The article is devoted to innovative approaches to the use of environmentally safe polymer binders in the production of thermal insulation materials (TIM) based on vegetable raw materials. The relevance of the work is due to the need to replace traditional synthetic polymers such as polyurethane foam, polystyrene foam, and mineral wool, which in the process of operation emit toxic substances with cumulative properties. Research shows that the use of biopolymers and renewable resources, such as castor oil-based polyurethane resins and casein adhesives, can significantly reduce environmental burdens and improve material safety. Special attention is given to thermoplastic and thermoset matrices, their properties, and applications in composite materials. Thermoplastics such as polyethylene and polypropylene have high impact resistance and recyclability but are limited in application due to the difficulty of processing and high melting point. Thermoset matrices, despite their high strength and resistance to chemical attack, are molded only once, making them difficult to recycle. This article discusses the advantages and disadvantages of different polymer binders and their prospects in the context of environmental sustainability and the efficiency of thermal insulation materials. The research is aimed at improving the physical and mechanical properties of composites and optimizing production processes to create affordable and environmentally friendly thermal insulation materials.
Keywords: innovative approaches, environmentally safe polymers, thermal insulation materials (TIM), plant raw materials, biopolymers, renewable resources, thermoplastics, thermosetting matrices, environmental sustainability, physical and mechanical properties
This article examines the main stages of the history of high-rise construction, describes the periods of evolution of the architecture of skyscrapers and structural systems. The analysis of modern high-rise housing construction is carried out, on the basis of which prospects are identified and trends in the development of this area are outlined. The General Plan of the city of Moscow and the housing renovation program have been studied. An assessment is given and information is provided on the expansion of the Moscow City project. Projects on the construction of residential skyscraper complexes have been studied. High-rise construction projects in the cities of St. Petersburg, Yekaterinburg, Vladivostok are considered. The achievements in the field of high-rise housing construction using the latest materials and equipment are shown. The trends of housing development of different heights in comparison by region are revealed. It is concluded that only after studying the history of high-rise construction we can begin to implement the design. The study provides an opportunity to get acquainted with the achievements in the fields of high-rise housing construction, the use of innovative technologies, materials and equipment in different regions of Russia.
Keywords: high-rise buildings, skyscrapers, residential real estate, renovation, multifunctional complex, design and construction, construction of high-rise buildings, construction history, Moscow City, Yekaterinburg City, building materials
The main maintenance of a diversification of production as activity of subjects of managing is considered. being shown in purchase of the operating enterprises, the organizations of the new enterprises, redistribution of investments in interests of the organization and development of new production on available floor spaces. The most important organizational economic targets of a diversification of management are presented by innovative activity of the industrial enterprise.
Keywords: software systems, visualization, data, graphic systems, parts, models, diagrams, drawings
The paper presents an analysis of the methods for the chemical modification of biochar. The characteristics of acid and basic modifications, modifications with hydrogen peroxide, sulfonation, amination, impregnation with metal oxides, and magnetization are examined. It is demonstrated that the method of modification, the parameters of the technological process, and the nature of the modifying agent all exert an influence on the chemical composition, structure, porosity, pore size, and total specific surface area of the modified coal. The combination of methods, technological parameters, and modifiers allows for the production of sorbents for wastewater treatment based on biochar with specific properties for the sorption of certain groups of different pollutants.
Keywords: biochar, chemical modification, sorption properties, porosity, pore size
Road construction plays an important role in the infrastructural development of any country. Road infrastructure is a network of roads and motorways that move goods and passengers between and within cities and regions. A well-developed road network contributes to economic growth by providing easy access to markets, reducing transport costs and facilitating more efficient logistics. Roads play an important role in providing accessibility to remote and sparsely populated regions, which contributes to the social and economic development of these areas. Modern motorways provide safer and more comfortable travel for drivers and passengers, and reduce journey times. Roads serve as an important part of the transport infrastructure for the movement of goods. They provide access to ports, railway stations and other transport hubs. Well-developed motorways contribute to the development of tourism as they make tourist destinations and attractions accessible. The article provides a statistical analysis of the construction of federal and regional highways in the period 2021-2023 for eight districts of the Russian Federation. Diagrams of the length of constructed motorways in each district are given, and the main parameters of descriptive statistics are calculated.
