The article discusses aspects of the implementation of the architecture of cultural and educational centres in industrial cities. This article reveals historical context of the formation of cultural and educational institutions in the structure of industrial cities. Some of the objects in cities of the Donbass region are given as examples, including the context of architectural revitalization. The term "rehabilitation" is analyzed in relation to architectural and urban planning activities. The factors that determine the need for social rehabilitation in industrial cities are given in this article, including those applicable to the cities of the Donbass region. The aspects of social rehabilitation are formulated in this paper, which make it possible to apply this concept to industrial territories. Some socio-economic aspects, that reveal the meaning of architectural reinterpretation of objects of industrial and post-industrial territories, are given in this paper. Special attention is paid to the potential of cultural and educational centers as a tool for integrating former industrial territories into modern urban space.
Keywords: architectural heritage, industrial city, culture, cultural and educational institution, social environment, leisure, rehabilitation, modernization, architectural transformation, sustainable urban development, regional specifics
This article examines a method for visually interpreting a scientific hypothesis for its subsequent embodiment in an architectural structure. Using the mathematical model of the Morris-Thorne Wormhole—a tunnel that allows travel through time and space, which underlies the concept of a cable-stayed bridge—as an example, it explores methods and techniques for forming associative links between architectural form and modern scientific ideas in astrophysics. In addition to creating an artistic image of a scientific phenomenon, the architectural structure is developed from a functional and structural perspective, as a comprehensive design solution. Furthermore, its placement in a real-life environment highlights the potential for a cable-stayed bridge to integrate with the surrounding natural environment. An important factor in the architectural concept is the emotional and psychological impact of the designed structure on people, which must fully express the scientific hypothesis.
Keywords: architecture, design, cable-stayed structures, architectural model, tectonics, image, concept, material, scientific hypothesis, wormhole
This paper examines the problem of assessing the influence of social network users and their groups in disseminating information among audiences. Forming a network of user subsets to initiate informational influence is a computationally complex problem with a stochastically uncertain outcome. Existing centrality metrics typically involve searching for all shortest paths in a graph or solving large-scale systemic sources. This paper provides approximate estimates of the influence of individual network participants and their subsets, based on modifications of the Flageolet-Martin algorithm. A greedy algorithm based on electronic metrics is also proposed, enabling coalition formation by iteratively supplementing it with quasi-optimal elements. The obtained results can be applied to problems of information analysis, forecasting, and planning in social networks.
Keywords: Social network, informational influence, coalition, influence, connection graph, centrality metric, closeness centrality, shortest path, route, approximate estimate, greedy algorithm
The article discusses modern methods for protecting bank customers' personal information based on differential anonymization of data using trusted neural networks. It provides an overview of the regulatory framework, analyzes technological approaches and describes a developed multi-level anonymization model that combines cryptographic and machine learning techniques. Special attention is paid to balancing between preserving data utility and minimizing the risk of customer identity disclosure.
Keywords: differential anonymization, trusted neural network, personal data, banking technologies, information security, cybersecurity
The article discusses current threats and vulnerabilities of telephone subscribers in the context of mass digitalization, the development of artificial intelligence and machine learning technologies, and their use in fraudulent scenarios. The study analyzes the main vulnerability factors and provides statistical data on telephone fraud incidents in Russia and abroad. Special attention is given to the phenomena of trust in authority, insufficient digital literacy, and the use of voice synthesis and deepfake technologies for social engineering attacks.
Keywords: social engineering, fraud, vishing, deepfake, artificial intelligence, digital literacy, information security
This article explores the phenomenon of Yuri Gagarin as a cultural symbol embodied in monumental art across various countries. Using interdisciplinary analysis, it traces the evolution of his image—from a historical figure to a universal cultural archetype. It reveals the mechanisms of the sacralization and mythologization of the first cosmonaut, as well as the transformation of his biographical narrative into a symbolic construct imbued with ideological and existential meanings.
Particular attention is paid to a comparative analysis of key monuments to Gagarin as bearers of collective memory. Their artistic features, semiotic codes, and regional differences in representation from the Soviet period to the present are examined. Using specific cities as examples, it demonstrates how monumental images and "Gagarin toponymy" contribute to the formation of national and global identity.
This work contributes to discussions on the construction of cultural heroes, the role of art in historical politics, and the visual representation of scientific and technological progress.
Keywords: Yuri Gagarin, monuments, space age, cultural symbol, collective memory, mythologization, monumental art, historical heritage, cultural diplomacy, Soviet cosmonautics
The article considers the problem of constructing a continuous displacement trajectory based on nodal feedback data in control systems with prediction of external load. The use of interpolation by cubic Fergusson splines is proposed. The proposed approach has computational efficiency and is applicable in adaptive control systems, including control of rotational movements in a non-deterministic environment.
Keywords: control, predictive models, MPC, external load, interpolation, spline, trajectory of the control object
This paper presents a decision support model for responding to forest fires in mountainous areas using fuzzy logic. The research methods include the Mamdani method for constructing a fuzzy inference system, the use of linguistic variables to describe environmental conditions and risk factors, and the formation of a rule base based on expert knowledge. The developed model implements the principles of situational management and enables determination of the fire danger level, selection of extinguishing methods, response tactics, and optimal resource allocation. Its practical significance lies in the potential application of the model in decision support systems of the Russian Ministry of Emergency Situations for operational planning and forecasting during forest fire suppression in challenging mountainous conditions.
