×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Overview of the integration of blockchain and the Internet of Things:a study of current problems

    The integration of blockchain technology with the Internet of Things (IoT) offers transformative potential for various sectors. This article delves into 16 distinct methods of integrating blockchain with IoT, emphasizing that there isn't a one-size-fits-all solution. Each method has its unique advantages and potential drawbacks, necessitating careful consideration based on specific IoT system requirements. For instance, integrating with public blockchains like Bitcoin and Ethereum offers transparency and decentralization but faces scalability issues. Sidechains introduce flexibility but might pose security risks. Blockchain platforms like Hyperledger Fabric expedite development but can lead to vendor lock-in. The diversity of these methods underscores the importance of a well-thought-out approach tailored to the specific needs of the IoT system in question. As technology evolves, we anticipate more innovative approaches to emerge, emphasizing the continuous need for research, experimentation, and collaboration to fully harness the potential of IoT and blockchain integration.

    Keywords: blockchain , IOT , BIoT, smart contracts, IoT security

  • Selecting a converter of aerodynamic forces and moments into the trajectory of motion for Simulink flight models of aircraft

    The article explores the problem of creating aircraft flight models in the Simulink environment. The reference systems in which transformations are carried out are considered. The equations of motion used in the simplest converters are given. The initial conditions for the equations are determined: the speed of the body, the angular orientation of the body's pitch position, the angle between the velocity vector and the body, the speed of rotation of the body, the initial position, the mass and inertia of the body, the source of gravity, the acceleration due to gravity, the curb and total mass of the body, speed of air flow, inertia of an empty and full body, flight trajectory, etc. An analysis of converters of aerodynamic forces and moments into the trajectory of motion as part of an aerospace package in the Simulink environment was carried out. Recommendations are given for their use for various modeling purposes. The results of modeling a simple converter with three degrees of freedom are presented.

    Keywords: modeling, MatLab, Simulink, equations of motion, aerodynamic torque, flight path, coordinate transformations, reference system, degrees of freedom

  • Identify and rank threats at a critical government facility

    The article discusses the issues of identifying and ranking threats at an important government facility. The classification of threats by type is described. The article discusses the concepts of “design-based threats” and “the most dangerous variant of the violator’s actions” and their differences. An example of ranking threats and reducing their number to reduce the dimensionality of the vulnerability analysis problem is considered. An important government object is considered as an object in the example. Experts are tasked with ranking threats according to the level of potential losses for an important government facility if they are realized. In practice, the implementation of an accepted design threat may lead to lower potential losses than the most dangerous option for violators and, as a result, to lower requirements for the effectiveness of the physical protection system.

    Keywords: comprehensive security, methods, models, security forces, intruders, important government facilities, clashes between security forces and attacks, ranking of threats

  • On the variant of formalization of the task of extracting key skills and cluster analysis of vacancies in the implementation of a comprehensive digital career guidance toolkit

    The article proposes a general formalized model of the task of processing and extracting potential key skills from job descriptions to determine the relevance of training areas and possible areas of employment for graduates. The formalized model is used in the software implementation of the job clustering module based on the obtained sets of key skills within the framework of a comprehensive toolkit for remote career guidance.

    Keywords: vacancies, demand for training areas, career guidance, digitalization of career guidance, formalized model, clustering, professions, key skills

  • Investigation of the influence of wind on the flight path in a Simulink model of a lightweight aircraft

    A Simulink model of a lightweight aircraft is being studied as part of the Aerospace Blockset package, including a system model of the aircraft, an environmental model, a model of pilot influences, and a visualization block. The structure of the flight model is considered and models of the effects of the environment and wind are disclosed in detail, consisting of blocks of physical terrain features, wind models and an atmospheric model, a gravity model, each of which is set to an altitude. The Wind Shear Model block calculates the amount of wind shear as a function of altitude and measured speed wind. The Discrete Wind Gust Model block determines the resulting wind speed as a function of the distance traveled, the amplitude and length of the gust. The turbulence equations comply with the MIL-F-8785C specification, which describes turbulence as a random process determined by velocity spectra. Simulation results are presented that reflect changes in the trajectory of movement under various wind influences specified in the wind speed gradient block.

    Keywords: modeling, airplane flight, Simulink, Aerospace Blockset, crosswind, turbulence, turbulence equations, gravity model, motion trajectory

  • Mathematical modeling of the motion of a planning body of complex configuration

    motion of the body are obtained, which can only be solved numerically. The equilibrium equations are solved and the basic stationary modes of body motion are obtained. The main result is the most gentle body planning mode. In the matlab computer mathematics system, a set of programs is written that searches for a numerical solution and outputs trajectories. The movement of the modes under consideration is modeled and the stability of the main modes is looked at using numerical calculations.

