×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Prospects and advantages of construing multi-storey wooden buildings

    Wood as a building material has ancient roots and a long history of use. With the development of technology and the desire to live in better environmental conditions, interest in using wood to construct multi-story buildings is growing. This article is devoted to the prospects for the development of wooden multi-story buildings in Russia, in particular with the use of CLT panels, the popularity of which is growing all over the world. Comparative, statistical and logical analyzes were used as research methods. The article discusses modern methods and technologies for the construction of multi-story wooden buildings, including their advantages in terms of ecology, energy efficiency and design, conducts a comparative analysis of buildings made of reinforced concrete and CLT panels, and proposes a technological scheme for the reconstruction of buildings using CLT panels, including adding additional floors. Challenges and prospects for further development of this technology are highlighted, strategic solutions are proposed to reduce the cost of CLT panels

    Keywords: clt-panels, wood construction, wooden structures, reconstruction, renovation, high-rise wooden construction

  • Development of a tool for visualizing data on site user activity

    One of the most important points in increasing the conversion component of a web resource is identifying the most attractive places for the site user. To identify these locations, a site user activity data visualization tool was created that provides a visual representation of each user action on a site page.

    Keywords: heat map, site, oculograph, fixation, priority area

  • An artificial intelligence model to support management decisions to increase the efficiency of preventive measures to prevent fire

    The proposed work considers two types of neural network models for describing fire risks depending on the size of the population and preventive measures. Neural network models make it possible to consider fire risks integrally, taking into account the type of municipality or separately for each of the three existing types. Based on these models, a response surface for fire risks - population and prevention has been implemented, which allows you to assess the magnitude of risks based on input data to optimize decisions made. For a given value of the standard risk, the dependence of optimal prevention was obtained depending on the number of deposits in the municipality, which makes it possible to guarantee fire risks less than or equal to the standard indicators. The article analyzes and evaluates the effectiveness of preventive measures using neural networks. The input data for training the neural network includes fire data collected in Vietnam and Russia (population, number of fires, number of deaths, number of preventive measures). Based on these indicators, the effectiveness of preventive measures is predicted. Based on the forecasting results, decisions can be made to ensure fire safety in the state. The results obtained indicate the possibility of predicting the absolute value of the effectiveness of preventive work based on quantitative and categorical variables. A relatively large forecast error is associated, on the one hand, with the need to take into account a larger number of input parameters, and on the other hand, with the need to increase the size of the neural network training base. After refining the model, the results obtained allow us to evaluate the effectiveness of preventive measures for provinces and cities.

    Keywords: fire safety, preventive measures, neural network, management decision support, prediction model

  • On image masking as the basis for building a visual cryptography scheme

    The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.

    Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding

  • Method for ensuring data confidentiality using orthogonal matrices

    The application of orthogonal matrices in information processing and transformation systems is considered. A method is proposed for assessing the results of protective masking of audio information using Walsh-structured quasi-orthogonal Mersenne matrices.

    Keywords: orthogonal matrix, message masking, masking/unmasking algorithm, amplitude-frequency response, white noise, root mean square error, signal-to-noise ratio

  • On the development of collimator systems with integrated AI and VR/AR elements

    The issue of using the screen of an aircraft's collimator system as a means of providing a help to the pilot about the vertical profile of the flight path in poor visibility conditions at low and extremely low piloting altitudes is being considered.

    Keywords: low flight altitude, extremely low flight altitude, threat of collision, collimator, virtual elevation map, virtual reality, augmented reality, artificial intelligence, data fusion, pilot assistance system

  • Architectural structure of Karachay-Cherkessia: Adiyukh Battle Tower

    The article deals with a unique historical structure of Karachay-Cherkessia, the Adiyukh Tower, which several centuries ago was surrounded by an inaccessible wall of the settlement of the same name. In the article, in connection with the history of the construction of the tower, the era is analyzed, and the importance of this building in the life of the population living in the surrounding area is determined. The relevance of the study lies in the fact that the historical monuments of Karachay-Cherkessia remained unstudied until a certain time, although they certainly reflected the life and culture of the people. Reconstructing the past by excavating and studying the ruins left behind by external destruction and located in the North Caucasus has long been a priority for many local (and not only) scholars, particularly archaeologists and historians. The main result of the research was a detailed description of the structural and cultural features of the Adiyukh Tower, which is naturally one of the most important values of the history and culture of Karachay-Cherkessia.

    Keywords: Adiyukh tower, Karachay-Cherkessia, legend, North Caucasus, settlement, architectural structure, fortress, loophole, window openings, parapet

  • Principles of creating a server architecture for stable operation of iTOP CMDB and ensuring protection of the server from hacker attacks

    In the development of cloud providers, not only the types of services they provide play a significant role, but also fault tolerance to service failures. It is important for a cloud service provider to prepare and configure the server and service for fault-tolerant operation so that the customer works with a high degree of readiness and reliability in the system allocated to him. To prepare such a server, it is very important to think carefully about the architecture of the virtual machine, on which all the necessary means of data exchange and integration for the operation of the service will be installed, and protection against network threats that can disrupt the server's performance will be configured. The purpose of the work is to create a virtual machine architecture protected from network threats, which provides customers with access to the iTOP CMDB system. Despite the fact that there can be any number of customers, the iTOP CMDB system should be provided to each customer with its own version, which he can administer. The user can log in using an Internet browser by entering the name of his organization as a domain. The authors present a demonstration of the iTOP CMDB system, which is located on a virtual machine protected from network threats.

