×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Mathematical models and optimization methods in the management of organizational systems: theory, methodology, and practice of application in expert activity

    The article presents a comprehensive study of the possibilities of applying mathematical optimization methods to improve the efficiency of managing organizational systems, using the example of forensic expert institutions. The work focuses on a critical analysis and adaptation of classical assignment theory to the realities of managing expert activities, which are characterized by high responsibility, diverse tasks, and strict procedural limitations. The evolution from simple linear assignment models to complex, multi-criteria, and generalized formulations that can adequately reflect the requirements for quality, urgency, and workload balance is analyzed in detail. The theoretical foundations and limits of applicability of key optimization paradigms, such as scheduling theory, the transportation problem, and the traveling salesman problem, have been investigated.

    Keywords: management of organizational systems, resource allocation optimization, assignment theory, multi-criteria optimization, generalized assignment problem, load balancing, expert activity management, scheduling algorithms, decision support system

  • A method of protection against the Sybil attack based on the analysis of the correlogram of the electromagnetic field power map of network traffic

    This paper discusses a method for countering Sybil attacks in distributed systems based on the analysis of electromagnetic power maps of the temporal characteristics of network traffic. The key hypothesis is that multiple Sybil identifiers controlled by a single attacker node exhibit statistically significant correlation in their network activity patterns, which can be identified using a correlogram. A method for detecting Sybil attacks in wireless networks is proposed based on the analysis of correlograms of electromagnetic signal power maps. The method exploits the statistical properties of power profiles arising from the correlation of network activity of Sybil nodes controlled by a single attacker. A protection system architecture has been developed, including modules for network activity monitoring, correlogram calculation, clustering, and anomaly detection. A set of 10 correlogram parameters is introduced for attack identification, including profile variance, randomness and periodicity coefficients, spectral density, and correlation characteristics. Experimental testing on a millimeter-wave radar station demonstrated detection accuracy ranging from 83.2% to 97.4%. To improve the method's effectiveness, the use of deep neural networks after accumulating a sufficient amount of data is proposed. The proposed method enables the identification and denial of compromised identifiers, increasing the resilience of P2P networks, blockchain systems, and distributed ledgers.

    Keywords: Sybil attack, distributed systems security, correlogram, network traffic analysis, time series, autocorrelation, anomaly detection

  • Comparative analysis of the assessment of the attribution of compromise indicators to targeted cyberattacks by attackers based on the Bayesian approach

    The article is devoted to the method of formalizing indicators of compromise (IoC) using a Bayesian approach to classify and rank them based on probabilistic inference. The problem of detecting malicious indicators from a large volume of data found in various sources of threat information is critically important for assessing modern cybersecurity systems. Traditional heuristic approaches, based on simple aggregation or expert evaluation of IoCs, do not provide sufficient formalization and further ranking of their reliability regarding their association with a particular malicious campaign due to the incompleteness and uncertainty of the information received from various sources.

    Keywords: indicators of compromise (IoC), Bayesian inference, cyber threats, probabilistic models, malicious activity analysis, threat intelligence, IoC classification, multi-source analysis

  • Algorithm for calculating the mathematical submodel of the chain section of a rotary tubular kiln for sintering nepheline concentrate with limestone in alumina production

    The paper presents an algorithm for calculating thermal processes in the chain section of rotary tubular kilns used for sintering nepheline concentrate with limestone. The model is based on heat and mass balances and accounts for interactions between the gas flow, the material bed, dust particles, and the refractory lining. The algorithm considers the influence of the geometry and packing density of the chain curtain on heat transfer and is integrated with submodels of axial material movement and dust carryover. The calculation is implemented as an iterative scheme that ensures consistency between gas and material temperatures. The algorithm makes it possible to determine temperature distributions, heat fluxes and losses, as well as to perform parametric optimization of kiln operating conditions and design.

    Keywords: rotary tubular kiln, nepheline concentrate, mathematical model, chain section, heat transfer, material movement, dust carryover, algorithm

  • Genetic search as a tool for overcoming linguistic uncertainty

    This article describes a developed method for automatically optimizing the parameters of an intelligent controller based on an adaptive genetic algorithm. The key goal of this development is to improve the mechanism for generating an intelligent controller rule base through multiparameter optimization. The genetic algorithm is used to eliminate linguistic uncertainty in the design of control systems based on intelligent controllers. A unique algorithm is proposed that implements a comprehensive optimization procedure structured in three sequential stages: identifying optimal control system parameters, optimizing the structure of the intelligent controller rule base, simulating the automatic generation process, and then optimizing the intelligent controller parameters. Implementation of this approach optimizes the weights of fuzzy logic rules and the centers of the membership functions of linguistic variables.

