×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • A Review of Verification Methods for Zero-Knowledge Proof Protocols

    Information technologies have become increasingly used in various fields, be it document management or payment systems. One of the most popular and promising technologies is cryptocurrency. Since they require ensuring the security and reliability of data in the system, most of them use blockchain and complex cryptographic protocols, such as zero-knowledge proof protocols (ZKP). Therefore, an important aspect for achieving the security of these systems is verification, since it can be used to assess the system's resistance to various attacks, as well as its compliance with security requirements. This paper will consider both the concept of verification itself and the methods for its implementation. A comparison of methods for identifying a proof suitable for zero-knowledge protocols is also carried out. And as a result, a conclusion is made that an integrated approach to verification is needed, since choosing only one method cannot cover all potential vulnerabilities. In this regard, it is necessary to apply various verification methods at various stages of system design.

    Keywords: cryptocurrency, blockchain, verification, formal method, static analysis, dynamic method, zero-knowledge proof protocol

  • A Model for representing weighted multi-label dependencies for detecting rare anomalous events in information security tasks

    This paper proposes a novel model of computer network behavior that incorporates weighted multi-label dependencies to identify rare anomalous events. The model accounts for multi-label dependencies not previously encountered in the source data, enabling a "preemptive" assessment of their potential destructive impact on the network. An algorithm for calculating the potential damage from the realization of a multi-label dependency is presented. The proposed model is applicable for analyzing a broad spectrum of rare events in information security and for developing new methods and algorithms for information protection based on multi-label patterns. The approach allows for fine-tuning the parameters of multi-label dependency accounting within the model, depending on the specific goals and operating conditions of the computer network.

    Keywords: multi-label classification, multi-label dependency, attribute space, computer attacks, information security, network traffic classification, attack detection, attribute informativeness, model, rare anomalous events, anomalous events

  • Micro-housing as a tool for solving urban challenges

    Many major cities around the world are seeing a trend toward compact housing units, typically located in central areas and fully integrated with existing urban infrastructure. Despite similarities in size and location, each project offers unique architectural and social solutions to address the housing crisis and adapt to limited space. With urban density increasing and real estate prices rising, compact housing projects, typically located in central areas and fully integrated with existing infrastructure, are becoming increasingly relevant. Despite the general trend toward smaller spaces, each project offers unique architectural and social responses to the challenges of modern urbanism.

    Keywords: micro-housing, urbanization, architecture, city, infrastructure, mobility, sustainability, renovation, miniaturization, accessibility, autonomy, flexibility, project, space, concept

  • Development of a method for protecting confidential files in a messenger based on an adaptive authentication system and blocking abnormal activity

    The article discusses the development of a method for protecting confidential images in instant messengers based on masking with orthogonal matrices. The vulnerability of the system to brute-force attacks and account compromise is analyzed. The main focus is on the development of an architecture for analyzing abnormal activity and adaptive authentication. The article presents a system structure with independent security components that provide blocking based on brute-force attacks and flexible session management. The interaction of the modules within a unified security system is described, with the distribution of functions between server and client components.

    Keywords: information security, messenger, messaging, communications, instant messaging systems, security audits, and brute-force attacks

  • Development of a model for optimizing the management of fire and rescue units during a fire using neural networks

    The article is devoted to the development of an innovative neural network decision support system for firefighting in conditions of limited visibility. A comprehensive approach based on the integration of data from multispectral sensors (lidar, ultrasonic phased array, temperature and hygrometric sensors) is presented. The architecture includes a hybrid network that combines three-dimensional convolutional and bidirectional LSTM neurons. To improve the quality of processing, a cross-modal attention mechanism is used to evaluate the physical nature and reliability of incoming signals. A Bayesian approach is used to account for the uncertainty of forecasts using the Monte Carlo dropout method. Adaptive routing algorithms allow for quick response to changing situations. This solution significantly improves the efficiency of firefighting operations and reduces the risk to personnel.

    Keywords: mathematical model, intelligence, organizational model, gas and smoke protection service, neural networks, limited visibility, fire department, management, intelligent systems, decision support

  • System analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method

    Problem statement. When modeling a complex technical system, the issues of parameter estimation are of primary importance. To solve this problem, it is necessary to obtain a methodology that allows eliminating errors and inaccuracies in obtaining numerical parameters. Goal. The article is devoted to a systematic analysis of the methodology for estimating the parameters of a complex technical system using the interval estimation method. The research method. A systematic analysis of the methods of using interval estimates of numerical parameters is carried out. The decomposition and structuring of the methods were carried out. Results. The expediency of using a methodology for describing the parameters of a complex technical system using the interval estimation method is shown. An analysis of the use of various interval estimation models is presented. Practical significance. Application in the analysis and construction of complex systems is considered as a practical application option. The method of estimating the parameters of a complex technical system using the interval estimation method can be used as a practical guide.