Keywords: roads, construction, road infrastructure, motorways, motorways, non motorways, statistical analysis
In recent years, there has been a notable increase in the popularity of modular construction in Russia and in other countries. This form of construction offers a number of advantages, including a reduction in construction time, a decrease in costs, an improvement in the quality of modular construction, and a reduction in the negative environmental impact.
Keywords: еhe subject matter encompasses modular construction, prospects, Russia, international experience, construction technologies, housing construction, and innovations
The design stage is one of the stages of the life cycle of a construction object, having its own significance for all subsequent processes. Despite the relatively low percentage of the cost of design work in relation to the cost of construction, design has a tremendous impact on the implementation of construction work. Finding the place of design in the life cycle and construction production system emphasizes the need for careful study of this stage.
Keywords: construction, design, management, life cycle, organizational structure
The article examines the transition of universities from data warehouses to data lakes, revealing their potential in processing big data. The introduction highlights the main differences between storage and lakes, focusing on the difference in the philosophy of data management. Data warehouses are often used for structured data with relational architecture, while data lakes store data in its raw form, supporting flexibility and scalability. The section ""Data Sources used by the University"" describes how universities manage data collected from various departments, including ERP systems and cloud databases. The discussion of data lakes and data warehouses highlights their key differences in data processing and management methods, advantages and disadvantages. The article examines in detail the problems and challenges of the transition to data lakes, including security, scale and implementation costs. Architectural models of data lakes such as ""Raw Data Lake"" and ""Data Lakehouse"" are presented, describing various approaches to managing the data lifecycle and business goals. Big data processing methods in lakes cover the use of the Apache Hadoop platform and current storage formats. Processing technologies are described, including the use of Apache Spark and machine learning tools. Practical examples of data processing and the application of machine learning with the coordination of work through Spark are proposed. In conclusion, the relevance of the transition to data lakes for universities is emphasized, security and management challenges are emphasized, and the use of cloud technologies is recommended to reduce costs and increase productivity in data management. The article examines the transition of universities from data warehouses to data lakes, revealing their potential in processing big data. The introduction highlights the main differences between storage and lakes, focusing on the difference in the philosophy of data management. Data warehouses are often used for structured data with relational architecture, while data lakes store data in its raw form, supporting flexibility and scalability. The section ""Data Sources used by the University"" describes how universities manage data collected from various departments, including ERP systems and cloud databases. The discussion of data lakes and data warehouses highlights their key differences in data processing and management methods, advantages and disadvantages. The article examines in detail the problems and challenges of the transition to data lakes, including security, scale and implementation costs. Architectural models of data lakes such as ""Raw Data Lake"" and ""Data Lakehouse"" are presented, describing various approaches to managing the data lifecycle and business goals. Big data processing methods in lakes cover the use of the Apache Hadoop platform and current storage formats. Processing technologies are described, including the use of Apache Spark and machine learning tools. Practical examples of data processing and the application of machine learning with the coordination of work through Spark are proposed. In conclusion, the relevance of the transition to data lakes for universities is emphasized, security and management challenges are emphasized, and the use of cloud technologies is recommended to reduce costs and increase productivity in data management.
Keywords: data warehouse, data lake, big data, cloud storage, unstructured data, semi-structured data
The development and application of methods of preliminary processing of tabular data for solving problems of multivalued classification of computer attacks is considered. The object of the study is a data set containing multivalued records collected using a hardware and software complex developed by the authors. The analysis of the attributes of the dataset was carried out, during which 28 attributes were identified that are of the greatest informational importance when used for classification by machine learning algorithms. The expediency of using autoencoders in the field of information security, in tasks related to datasets with the property of ambiguity of target attributes is substantiated. Practical significance: data preprocessing can be used to improve the accuracy of detecting and classifying multi-valued computer attacks.