    Keywords: intelligent controller, optimization, genetic algorithm, uncertainty, term set

  • Creating a C# Application for Modeling Maximum Flow in a Transportation Network

    This article examines transportation network modeling using the Ford–Fulkerson algorithm. It describes the process of finding a minimum cut using a graphical editor and library developed in the C# programming language. Key concepts of graph and network theory are presented to clarify the problem statement. An example of solving a transportation problem using the developed software is shown, and the program's results are compared with a control example.

    Keywords: transportation network, maximum flow problem, Ford–Fulkerson algorithm, minimum cut in the network, software library, graphical editor, C# programming language

  • On the development and implementation of the basic model of information support for decision-making in the organizational systems of information security units of the Ministry of Emergency Situations of Russia

    The article presents a basic model for information support of decision-making designed to enhance the efficiency and resilience of organizational systems within the information security units of the Russian Ministry of Emergency Situations (EMERCOM). The model constitutes an integrated, multi-level system based on the interaction of five interrelated mathematical models: data collection and preprocessing, automated classification, situation forecasting and analysis, decision option generation, and knowledge management. To enhance the model’s functionality and adaptability under conditions of uncertainty, the following formulas have been introduced: assessment of data processing system workload; automatic calibration of weighting coefficients based on forecast error minimization; calculation of information source credibility index; weighted event evaluation accounting for source credibility; decision explainability using the SHAP method; and knowledge utility metrics together with criteria for knowledge archiving. These formulas ensure objectivity, transparency, and robustness of management processes, enabling rapid response to cyber threats, minimizing the impact of human factors, and maintaining high-quality managerial decision-making.

    Keywords: information support, decision-making, organizational system, basic model, explainability of decisions, knowledge management

  • Choosing a codec for video encoding digital content

    Choosing the best video compression method is becoming increasingly important as the volume of online video grows rapidly. By 2026, people are predicted to watch 82% more video online than in 2020. This means finding a balance between image quality, processing speed, and file size. To achieve the desired parameters, it's crucial to choose the right codec.
    This paper compares five popular codecs—MPEG-2, MPEG-4, VP9, ​​MJPEG, and ProRes. Each codec offers its own unique method for compressing video, yielding different file sizes and image quality. The goal was to determine which codec is best suited for various applications: video calls, professional filming, and online broadcasts.
    The experiments were conducted on a server with four processor cores, 8 GB of RAM, and an 80 GB SSD. Measurements were taken to determine the speed of each codec, the resulting file size, and the video quality. Based on the results of these tests, recommendations were made on which codec to choose and how it can be improved in different scenarios.

    Keywords: video codec, MPEG-2, MPEG-4, VP9, MJPEG, ProRes, AVC, compression, coding

  • Systems of weight control and accounting of target mixtures using network technologies

    This article discusses an approach to the development of a control and accounting system for the target mixture loaded into glass furnaces located in machine shops of both a single plant and a group of glass plants belonging to one enterprise. A structural scheme is proposed for organizing the collection, processing and storage of data obtained from weight indicators of various models that support their own network frame formats. As an example, a network scheme for the implementation of the designated control and accounting system for target mixtures is demonstrated, applied to two geographically remote glass factories, using a mechanism for building private networks on top of open and public communication channels. The effectiveness of the proposed approaches to the organization of operational control over the volumes of loading of the target mixture into glass furnaces is substantiated, as well as the expediency of using this solution

    Keywords: glass production, technological process, automated control system, charge accounting, weighing device, weight indicator, generalized block diagram, network diagram, interface converter, private network, database

  • The Influence of Variability in the Deformation Characteristics of Concrete and Reinforcement on the Load-Bearing Capacity of Eccentrically Compressed Reinforced Concrete Elements

    In reinforced concrete design standards, the values of concrete strain are taken as average values, whereas the strength characteristics are adopted with a high level of reliability. In the ultimate force method for calculating reinforced concrete structures, the strains of concrete and reinforcement are not directly used in the governing equations. In calculations based on the nonlinear deformation model, the strain values are directly used in the analysis. Using average values of the ultimate strains of concrete reduces the reliability of the obtained results. This study examines the influence of the variability of deformation characteristics of concrete and reinforcement on the load-bearing capacity of eccentrically compressed reinforced concrete elements. It was found that the variability of the deformation characteristics of concrete and reinforcement significantly affects the load-bearing capacity of eccentrically compressed reinforced concrete elements. This influence increases with the reinforcement ratio and depends on the eccentricity of the applied axial force. The reliability and safety of eccentrically compressed reinforced concrete elements decrease significantly when average values of the deformation characteristics of concrete and reinforcement are used in calculations.