Keywords: forest fires, mountainous terrain, fuzzy logic, decision support, intelligent systems, situational management
Construction work often involves risks when carrying out complex sets of tasks described in the form of network schedules, in particular, risks of violating tender deadlines and project costs. One of the main reasons for increased project risks is a lack of resources. The main objective of this study is to develop a methodology for modeling network schedules under resource constraints, taking into account the stochastic influence of risks on project completion deadlines. The paper analyzes tools for modeling project schedules; describes a mathematical model for estimating project cost based on a network schedule under resource constraints; proposes a method for modeling a network schedule in the AnyLogic environment; develops an algorithm for modeling parallel branches of a project schedule under resource constraints; and describes a method for modeling a network schedule for project work. Testing was conducted based on a network schedule for a project to construct a contact line support. It has been shown that the method allows for obtaining probabilistic estimates of project deadlines and costs under conditions of risk and limited resources. The methodology can be applied to various projects described by network schedules and will allow solving a number of practical tasks: optimizing resources allocated for project implementation, taking into account the time and cost of the project, analyzing risks affecting project implementation, and developing optimal solutions for project risk management.
Keywords: network schedule, work plan, simulation modeling, risk analysis, project duration, project cost
This article describes a developed method for automatically optimizing the parameters of an intelligent controller based on an adaptive genetic algorithm. The key goal of this development is to improve the mechanism for generating an intelligent controller rule base through multiparameter optimization. The genetic algorithm is used to eliminate linguistic uncertainty in the design of control systems based on intelligent controllers. A unique algorithm is proposed that implements a comprehensive optimization procedure structured in three sequential stages: identifying optimal control system parameters, optimizing the structure of the intelligent controller rule base, simulating the automatic generation process, and then optimizing the intelligent controller parameters. Implementation of this approach optimizes the weights of fuzzy logic rules and the centers of the membership functions of linguistic variables.
Keywords: intelligent controller, optimization, genetic algorithm, uncertainty, term set
The paper discusses issues related to the use of graph-theoretic models in text analysis. One of the tasks is to aggregate such models to identify more "simple" graphs, the vertices of which correspond to subsets of the vertices of the original model, and the edges reflect the "strong connections" between the vertices. Using the example of a Russian folk tale plot, it is shown how to build an aggregated model with a given threshold of significance and present it for further analysis. To conduct the experiments, a set of graph-theoretical models for fairy-tale plots from the collection of A.M. Afanasyev was built using the Folklore information system, where the graph aggregation module was improved.
Keywords: text analysis, graph-theoretical model, aggregation, significance threshold, storage format, folklore text, fairy tale plot, information system "Folklore"
The article deals with the problem of quantifying the security of objects of the penal correction system based on mathematical modeling. The authors propose a modified genetic algorithm in which the traditional fitness function is replaced by a mechanism of "virtual movement" of individuals in a discrete space, which allows taking into account both the individual characteristics of safety measures and their cumulative impact. A step-by-step example of applying the algorithm to choosing the optimal set of protective measures based on expert assessments based on several criteria is given. The results demonstrate the effectiveness of the proposed approach for solving multi-criteria tasks of assessing and improving security in conditions of uncertainty and the absence of an explicit analytical relationship between system parameters.
Keywords: security, vulnerability, event, penal enforcement system, genetic algorithm, mathematical modeling, optimization, expert assessment, criterion, security, security regime, discrete space, coalition, crossing, fitness function
Information technologies have become increasingly used in various fields, be it document management or payment systems. One of the most popular and promising technologies is cryptocurrency. Since they require ensuring the security and reliability of data in the system, most of them use blockchain and complex cryptographic protocols, such as zero-knowledge proof protocols (ZKP). Therefore, an important aspect for achieving the security of these systems is verification, since it can be used to assess the system's resistance to various attacks, as well as its compliance with security requirements. This paper will consider both the concept of verification itself and the methods for its implementation. A comparison of methods for identifying a proof suitable for zero-knowledge protocols is also carried out. And as a result, a conclusion is made that an integrated approach to verification is needed, since choosing only one method cannot cover all potential vulnerabilities. In this regard, it is necessary to apply various verification methods at various stages of system design.
Keywords: cryptocurrency, blockchain, verification, formal method, static analysis, dynamic method, zero-knowledge proof protocol
This paper proposes a novel model of computer network behavior that incorporates weighted multi-label dependencies to identify rare anomalous events. The model accounts for multi-label dependencies not previously encountered in the source data, enabling a "preemptive" assessment of their potential destructive impact on the network. An algorithm for calculating the potential damage from the realization of a multi-label dependency is presented. The proposed model is applicable for analyzing a broad spectrum of rare events in information security and for developing new methods and algorithms for information protection based on multi-label patterns. The approach allows for fine-tuning the parameters of multi-label dependency accounting within the model, depending on the specific goals and operating conditions of the computer network.
Keywords: multi-label classification, multi-label dependency, attribute space, computer attacks, information security, network traffic classification, attack detection, attribute informativeness, model, rare anomalous events, anomalous events
The paper investigates the specifics of the digital implementation of a rotor synchronization control algorithm for the SV-2M two-rotor vibration unit. The influence of the sampling period on the stability of the synchronous mode is evaluated using computer simulations in MATLAB/Simulink, with time quantization and zero-order hold delay explicitly accounted for. A comparative analysis of the digital and analog versions of the algorithm has been performed. The boundary values of the discretization periods for different values of the given total energy of the system have been determined. The obtained results confirm the applicability of the proposed approach for digital control systems of vibratory equipment.
Keywords: digital control, rotor synchronization, two-rotor vibration unit, speed-gradient algorithm, extrapolator