Keywords: information security, computer attacks, multi-label, multi-label classification, multivalued classification, dataset analysis, experimental data collection, multivalued data, network attacks, information security
The paper presents a method for quantitative assessment of zigzag trajectories of vehicles, which allows to identify potentially dangerous behavior of drivers. The algorithm analyzes changes in direction between trajectory segments and includes data preprocessing steps: merging of closely spaced points and trajectory simplification using a modified Ramer-Douglas-Pecker algorithm. Experiments on a balanced data set (20 trajectories) confirmed the effectiveness of the method: accuracy - 0.8, completeness - 1.0, F1-measure - 0.833. The developed approach can be applied in traffic monitoring, accident prevention and hazardous driving detection systems. Further research is aimed at improving the accuracy and adapting the method to real-world conditions.
Keywords: trajectory, trajectory analysis, zigzag, trajectory simplification, Ramer-Douglas-Pecker algorithm, yolo, object detection
In this paper, a new model of an open multichannel queuing system with mutual assistance between channels and limited waiting time for a request in a queue is proposed. General mathematical dependencies for the probabilistic characteristics of such a system are presented.
Keywords: queuing system, queue, service device, mutual assistance between channels
Based on the analysis of behavioral characteristics, the main indicators that provide the greatest accuracy in identifying users of mobile devices are identified. As part of the research, software has been written to collect touchscreen data when performing typical user actions. Identification algorithms are implemented based on machine learning algorithms and accuracy is shown. The results obtained in the study can be used to build continuous identification systems.
Keywords: user behavior, touch screen, continuous identification, biometrics, dataset, classification, deep learning, recurrent neural network, mobile device
The article develops calibration methods to improve accuracy and reduce operating costs of robotic systems in warehouse logistics. Special attention is given to the use of laser sensors and offset parameters, enabling the robot's position to adapt to changing conditions. The methodology includes the stages of initialization, orientation, and final verification, which help minimize deviations and reduce the need for manual adjustments. This approach ensures consistent operational accuracy and lowers operating costs through automated and adaptive robot calibration settings.
Keywords: robot calibration, warehouse automation, laser sensor, offset, positioning accuracy, robotic system, adaptive calibration, automatic calibration, collaborative robot, cobot
A class of mathematical methods for code channel division has been developed based on the use of pairs of orthogonal encoding and decoding matrices, the components of which are polynomials and integers. The principles of constructing schemes for implementing code channel combining on the transmitting side and arithmetic code channel division on the receiving side of the communication system and examples of such schemes are presented. The proposed approach will significantly simplify the design of encoding and decoding devices used in space and satellite communication systems.
Keywords: telecommunications systems, telecommunications devices, multiplexing, code division of channels, matrix analysis, encoding matrices, synthesis method, orthogonal matrices, integers
Currently, key aspects of software development include the security and efficiency of the applications being created. Special attention is given to data security and operations involving databases. This article discusses methods and techniques for developing secure applications through the integration of the Rust programming language and the PostgreSQL database management system (DBMS). Rust is a general-purpose programming language that prioritizes safety as its primary objective. The article examines key concepts of Rust, such as strict typing, the RAII (Resource Acquisition Is Initialization) programming idiom, macro definitions, and immutability, and how these features contribute to the development of reliable and high-performance applications when interfacing with databases. The integration with PostgreSQL, which has been demonstrated to be both straightforward and robust, is analyzed, highlighting its capacity for efficient data management while maintaining a high level of security, thereby mitigating common errors and vulnerabilities. Rust is currently used less than popular languages like JavaScript, Python, and Java, despite its steep learning curve. However, major companies see its potential. Rust modules are being integrated into operating system kernels (Linux, Windows, Android), Mozilla is developing features for Firefox's Gecko engine and StackOverflow surveys show a rising usage of Rust. A practical example involving the dispatch of information related to class schedules and video content illustrates the advantages of utilizing Rust in conjunction with PostgreSQL to create a scheduling management system, ensuring data integrity and security.