    Keywords: virtual machine, architecture, firewall, iTOP CMDB system, server, network threat, network attack, IP address, firewall, request

  • Assessment of the rational directions of the forest industry development of the Russian Arctic border regions based on cluster analysis

    The purpose of this study is to present the forestry complex development scenarios of the Republic of Karelia and the Murmansk region. Based on the use of factor analysis and cluster analysis, 27 central foresters of the study region were divided into 9 clusters according to 20 indicators. The selected indicators took into account the characteristics of wood resources, natural-production conditions and road infrastructure. Based on cluster profiles, as well as on topographical, climatic, soil map and vegetation maps, scenarios for the development of the study region forestry complex in the context of the resulting clusters. The results of the study showed that as they move from south to north, a gradual impoverishment of wood resources occurs. The efforts of the state and business should be aimed at resolving issues of road infrastructure, involving deciduous, small, energy wood in production circulation. Given the natural and production conditions, which are largely determined by the moist forest soils and the extreme vulnerability of the northern ecosystems, in the process of logging, it is especially necessary to pay attention to the minimization of the negative impact of logging operations on the soil cover.

    Keywords: zoning, forest industry, factor analysis, cluster analysis, k-means cluster analysis, logging, forest management

  • Selection of the composition of fine-grained concrete with the use of various plasticizers

    The article examines the influence of various superplasticizers on the performance characteristics of concrete. A series of tests of samples-beams of fine-grained concrete modified with plasticizers of various types was carried out. The optimal amount of the introduced additive was experimentally determined to compare the plasticizing effect of the cement-sand mixture. Experimental data are given indicating the main operational characteristics of the material depending on the additive used. The most effective additive "Polyplast SP-3" has been determined.

    Keywords: concrete, fine-grained concrete, mixture, lignosulfonates, polycarboxylates, naphthalene sulfonates, plasticizer, superplasticizer, water demand, plasticity

  • Automation of the ventilation design process for a residential construction project: an example of work selection

    The paper presents the results of a study, the purpose of which was to automate the process of designing ventilation for a residential construction project. The ventilation system is one of the most complex life support systems of a building, which has a significant impact on the level of comfort of residents. Automation of the design of such a system will reduce the number of errors, reduce the time and labor required for design. During the study, the design process was considered as a business process consisting of individual works. When modeling this process in the “As Is” notation, the connection of the ventilation system with other engineering systems and a number of other important factors were taken into account. In the process model, the most time-consuming and, at the same time, algorithmizable works were identified. Subsequently, these works were automated using code created in the Visual Studio environment in C#. This made it possible to reduce the number of errors and reduce the time spent on creating a ventilation system project.

    Keywords: automation, design, ventilation system, business process, Visual Studio

  • Improvement of leaky well repair technology

    The paper analyzes and shows the inadequacy of the technology for repairing production wells by rolling out a corrugated metal patch with a dornating device, which consists in premature violation of the tightness of the well due to low strength of the connection. A technology and a hydromechanical device for additional fastening by radial extrusion of spherical cavities in the metal of the plaster are proposed. As a result, a drag force is generated in the cross-section of the fastener, which prevents shear loads from axial forces. Strength calculations have shown that for better performance of the metal patch, it is advisable to increase the shear resistance force by increasing the number of punches or technological transitions of fastening.

    Keywords: casing, production string, well tightness, metal plaster, radial extrusion, strength

  • The use of universal adversarial attacks in the tasks of increasing the effectiveness of protection systems against robots and spam

    This article discusses the use of universal adversarial as well as to improve the effectiveness of protection systems against robots and spam. In particular, the key features that need to be taken into account to ensure an optimal level of protection against robots and spam are considered. It is also discussed why modern methods of protection are ineffective, and how the use of universal adversarial attacks can help eliminate existing shortcomings. The purpose of this article is to propose new approaches and methods of protection that can improve the effectiveness and stability of protection systems against robots and spam.

    Keywords: machine learning, clustering, data recognition, library Nanonets, library Tesseract

  • Graph neural networks and XANES spectroscopy for investigation of the structure of copper centers in Cu-MOR

    In this paper, the possibility of applying graph neural networks (NN) to study the structure of copper centers of zeolites is considered. The dataset used for NN training was prepared using the FDMNES software based on the finite difference method and included more than 2100 Cu K-XANES spectra for Cu-MOR. The performed study demonstrated the capability of graph neural networks to reproduce the Cu K-XANES spectrum corresponding to a particular model of the copper center in the zeolite framework.

    Keywords: zeolite, mordenite, atomic structure, XANES, machine learning, graph neural networks

  • Analysis of identification methods when determining the contours of skins from photographs

    The article discusses correlation methods of image identification. An algorithm of the "rare grid" method has been developed.

    Keywords: image identification, algorithm, recognition, cutting, reference frame, element correlations, minimum search