    Keywords: body, planning mode, stability, geometric dimensions

  • Development of a data indexing system for the production, economic and labor sectors of the penitentiary system

    The development of business analytics, decision-making and resource planning systems is one of the most important components of almost any enterprise. In these matters, enterprises and production facilities of the penitentiary system are no exception. The paper examines the problem of the relationship between existing databases and statistical reporting forms of the production, economic and labor sectors of the penitentiary system. It has been established that indirectly interrelated parameters are quite difficult to compare due to different data recording systems, as well as approved statistical forms. One of the first steps in solving this problem could be the introduction of a generalized data indexing system. The paper discusses data indexing systems, the construction of their hierarchical structures, as well as the possibility of practical application using SQL. Examples of implementation using ORM technology and the Python language are considered.

    Keywords: databases, indexing, ORM, SQL, Python, manufacturing sector, economic indicators, penitentiary system

  • Development of a retiling microservice in the Python programming language

    In the modern world, it is increasingly necessary to process geographical information in a variety of forms. This paper discusses the concept of «tile», its purpose, features, as well as the process of retiling, which is a method of creating and updating tiles. This technology helps to increase the efficiency of modern cartographic services, reducing the loading time of maps. The main stages of the development of a microservice implementing the retiling logic are presented sequentially. The main data provider is the OpenStreetMap (OSM) open source project. The spatial data set is a core OSM product and contains up-to-date geographic data and information from around the world. The technology stack is based on the Python language, to which specialized modules for working with tiles are added, as well as a library for implementing a simple and high-quality API.

    Keywords: Python, tile, retiling, OpenStreetMap, microservice, Flask-RESTX, mercantile

  • Statical algorithms for identifying unique features from a person's handwritten signature

    One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.

    Keywords: static algorithms, metrics, signature length, scaling, signature angle

  • Dynamic algorithms for identifying unique features from a person's handwritten signature

    Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.

    Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform

  • Development of a mathematical model and a software package for automating scientific research in the field of financial industry news analysis

    The article is devoted to the development of a mathematical model and a software package designed to automate scientific research in the field of financial industry news analysis. The authors propose an approach based on the use of graph theory methods to identify the most significant scientific hypotheses, the methods used, as well as the obtained qualitative and quantitative results of the scientific community in this field. The proposed model and software package make it possible to automate the process of scientific research, which contributes to a more effective analysis of it. The research results can be useful both for professional participants in financial markets and for the academic community, since the identification of the most cited and fundamental works serves as the starting point of any scientific work.

    Keywords: software package, modeling, graph theory, news streams, Russian stock market, stocks, citation graph

  • A website for debugging of robots artificial intelligence technologies

    The article presents the state of technology of websites for designing robots with artificial intelligence. The image of a modern technical site-book as a place for the development of artificial intelligence applications is considered, the possibility of executing algorithms from the page to ensure the connection of robots with real and virtual objects is shown.

    Keywords: mathematical network, technical website-book, artificial intelligence, algorithms executed on the website-book, network development of robots

  • Developing a Piecewise Linear Regression Model for a Steel Company Using Continuous Form of Maximum Consistency Method

    The paper presents a brief overview of publications describing the experience of using mathematical modeling methods to solve various problems. A multivariate piecewise linear regression model of a steel company was built using the continuous form of the maximum consistency method. To assess the adequacy of the model, the following criteria were used: average relative error of approximation, continuous criterion of consistency of behavior, sum of modules of approximation errors. It is concluded that the resulting model has sufficient accuracy and can be used for forecasting.

    Keywords: mathematical modeling, piecewise linear regression, least modulus method, continuous form of maximum consistency method, steel company

  • On image masking as the basis for building a visual cryptography scheme

    The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.

    Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding

  • Modeling the probabilistic characteristics of blocking requests for access to radio resources of a wireless network

    Fifth-generation networks are of great interest for various studies. One of the most important and relevant technologies for efficient use of resources in fifth-generation networks is Network Slicing technology. The main purpose of the work is to simulate the probabilistic characteristics of blocking requests for access to wireless network radio resources. The main task is to analyze one of the options for implementing a two–service model of a wireless network radio access scheme with two slices and BG traffic. In the course of the work, the dependence of the probability of blocking a request depending on the intensity of receipt of applications of various types was considered. It turned out that the probability of blocking a type i application has the form of an exponential function. According to the results of the analysis, request blocking occurs predictably, taking into account the nature of incoming traffic. Previously, there are no significant drawbacks in the considered model. The developed model is of great interest for future, deeper and long-term research, for example, using simulation modeling, with the choice of optimal network parameters.

    Keywords: queuing system, 5G, two - service queuing system, resource allocation, Network Slicing, elastic traffic, minimum guaranteed bitrate