Keywords: Rust programming language, memory safety, RAII, metaprogramming, DBMS, PostgreSQL
In the article a cognitive map of an organization whose activities are related to the sale of rolled metal products is presented. The constructed map is investigated analyzing the impulse processes occurring in the constructed system. It is assumed that the system may be affected by random factors such as economic and social crises, examples of which may be a lockdown during a pandemic, military actions in the country, sanctions, etc., as well as weather conditions, which, although accidental, are more predictable than economic and social cataclysms. The processes are investigated for impulse and absolute stability. The possibilities of increasing stability in the system are analyzed. The methods of increasing stability in the system are proposed in order to preserve profits in the rolled metal sales enterprise.
Keywords: cognitive map, metal rolling realization system, socio-economic cataclysms, weather conditions, impulse processes, impulse stability, absolute stability, petal sequence, characteristic polynomial, positive and negative cycles
The article presents the results of the analysis of the architecture of robotic technologies used in warehouse logistics. The following methods of architecture optimization are identified: multifunctionality, modularity, swarm intelligence, and the implementation of several operating modes. Based on the analysis, a conceptual model of a robot for inventory of warehouse premises was created. The main advantages of the model are: the possibility of using the robot outside working hours due to the presence of an autonomous operating mode; application for inventory and for joint work with other robots (coordination of the movement of ground robots); the presence of an interchange algorithm that ensures fault tolerance and a partial solution to the problem of the limited operating time of the robot from the battery.
Keywords: robotic technologies, drones, modularity, swarm intelligence, fault tolerance, warehouse logistics
A method is proposed for cascading connection of encoding and decoding devices to implement code division of channels. It is shown that by increasing the number of cascading levels, their implementation is significantly simplified and the number of operations performed is reduced. In this case, as many pairs of subscribers can simultaneously exchange information, what is the minimum order of the encoding and decoding devices in the system. The proposed approach will significantly simplify the design of encoding and decoding devices used in space and satellite communication systems.
Keywords: telecommunications systems, telecommunications devices, multiplexing, code division of channels, orthogonal matrices, integers, cascaded connection
The article presents the method of multiple initial connections aimed at enhancing the information security of peer-to-peer virtual private networks. This method ensures the simultaneous establishment of several initial connections through intermediate nodes, which complicates data interception and minimizes the risks of connection compromise. The paper describes the algorithmic foundation of the method and demonstrates its application using a network of four nodes. An analysis of packet routing is conducted, including the stages of packet formation, modification, and transmission. To calculate the number of unique routes and assess data interception risks, a software package registered with the Federal Service for Intellectual Property was developed. The software utilizes matrix and combinatorial methods, providing high calculation accuracy and analysis efficiency. The proposed method has broad application prospects in peer-to-peer networks, Internet of Things systems, and distributed control systems.
Keywords: multiple initial connections, peer-to-peer network, virtual private network, information security, data transmission routes, intermediate nodes, unique routes
Regression analysis based on the use of statistical data and their processing by special methods is an effective method of researching and forecasting the number of employees of structural units. In this paper, based on statistical information on 81 regional offices of the Social Fund of Russia, a regression analysis of the staffing of individual information protection divisions was carried out taking into account the total area and population of the regions. It is shown that a number of subjects are understaffed and some of them, on the contrary, are overstaffed.
Keywords: information protection, regression model, adequacy criteria, forecasting, staffing analysis, information protection units
The paper describes an automated security system for a mining container: a short circuit protection system for smooth start-up of equipment, temperature control and fire prevention of devices.
Keywords: mining, electrical safety, temperature maintenance, fire prevention, automated system
The article presents an algorithm for establishing a secure connection for peer-to-peer virtual private networks aimed at enhancing information security. The algorithm employs modern cryptographic protocols such as IKEv2, RSA, and DH, providing multi-level data protection. The developed algorithm structure includes dynamic generation and destruction of temporary keys, reducing the risk of compromise. The proposed solution is designed for use in corporate network security systems, Internet of Things system, and distributed systems.
Keywords: virtual Private Network, peer-to-peer network, cryptographic protocols, RSA, Diffie-Hellman, IKEv2, secure connection, multi-layer protection, information security, distributed systems