×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Hardware and software usb-hid device for controllthe pc cursor for people with impaired motor functions

    The use of information technologies in the tasks of medical rehabilitation is an effective method, but it is often complicated by the problems of using standard control devices and input into the computer by people with motor impairments. The developed hardware and software complex allows one to obtain data on the orientation of the joint in space, "turning" them into the movement of the mouse pointer, allowing one to interact with computer software, instead of the mouse manipulator. By changing the sensitivity of the sensors, the process of rehabilitation of patients is corrected. The used component base of the complex being developed and the technologies used make it possible to form a significantly lower cost, the possibility of using it outside the clinic, working without the help of specialists, application in control actions with computer software not only for rehabilitation but also for people with disabilities. The paper defines the tasks and functions that are solved by the hardware and software complex. In the 3D editor, the body frame and the internal arrangement of components are modeled, hardware and software tools are selected to ensure the implementation of the project. The functional scheme of the "Limbtracker" device has been developed. During the execution of the project, the following was implemented: reading data from sensors and writing them to a text file, filtering data by the Kalman algorithm, calibration of the device.

    Keywords: hardware and software complex, home rehabilitation, neurorehabilitation, STM32, microcontroller, device design, USB-hid

  • Features of equipment labeling in the framework of solving the problem of asset inventory and monitoring of network infrastructure

    This article describes the process of inventorying equipment in a typical IT department. A new approach to inventory is proposed, which will eliminate the "double work" and solve a number of typical problems. The relationship with an already developed product for monitoring network infrastructure is described.

    Keywords: monitoring, network infrastructure, inventory, QR code, Telegram, information technology, information technology department

  • Application of edutainment technology for information security education

    The article examines the concept and scope of edutainment technology. A variant of the application of this technology in teaching students information security issues is proposed. Examples of the implementation of edutainment technology in a number of games covering cybercrime and information security are given.

    Keywords: edutainment-technology, edutainment, information security, teaching, data protection, game

  • Use of random sample consensus in digital image reflection symmetry detection problems

    Symmetry detection is an important task that arises in MRI analysis, TEM microscopy and other scientific and industrial problems. Current methods of symmetry detection usually analyse SIFT invariants or use voting schemas. The article proposes and analyses an optimization problem that can be used to describe the image symmetry detection pipeline in terms of correlation and similarity. The article also describes an algorithm that solves the aforementioned optimization problem using a ransom sample consensus voting scheme, thus bringing the proposed method closer to other RANSAC-based methods. It is shown that an implementation based on the proposed model outperforms SIFT-based detectors, and stays in row with other voting-based methods; it is also shown that the algorithm's parameters could be adjusted for specific tasks to improve the detection quality. The article also compares the proposed method with other existing solutions in terms of accuracy and precision; visualizations are also included.

    Keywords: RANSAC, random sample consensus, reflection symmetry, computer vision, image processing

  • Monitoring the stability of the network infrastructure using the Telegram messenger

    This article describes the experience of implementing a system for monitoring the stability of a network infrastructure using the Telegram messenger in a government institution. The functionality of the system and further plans for its development are presented. The tendency towards the spread of the Telegram messenger in the society is described.

    Keywords: Telegram, ping, monitoring, inventory, infrastructure, network

  • Methods and features of interaction between clients of the information system and the control center in order to monitor the infrastructure of the enterprise

    This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.

    Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT

  • Windows Management Instrumentation as a way to monitor and audit enterprise IT infrastructure

    This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.

    Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest

  • Mathematical modeling of the process of assessing the value of rental property using artificial neural networks

    This article deals with the problem of determining the cost of renting real estate. The idea of minimizing the absolute error function using artificial neural networks is substantiated. Particular attention is paid to the process of determining the input data of the neural network. In particular, the problems of determining such parameters as the improvement of the region and premises. The article clarifies the features of determining the weight coefficients to determine the technical equipment of the room using a genetic algorithm. A model of neural network architecture is proposed. The model of change of weight coefficients is described. As a result, the model was tested on test data, and the model of data correction taking into account price dynamics was described.