    Keywords: interval estimation, parameter estimation, numerical data, fuzzy data, complex technical systems

  • Theoretical analysis of identity verification methods based on dynamic characteristics of a handwritten signature

    This paper is devoted to the theoretical analysis and comparative characteristics of methods and algorithms for automatic identity verification based on the dynamic characteristics of a handwritten signature. The processes of collecting and preprocessing dynamic characteristics are considered. An analysis of classical methods, including hidden Markov models, support vector machines, and modern neural network architectures, including recurrent, convolutional, and Siamese neural networks, is conducted. The advantages of using Siamese neural networks in verification tasks under the condition of a small volume of training data are highlighted. Key metrics for assessing the quality of biometric systems are defined. The advantages and disadvantages of the considered methods are summarized, and promising areas of research are outlined.

    Keywords: verification, signature, machine learning, dynamic characteristic, hidden Markov models, support vector machine, neural network approach, recurrent neural networks, convolutional neural networks, siamese neural networks, type I error

  • Experimental Evaluation of the Effectiveness of a Schema Matching Method Based on Machine Learning

    This article investigates the problem of structured data schema matching and aggregates the results from previous stages of the research. The systematization of results demonstrated that while the previously considered approaches show promising outcomes, their effectiveness is often insufficient for real-world application. One of the most effective methods was selected for further study. The Self-Organizing Map method was analyzed, which is based on a criterial analysis of the attribute composition of schemas, using an iterative approach to minimize the distance between points (in the current task, a point represents a schema attribute). An experiment on schema matching was conducted using five examples. The results revealed both the strengths and limitations of the method under investigation. It was found that the selected method exhibits insufficient robustness and reproducibility of results on diverse real-world datasets. The verification of the method confirmed the need for its further optimization. The conclusion outlines directions for future research in this field.

    Keywords: data management, fusion schemes, machine learning, classification, clustering, machine learning, experimental analysis, data metrics

  • A systematic approach to creating lithium-ion batteries: the relationship between the main battery components and the principle of operation

    The article discusses the application of a systematic approach to the development and optimization of lithium-ion batteries (LIBs). Traditional methods that focus on improving individual components (anode, cathode, and electrolyte) often do not lead to a proportional increase in the overall performance of the battery system. The systematic approach views LIBs as a complex, interconnected system where the properties of each component directly influence the behavior of others and the overall performance, including energy and power density, life cycle, safety, and cost. The work analyzes the key aspects of the approach: the interdependence between the main components of a lithium-ion battery, as well as the features of selecting materials for each component. It is proven that only a multidisciplinary approach that combines chemistry, materials science, and engineering can achieve a synergistic effect and create highly efficient, safe, and reliable battery systems for modern applications.

    Keywords: lithium-ion battery, system approach, electrode materials, degradation, optimization, cathode, LTO, NMC

  • Choosing a codec for video encoding digital content

    Choosing the best video compression method is becoming increasingly important as the volume of online video grows rapidly. By 2026, people are predicted to watch 82% more video online than in 2020. This means finding a balance between image quality, processing speed, and file size. To achieve the desired parameters, it's crucial to choose the right codec.
    This paper compares five popular codecs—MPEG-2, MPEG-4, VP9, ​​MJPEG, and ProRes. Each codec offers its own unique method for compressing video, yielding different file sizes and image quality. The goal was to determine which codec is best suited for various applications: video calls, professional filming, and online broadcasts.
    The experiments were conducted on a server with four processor cores, 8 GB of RAM, and an 80 GB SSD. Measurements were taken to determine the speed of each codec, the resulting file size, and the video quality. Based on the results of these tests, recommendations were made on which codec to choose and how it can be improved in different scenarios.

    Keywords: video codec, MPEG-2, MPEG-4, VP9, MJPEG, ProRes, AVC, compression, coding

  • Biophilic Design in Healthcare Architecture, Its Applications, and Benefits: A Review

    The principles of biophilic design are becoming a key component of the architectural design of medical facilities due to the well-known psychological impact of natural elements on patients and medical staff. The inclusion of natural elements, such as the use of plants, natural light and shade, colors found in nature, and naturally occurring patterns and curves, in medical facilities has been shown to create a psychologically safe environment that promotes the health and well-being of patients and staff. This article explores the fundamental principles of biophilic design, the scientific evidence supporting its therapeutic effects, and practical examples of its use in healthcare settings to improve psychological health and well-being. This work contributes to the existing body of knowledge on biophilic design by providing an up-to-date review of recent research and real-world applications, including challenges