    Keywords: eccentric compression, reinforced concrete, variability of deformation characteristics, concrete, load-bearing capacity, reinforcement, nonlinear deformation model

  • Methodology and algorithms for solving management tasks to ensure reliability and efficiency of organizational systems of information security units of EMERCOM of Russia

    The paper presents a methodology that includes stages of task performance control, data collection and analysis, determination of reliability and efficiency criteria, reasonable selection, communication, implementation and control of the results of management decisions. A cyclic algorithm for comprehensive verification of compliance with the reliability and efficiency criteria of the system has been developed, allowing for prompt response to changes, increased system stability and adaptation to adverse environmental impacts. Improved mathematical formulas for assessing the state of organizational systems are proposed, including calculation of the readiness factor, level of planned task performance and compliance with established requirements. The application of the methodology is aimed at increasing the validity of decisions made while reducing the time for decision-making, as well as ensuring the relevance, completeness and reliability of information in information resources in the interests of sustainable development of organizational systems.

    Keywords: algorithms, time, control, reliability and efficiency criteria, indicators, resources, management decisions, cyclicity

  • Digital signal processing algorithm for monitoring critical parameters of the power supply network

    The article presents a digital processing algorithm for monitoring short-circuit currents in the power supply network. It is proposed to carry out control by calculating the rate of change of current. An algorithm based on a digital differentiating filter with suppression of high-frequency components has been developed. Based on the Fourier series, a non-recursive filter is formed, the characteristics of which are improved using the Lanczos smoothing method. It is proposed to use a recursive filter transformed from a non-recursive one using the B.L. Ho algorithm to save processing. The algorithm is easily implemented as programs for microprocessor systems. A filter based on an analog prototype is presented. A simulation of the short circuit process has been carried out.

    Keywords: power supply, short-circuit current, data processing algorithm, power supply system monitoring, digital differentiating filter

  • A promising method of trenchless pipeline laying

    The invention related to the field of construction is proposed, which can be used for trenchless linear laying of oil, gas and other pipelines under natural and artificial obstacles, linear and extended structures (highways, railroads, etc.) located, including in monolithic rocky soils with simultaneous formation of a case, development and arrangement of a pre-drilled well.

    Keywords: pilot well, diamond wire rope, foundation pit, encasement, working body, circular sector

  • The problem of territorial identity as one of the foundations of the formation of the anthropogenic environment in the framework of the architectural profession

    The study aims to develop a model for integrating principles of territorial identity into the training of architects and urban planners to overcome the impersonality of the urban environment. An analysis of educational programs at 25 Russian universities revealed a systemic deficit in developing competencies for working with regional context. As a solution, a proposed academic discipline with a course project titled "Tourist Cluster 'Myth of Place'" is introduced, aimed at cultivating skills for identifying and interpreting the unique code of a territory through design. Its implementation is intended to enhance tourism appeal, stimulate the local economy, and strengthen the social capital of regions. This could also reduce the outflow of qualified professionals by creating in-demand local professional practice.

    Keywords: architectural education, myth of space in architecture, territorial identity

  • Collaboration of art and science in architectural solutions of mixed reality

    Mixed reality is penetrating deeper and faster into all aspects of our modern life. The influence of new technologies has not spared modern architecture, which aims to create not only beautiful, but also functional spaces and thus combines art and science. In addition to exploring examples of successful collaborations of artistic concepts and scientific principles in the design of spaces, the article will also consider the introduction of mixed reality into architectural projects. Let's explore exactly how the fields of art and science interact with each other. These two areas complement each other, creating a harmonious and practical environment for living, working and relaxing. This article examines the collaboration of art and science in the context of mixed reality architectural solutions.

    Keywords: architecture, art, science, collaboration, mixed reality, platform, Art&Science, interaction, benefits, digital objects, visual component, joint projects