×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • Permafrost: geocryological hazards and regional degradation of frozen soils

    Today, the problem of global climate change and the associated degradation of permafrost is a priority area of ​ ​ research. In the regions of the Far North, a change in temperature by half a degree contributes to the emergence of geocryological dangers: the appearance of ravines, thermokarst subsidence, heaving, the formation of residential ice and, as a result, the destruction of houses and infrastructure. In Russia, the permafrost zone occupies about 63-65% of its territory and extends for thousands of kilometers. Various engineering and geological impacts, including man-made ones, represent a serious geocryological hazard and can lead to degradation of frozen soils in various regions. Due to the rapid thawing of ice and climate change, collapses and voids form on frozen soils. Also, when thawing permafrost, a large amount of groundwater is formed and there is a risk of salinization of nearby water and coastal zones. This can lead to the loss of resources that are necessary for the life of the local population, as well as for the economy of the region. Despite the fact that there are numerous programs and studies on this topic, a huge amount of work has not yet been carried out in Russia to eliminate geocryological threats.

    Keywords: Geocryology, permafrost, ground, frozen soil degradation, thawing, monitoring, Yakutia, cryolithozone, geocryological hazard

  • Designing student campuses

    The article on the design of student campuses is necessary in order to help architects and builders create a comfortable and convenient environment for students to live and study. It carries the main idea that when creating student campuses, it is necessary to take into account not only the social, psychological and cultural characteristics of student life, but also functional aspects. The campus should become not just a place to live and study, but a real community where students can find support and interact with each other, developing their skills and passions. In addition, the article allows you to better understand what new technologies and trends can be applied in the design of modern university campuses to make them even more convenient, innovative and environmentally friendly

    Keywords: design, student campus, student dormitory, energy efficiency, landscaping, construction, self-sufficiency, materials, architectural solutions

  • Organizational structures of the customer in construction

    The current legislative acts and regulatory and technical documents defining the requirements for the organization of the customer's activities are considered in the work. A review of studies with different approaches to the formation of organizational structures of the customer, depending on the types of construction, their volumes and features of objects, is carried out. The factors determining the requirements for the formation of organizational structures of the customer for various objects are highlighted.

    Keywords: construction organization, technical customer, organizational structure, construction control, project approach

  • Analysis of floating point calculations on microcontrollers

    The article discusses methods for optimizing floating point calculations on microcontroller devices. Hardware and software methods for accelerating calculations are considered. Algorithms of Karatsuba and Schönhage-Strassen for the multiplication operation are given. A method for replacing floating-point calculations with integer calculations is proposed. Describes how to use fixed point instead of floating point. The option of using hash memory and code optimization is considered. The results of measuring calculations on the AVR microcontroller are presented.

    Keywords: floating point calculations, fixed point calculations, microcontroller, AVR, ARM

  • On existing methods for removing noise from an image

    This paper considers existing classical and neural network methods for combating noise in computer vision systems. Despite the fact that neural network classifiers demonstrate high accuracy, it is not possible to achieve stability on noisy data. Methods for improving an image based on a bilateral filter, a histogram of oriented gradients, integration of filters with Retinex, a gamma-normal model, a combination of a dark channel with various tools, as well as changes in the architecture of convolutional neural networks by modifying or replacing its components and the applicability of ensembles of neural networks are considered.

    Keywords: image processing, image filtering, machine vision, pattern recognition

  • Analysis of the applied methods for calculating the strength of a normal section of multilayer bending structural elements

    The article discusses the existing methods for calculating the strength of a normal section in multilayer bending structures. The experience of Russian and foreign researchers was analyzed, the approaches described in domestic and foreign regulatory documents were compared, and key differences were identified. At the same time, special attention is paid to the mathematical description of the work of concrete as a material. It was concluded that further research is expedient to find the most optimal method for calculating multilayer structures.