    Keywords: biophilia, biophilic design, sustainable architecture, healthcare architecture, well-being, sustainability, biophilic architecture

  • Numerical simulation for finding the refractive index of a thin film of an interference coating using the results of measuring the reflection spectrum

    The practice of producing optical interference coatings shows that when using new thin-film materials, obtaining optical products with specified quality function requirements depends on the accuracy of their refractive index. The results of its evaluation on large frequency crystals differ, which does not allow narrowband filters with the required technical parameters. This article proposes an approach to estimating the parameters of the refractive index of a thin film based on solving the inverse synthesis problem, which is based on the experimental determination of the thickness of sprayed films using an X-ray fluorescence coating thickness analyzer and data on the reflection coefficient spectrum obtained using a broadband spectrophotometer. The numerical modeling carried out during the study showed that even if there are 5% tolerances for estimating the thickness of coatings, a fairly accurate determination of the refractive index can be expected. The correctness of the results of using this approach was verified by using a thin film with a known refractive index, which was also determined using the proposed method of numerical modeling of the reflection spectrum of the digital twin coating.

    Keywords: interference coating, numerical modeling, reflection coefficient spectrum

  • Using a local approach to hierarchical text classification

    The article forms the task of hierarchical classification of texts, describes approaches to hierarchical classification and metrics for evaluating their work, examines in detail the local approach to hierarchical classification, describes different approaches to local hierarchical classification, conducts a series of experiments on training local hierarchical classifiers with various vectorization methods, compares the results of evaluating the work of trained classifiers.

    Keywords: classification, hierarchical classification, local classification, hierarchical presicion, hierarchical recall, hierarchical F-measure, natural language processing, vectorization

  • Construction of a mathematical model and calculation of numerical values of the delayed filtering operator for the L-Markov process

    Разработан алгоритм и составлена программа на языке программирования Python для расчета численных значений оптимального оператора фильтрации с запаздыванием для L-марковского процесса с квазирациональной спектральной плотностью, являющегося обобщением марковского процесса с рациональным спектром. В основе построения оптимального оператора фильтрации с запаздыванием лежит спектральная теория случайных процессов. Расчетная формула оператора фильтрации была получена с использованием теории L-марковских процессов, методов вычисления стохастических интегралов, теории функций комплексного переменного и методов тригонометрической регрессии. Рассмотрен интересный с точки зрения управления сложными стохастическими системами пример L-марковского процесса (сигнала) с квазирациональным спектром. За основу при построении математической модели оптимального оператора фильтрации с запаздыванием была взята тригонометрическая модель. Показано, что значения оператора фильтрации с запаздыванием представляются линейной комбинацией значений принимаемого сигнала в определенные моменты времени и значений синусоидальных и косинусоидальных функций в те же моменты. Установлено, что числовые значения оператора фильтрации существенно зависят от параметра β совместной спектральной плотности принимаемого и передаваемого сигналов, в связи с чем в работе рассматривались три разные задачи прохождения сигнала через разные физические среды. Установлено, что абсолютная величина действительной части оператора фильтрации на всех трех интервалах изменения срока запаздывания и во всех трех средах превышает абсолютную величину мнимой части в среднем в два и более раз. Построены графики зависимости действительных и мнимых частей оператора фильтрации от срока запаздывания τ, а также трехмерные графики зависимости самого оператора фильтрации с запаздыванием от срока запаздывания. Дано физическое обоснование полученным результатам.

    Keywords: random process, L-Markov process, noise, delayed filtering, spectral characteristic, filtering operator, trigonometric trend, standardized approximation error

  • An algorithm for implementing an optimal filtering operator with a prediction based on its synthesized mathematical model for an L-Markov process with a quasi-rational spectrum

    A mathematical model has been constructed, an algorithm has been developed, and a program has been written in the Python programming language for calculating the numerical values of the optimal filtering operator with a forecast for an L-Markov process with a quasi-rational spectrum. The probabilistic model of the filtering operator formula has been obtained based on the spectral analysis of L-Markov processes using methods for calculating stochastic integrals, the theory of analytical functions of a complex variable, and methods for correlation and regression analysis. Considered an example of L-Markov process, the values of the optimal filtering operator with a forecast for which it was possible to express in the form of a linear combination of the values of the process at some moments of time and the sum of numerical values of cosines and sines at the same moments. The basis for obtaining the numerical values of the filtering operator was the mathematical model of trigonometric regression with 16 harmonics, which best approximates the process under study and has a minimum

    Keywords: random process, L-Markov process, prediction filtering, spectral characteristics, filtering operator