performance of controllers, a comparison is made between a proportional-derivative type fuzzy logic controller with linear and nonlinear control laws.
Keywords: helicopter, altitude control, fuzzy logic controller, automatic control system, flight safety
The article addresses the solution of systems of linear algebraic equations arising in static and steady-state vibration problems solved by the finite element method. A block-sparse matrix format based on the CSR (Compressed Sparse Row) format is presented, along with its GPU implementation using CUDA. A stabilized biconjugate gradient method is implemented and applied to model problems of varying dimensions; a comparison with a reference implementation in MATLAB is also conducted.
Keywords: sparse matrices, finite element method, block matrices, GPU, parallel computing, systems of linear algebraic equations, biconjugate gradient method
The article discusses current threats and vulnerabilities of telephone subscribers in the context of mass digitalization, the development of artificial intelligence and machine learning technologies, and their use in fraudulent scenarios. The study analyzes the main vulnerability factors and provides statistical data on telephone fraud incidents in Russia and abroad. Special attention is given to the phenomena of trust in authority, insufficient digital literacy, and the use of voice synthesis and deepfake technologies for social engineering attacks.
Keywords: social engineering, fraud, vishing, deepfake, artificial intelligence, digital literacy, information security
This article explores the phenomenon of Yuri Gagarin as a cultural symbol embodied in monumental art across various countries. Using interdisciplinary analysis, it traces the evolution of his image—from a historical figure to a universal cultural archetype. It reveals the mechanisms of the sacralization and mythologization of the first cosmonaut, as well as the transformation of his biographical narrative into a symbolic construct imbued with ideological and existential meanings.
Particular attention is paid to a comparative analysis of key monuments to Gagarin as bearers of collective memory. Their artistic features, semiotic codes, and regional differences in representation from the Soviet period to the present are examined. Using specific cities as examples, it demonstrates how monumental images and "Gagarin toponymy" contribute to the formation of national and global identity.
This work contributes to discussions on the construction of cultural heroes, the role of art in historical politics, and the visual representation of scientific and technological progress.
Keywords: Yuri Gagarin, monuments, space age, cultural symbol, collective memory, mythologization, monumental art, historical heritage, cultural diplomacy, Soviet cosmonautics
The article presents an analysis of the quality of services to assess the originality of the "anti-plagiarism" text using the example of texts generated by a neural network. For the analysis, three originality assessment services and texts generated by three different neural networks were used.
Keywords: text originality, anti-plagiarism, neural networks, text analysis, borrowings
The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.
Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object
This paper presents a decision support model for responding to forest fires in mountainous areas using fuzzy logic. The research methods include the Mamdani method for constructing a fuzzy inference system, the use of linguistic variables to describe environmental conditions and risk factors, and the formation of a rule base based on expert knowledge. The developed model implements the principles of situational management and enables determination of the fire danger level, selection of extinguishing methods, response tactics, and optimal resource allocation. Its practical significance lies in the potential application of the model in decision support systems of the Russian Ministry of Emergency Situations for operational planning and forecasting during forest fire suppression in challenging mountainous conditions.
Keywords: forest fires, mountainous terrain, fuzzy logic, decision support, intelligent systems, situational management
Construction work often involves risks when carrying out complex sets of tasks described in the form of network schedules, in particular, risks of violating tender deadlines and project costs. One of the main reasons for increased project risks is a lack of resources. The main objective of this study is to develop a methodology for modeling network schedules under resource constraints, taking into account the stochastic influence of risks on project completion deadlines. The paper analyzes tools for modeling project schedules; describes a mathematical model for estimating project cost based on a network schedule under resource constraints; proposes a method for modeling a network schedule in the AnyLogic environment; develops an algorithm for modeling parallel branches of a project schedule under resource constraints; and describes a method for modeling a network schedule for project work. Testing was conducted based on a network schedule for a project to construct a contact line support. It has been shown that the method allows for obtaining probabilistic estimates of project deadlines and costs under conditions of risk and limited resources. The methodology can be applied to various projects described by network schedules and will allow solving a number of practical tasks: optimizing resources allocated for project implementation, taking into account the time and cost of the project, analyzing risks affecting project implementation, and developing optimal solutions for project risk management.
Keywords: network schedule, work plan, simulation modeling, risk analysis, project duration, project cost
This article describes a developed method for automatically optimizing the parameters of an intelligent controller based on an adaptive genetic algorithm. The key goal of this development is to improve the mechanism for generating an intelligent controller rule base through multiparameter optimization. The genetic algorithm is used to eliminate linguistic uncertainty in the design of control systems based on intelligent controllers. A unique algorithm is proposed that implements a comprehensive optimization procedure structured in three sequential stages: identifying optimal control system parameters, optimizing the structure of the intelligent controller rule base, simulating the automatic generation process, and then optimizing the intelligent controller parameters. Implementation of this approach optimizes the weights of fuzzy logic rules and the centers of the membership functions of linguistic variables.
Keywords: intelligent controller, optimization, genetic algorithm, uncertainty, term set
The paper discusses issues related to the use of graph-theoretic models in text analysis. One of the tasks is to aggregate such models to identify more "simple" graphs, the vertices of which correspond to subsets of the vertices of the original model, and the edges reflect the "strong connections" between the vertices. Using the example of a Russian folk tale plot, it is shown how to build an aggregated model with a given threshold of significance and present it for further analysis. To conduct the experiments, a set of graph-theoretical models for fairy-tale plots from the collection of A.M. Afanasyev was built using the Folklore information system, where the graph aggregation module was improved.
Keywords: text analysis, graph-theoretical model, aggregation, significance threshold, storage format, folklore text, fairy tale plot, information system "Folklore"