    Keywords: concrete, reinforced concrete, multilayer structures, calculation method, bending element, normal section, stresses, high-strength concrete, stress diagram, description of concrete work, bending moment, neutral axis

  • Technical science. Informatics, computer facilities and management

  • Improving efficiency of Dijkstra's algorithm using parallel computing technologies with OpenMP library

    The purpose of the study is to improve the efficiency of Dijkstra's algorithm by using the shared memory model with OpenMP library and working on the principle of parallel execution in the implementation of the algorithm. Using Dijkstra's algorithm to find the shortest path between two nodes in a graph is quite common. However, the time complexity of the algorithm increases as the size of the graph increases, resulting in longer execution time, so parallel execution is a good option to solve the time complexity problem. In this research work, we propose a parallel computing method to improve the efficiency of Dijkstra's algorithm for large graphs.The method involves dividing the array of paths in Dijkstra's algorithm into a specified number of processors for parallel execution. We provide an implementation of the parallelized Dijkstra algorithm and access its performance using actual datasets and with different number of nodes. Our results show that Dijkstra's parallelized algorithm can significantly speed up the process compared to the sequential version of the algorithm, while reducing execution time and continuously improving CPU efficiency, making it a useful choice for finding shortest paths in large graphs.

    Keywords: Dijkstra algorithm, graph, shortest paths, parallel computing, shared memory model, OpenMP library

  • Using an Intel UHD graphics on the math calculations

    Based on recent developments in the field of parallel computing, in particular at the SYCL abstraction level, the use of optimal parallel computing tools for building applications in the field of computational and applied mathematics is being considered. Examples are given of both simple computational algorithms and computations using mathematical libraries for computational linear algebra.

    Keywords: parallel code,heterogeneous enviroment, intel data parallel c++, intel oneapi, sycl, onemkl, fpga accelerator, gpu accelerator

  • An integrated approach to assessing the competitiveness of an enterprise

    The article presents an integrated approach to assessing the competitiveness of a scientific production enterprise. The methodology includes an analysis of seven key performance indicators of an enterprise that have the greatest impact on its competitiveness: product competitiveness, staffing, reputation, innovation potential, sales activities, internal organization, partnerships. As a result of the study, recommendations were formulated aimed at the formation and strengthening of competitive advantages.

    Keywords: enterprise competitiveness, efficiency assessment, complex assessment method

  • The technique of analyzing video files for detecting the presence of persons and attractions, using recognition by key, non-repeating frames

    In this paper, we consider a technique for automatic analysis of video files for detecting the presence of persons and attractions, using recognition by key, non-repeating frames, based on algorithms for their extraction. Recognition of landmarks and faces only by keyframes will significantly reduce computational costs, as well as avoid overflowing with repetitive information. The effectiveness of the proposed technique is evaluated in terms of accuracy and speed on a set of test videos.

    Keywords: keyframe, recognition, computer vision, algorithm, video

  • Intelligent detection of steganography transform based on containers classification

    The possibility of detection of steganography in digital images based on the classification of stegocontainers is investigated. The obtained results demonstrate the effectiveness of using deep neural networks for solving this problem. The LSB method can be detected using EfficientNet b3 architecture. The achieved classification accuracy is above 97%. Using of steganography methods in frequency domain can be effectively detected by classifying their representation in the form of a digital YCrBr model, with augmentation (vertical and horizontal rotations). The classification accuracy is above 77%.

    Keywords: Steganography, stegocontainer, machine learning, classification, digital image, deep learning, CNN, EfficientNet b3, confidentiality, information protection

  • Computational efficiency analysis matrix equations of motion for systems of rigid bodies with a tree structure in Hamiltonian variables

    Methods of computer formation of the equations of motion of multibody systems with a tree structure and algorithms for their reduction to the normal form of ordinary differential equations are considered. The equations of motion are written using Hamilton's formalism for an extended set of state variables of a mechanical system. The equations are presented in a compact visual form. Recursive formulas for determining all coefficients of equations are written out. Algorithms for reducing these equations to Hamilton equations in generalized coordinates and generalized momenta are presented. An algorithm for solving the obtained equations of motion for multibody systems using the LTDL-elimination is presented. Formulas are written that allow one to calculate the amount of arithmetic operations required to bring the equations of motion to normal form using the considered algorithms. On the basis of these formulas, a comparative analysis of the efficiency of algorithms for rigid bodies systems of various structures and with various types of connections between bodies is carried out. The results of the analysis are presented in the form of diagrams. The diagrams highlight areas in which the advantage of one or another method is manifested, depending on the type of mechanical system.