    Keywords: neural network, data mining, data analysis, real estate rental, regression, genetic algorithm, Informatics, machine learning, cost estimation, modeling, extrapolation

  • Development of the module for optimal placement of information resources at the nodes of the computer network: a description of the methods and data structures implemented

    This article discusses the problems of optimal placement of information resources on the nodes of a computer network. The main methods used in solving this problem are presented. In particular, the method of random allocation of resources, optimization of allocation of resources using the branch and bound method, and optimization of allocation of resources using a genetic algorithm are considered. For these methods, the structure of the input and output data has been determined, in addition, the internal structure of resource allocation has been demonstrated for the presented methods. A key aspect of the consideration in this article is the formulation of the problem and the modeling of its solution using the algorithms presented. As a result, testing of the developed module on the input data and analysis of the prospects for using the module are presented.

    Keywords: computer network, information resource, random allocation of resources, simplex method, branch and bound method, genetic algorithm, design, modeling

  • Features of the development of an information system for an enterprise

    This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.

    Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator

  • The performance of the neural network matrix of the operator

    The article shows the possibility of describing complex objects with parallel functioning components in the form of structures built on the basis of neural networks. The neural network is represented by an operator matrix, that is, a formal description that gives a universal way to solve many non-standard control problems. Matrix apparatus is shown to significantly improve the efficiency of the method compared to previously known. It is concluded that the representation of the neural network by the operator matrix provides a universal way to solve the problems of transport and information flows management; neuron-like systems based on such representation of the neuron are able to catch complex nonlinear relationships, self-improvement, learning in the process of use. Their use provides ample opportunities for finding and implementing effective solutions to the problems of management and control of flows

    Keywords: graph, parallelism, transport and information flow, neural network, synaptic weight, predicate, activation function, operator matrix, neuron, complex systems

  • Requirements for the development of an automated training system in the field of information security

    In this paper the issue of improving the quality of training for specialists in the field of information security through the use of a specialized training system in education is considered. An overview of existing analogues of such training systems is given (including online games, tests, choose-your-own-adventure style games etc.). The main aspects of the development of an automated training system are given. The requirements for a focus group for testing an automated training system are formulated.

    Keywords: training system, automated training system, information security, data protection, simulator, training, development, programming

  • Development of a client-server information system for the registration of car passes using information from an outdated database

    This article describes an existing university database of automobile passes in Microsoft Excel. The university has two databases: permanent and temporary car passes. The negative sides of databases in Microsoft Excel are described in this article. Also, the authors analyzed the possibility of using 1C company software to account for car passes. A new database is described in the Microsoft SQL Server database management system. This article defines methods for unification an outdated database for later migration to Microsoft SQL Server. The main components of the future application software for working with the new database have been designed. By creating additional software, the likelihood of errors in the databases is minimized.

    Keywords: database, Microsoft SQL Server, Microsoft Excel, university, car pass, registry, unification, migration, C#, software

  • Method of encoding numbers by DNA-chains and the basic operations to perform of arithmetic operations in the paradigm of DNA computing

    The main models of DNA computing are self-assembly of DNA and RDNA. Disadvantages of these models are low speed perform arithmetic operations, the high probability of errors of computing, and perform the calculation with only fixed-point numbers. In article is represented method of encoding numbers by DNA strands. Numbers can be encoded by any base initially. This method does not require to translate the number into a binary number system. Each number is encoded by digit with the DNA. As compared with known methods, the proposed method uses a shorter length of DNA strands. The proposed method can increase speed encoding of numbers, improve the accuracy of the calculations and to reduce errors in the formation of the encoded data. In article is represented also the operations to perform arithmetic operations. The use of the proposed method of encoding numbers and proposed operations over DNA allows to increase speed of computation, and perform calculations not only with fixed-point numbers and floating-point numbers.

    Keywords: encoding of numbers, DNA strands, operations with the DNA-chain, DNA computing