    Keywords: multibody systems, equations of motion, dynamics, canonical momenta, mathematical modeling, computational efficiency

  • Choosing Strategies for Ensuring Information Security of the Protected Object in Conditions of Uncertainty and Counteraction

    The work is devoted to the problem of decision support in the field of information security. The aim of the work is to build (within the framework of the game-theoretic approach) an iterative procedure for determining a mixed game strategy for ensuring information security under the uncertainty of the state of the protected object and countering an intruder. The use of the methodological apparatus of simulation modeling (along with the use of the Brown-Robinson fictitious enactment method) is due to the possible non-Poisson type of event flows leading to a change in the state of the protected object, as well as the complexity of solving stochastic games with three participants. The application of the developed procedure makes it possible to increase the scientific validity of managerial decisions on the choice of protection strategies for stochastically dynamic (changing their state randomly) objects.

    Keywords: information security, uncertainty, counteraction, game-theoretic approach, simulation modeling

  • Set-theoretic representation of intellectual property cores in computer-aided design system for integrated circuits based on reconfigurable systems-on-a-chip

    The reconfigurable systems-on-a-chip (RSoC) includes hard and soft intellectual property cores (IP-cores). Hard IP-cores are placed on the specified positions on the chip and have a predetermined functionality. Soft IP-cores are developed using the logical blocks (LB) of a field programmable gate array (FPGA) on the RSoC. Both types of IP-cores have different features. Hard IP-cores have configurations that can be programmed. Soft IP-cores use the base RSoC specialized resources. All IP-cores features must be considered at various stages of the design flow of user circuits based on the RSoC. Any modes of the RSoC IP-cores should be extracted from the functional description of the user circuit during logical synthesis. The features of the base chip architecture and specialized routing resources must be considered during placement and routing. In this paper, a software-oriented set-theoretic model of IP-cores is presented. The model makes it possible to represent IP-cores in computer-aided design (CAD) system at different stages of design flow of user circuit based on RSoC and to map architecture-independent IP-cores of a user circuit to IP-cores on the base chip. The model combines formalized representations of the base chip components, architecture-independent and architecture-dependent parameterized IP-cores for the logical synthesis, as well as IP-cores for the layout synthesis. Also, the model has several distinctive features. The first feature is the availability of the relative coordinates of the soft IP-cores elements. These coordinates allow to take into account the RSoC architectural features at the placement stage. The second feature is that an information about specialized routing resources and interconnections of the user and base circuits. This information allows to establish a correspondence between IP-core and RSoC connections regardless of the routing resources type.

    Keywords: reconfigurable system-on-a-chip, intellectual property core, field programmable gate array, computer-aided design system, set-theoretic model, formalization

  • Text information extraction from images of modified text

    This article describes development of a module which provides opportunity to extract text from images of modified text, which can be used to bypass existing information security software and spread sensitive information out of company. The developed module is based on Python programming language with additional libraries expanding basic functional. After creating a module, additional module allowing user to create modified text by themselves was made. Additional module uses a special dictionary that can change any letter to alternative and generate more modified texts in order to test and find the weak spots of a module. To integrate the module into company’s information infrastructure DLP-systems were chosen, because of their popularity and ease of the integration method. To integrate DLP-system and text extraction module we used a mail-server with BCC copies of a mail traffic to send text and images to our module local mail server, additional mechanisms extracts pictures and process them within the module, after what it sends back the image and the text from it. A few rounds of testing were done resulting in nearly 97% accuracy. Future development consider expanding for multi-row processing and adding new alternative symbols after first mention them in text by using a CNN or standard deviation of images pixel and pixel comparison.

    Keywords: information security, data leakage, text analisys, image analisys, modified data analisys, protection against steganography

  • Algorithm of nonparametric estimation of transition probability distribution density for Markov model of university staff dynamics

    The paper deals with the construction of an algorithm for nonparametric estimation of the transition probability distribution density for the Markov model of the dynamics of the number of university employees. The problem of reconstruction of transition probability distribution density on a retrospective sample of small volume is solved. The result of the solution is the transition probability matrix, the elements of which are random variables with distribution laws obtained from retrospective data. A distinctive feature of the algorithm is the simultaneous consideration of regional and functional constraints on the values of transition probabilities. The convergence of the algorithm has been experimentally confirmed.

    Keywords: probability density, nonparametric estimation, Markov model, simulation modeling, university staff movement, publication activity

  • Features of designing security systems based on zero trust architecture

    To optimize the life cycle of information systems, the design uses abstract models that describe the main elements of the system architecture. Zero trust architecture is a new concept of information security that takes into account the remote format of employee access to the assets of an enterprise information system. The main features of zero trust architecture are considered.

    Keywords: information security, enterprise information system, zero trust architecture, security policy

  • The method for evaluating the effectiveness of organizing the evacuation of people from a public building in case of fire using an agent-based approach

    The article is devoted to the study of crowd behavior in public buildings during a fire. A method for evaluating the effectiveness of organizing the evacuation of people from a public building is proposed, which makes it possible to take into account the spread of panic among evacuees. The method is based on the development of an evacuation simulation model that takes into account the impact of certain factors on the degree of people's panic, which implements an agent-based approach. The proposed method allows, when describing the psycho-emotional behavior of each agent separately in the process of evacuation, to evaluate the effectiveness of organizing the evacuation of the crowd as a whole. The simulation results on the example of a shopping and entertainment center show that possible panic conditions of evacuees can affect the efficiency of evacuation.

    Keywords: evacuation, panic, simulation model, efficiency assessment method, shopping and entertainment complex, agent-based approach

  • Experimental study of the impact of microwave radiation on the physical and mechanical characteristics of concrete

    Heat treatment of concrete, along with steaming, is one of the main methods for accelerating the hardening of concrete and achieving its transfer, stripping and design strength. These concrete processing technologies are more often used in factories in the manufacture of mass-produced concrete and reinforced concrete products in curing chambers of periodic and continuous action, under portable hoods on stands and other installations, or in special thermoforms, thermal packs, cassettes, etc. However, there is an increasing need acceleration of concrete strength gain at the construction site at the time of construction and installation works associated with new construction, repair or reconstruction of existing buildings. The aim of the study is to study the acceleration of the strength development of concrete subjected to heat treatment using the energy of an electromagnetic field of microwave frequencies. The article presents the results of an experimental study of concrete samples for compression treated with microwave energy and the control group of samples gaining strength in natural conditions. The experimental data obtained indicate an increase in the strength of the treated concrete samples by 72.94% on day 1, by 27.83% on day 2, by 14.23% on day 3, and by 1.1% on day 7 in comparison with samples not subjected to microwave exposure. From the 14th day, a gradual drop in strength begins in comparison with the samples not subjected to heating with the help of electromagnetic fields, so on the 14th day the strength of the treated concrete samples decreased by 2.45%, on the 21st day by 32.17%, on the 28th day by 25.61%. As a result of the analysis of the obtained experimental data, it was concluded that microwave exposure to the concrete solution significantly increases the strength of concrete in the early stages, but negatively affects the design strength of concrete as a whole.

    Keywords: microwave radiation, microwave, concrete, heat treatment, strength, construction

  • Simulation of an autonomous control system for a slitting machine of a paper machine

    The work is aimed at modeling the control system of a slitting machine of a paper machine in order to improve the quality of products and eliminate defects in winding density. The developed automated system implements the functions of controlling the operating modes of the machine, distributing the loads of the bearing shafts, braking the roll and tensioning the paper web.

    Keywords: slitting machine, paper machine, automated control system, rewinder, pressure roller, decoiler, reeler, accelerating shaft, deflecting shaft, cutting section

  • Technical science. Building and architecture

  • Simulation of the design activity diversification of innovative enterprise

    The main maintenance of a diversification of production as activity of subjects of managing is considered. being shown in purchase of the operating enterprises, the organizations of the new enterprises, redistribution of investments in interests of the organization and development of new production on available floor spaces. The most important organizational economic targets of a diversification of management are presented by innovative activity of the industrial enterprise.

    Keywords: finishing works, construction control, factors of influence, expert survey, residential real estate, construction market

  • The possibility of using forest industry waste to create biofertilizers

    The paper considers the possibility of using forest industry waste as a basis for the creation of biofertilizers. Of the main types of waste, sawdust, wood chips and bark are the most discussed. Taking into account the minimal change in composition, they can be used for the production of biofuels, such as pellets or briquettes. In addition, they can be used for the production of compost and fertilizers. The review of patents with a brief description of the method of processing and use of wood waste in the field of biotechnology is given The most promising for today can be considered the use of these wastes for the production of biofertilizers (when enriched with microbiological crops, as well as in the mixed part with animal husbandry and crop production waste), as well as the possibility of recultivation of disturbed areas during logging.

    Keywords: sawdust, compost, biofertilizers, forest industry waste, patent search, woodworking, microorganisms