The problem of computing symmetric Hadamard matrices of the Balonin-Siberry construction is considered. To obtain such matrices, a large number of random binary sequences are required to select three of them, which are bound by the requirements of the matrix design. Such sequences are the first rows of three cyclic blocks of Hadamard matrices. The background of the emergence of quantum computing and the advantage of quantum generation of binary sequences for subsequent selection are considered. The calculation of Hadamard matrices is proposed as a test problem for quantum computers, which allows to show quantum superiority.
Keywords: quantum computers, qubits, random number generators, orthogonal matrices, Mersenne matrices, Kronecker product
The purpose of this study was to assess the forest exploitation conditions of the central forestries of the Republic of Karelia and the Murmansk region. To do this, data were collected for 27 central forestries of the study region, representing 20 variables characterizing indicators of wood resources, natural production conditions and road infrastructure. The assessment of forest exploitation conditions was carried out on the basis of the developed system of indicators, which includes 5 indicators: the value of the exploitation fund; the representativeness of the territory to the natural conditions of growth of deciduous species and the level of allowable cutting area for softwood farming; representativeness of the territory with favorable natural and production conditions in the study region; size of allowable cuts for coniferous economy; and the quality of the road network. The indicators were factors extracted by the method of principal axes in the process of factor analysis. Factors explained 81.4% of the total variance of the 20 variables initially selected. The results of the study showed that two groups of forest areas are distinguished in terms of the average forest reserve: the forest areas of the Murmansk region, which are characterized by a low average reserve, and the forest areas of the Republic of Karelia. Four central forestries located in the southern part of the Republic of Karelia are distinguished by the level of reserves in the forests of deciduous tree species and the level of allowable cut for deciduous farming. The most favorable natural and production conditions are forest areas located in the southern part of the Republic of Karelia.
Keywords: logging, natural and production conditions, factor analysis, Karelia, Murmansk region, timber resources
The article is devoted to the analysis of modern data encryption algorithms. The introduction gives an overview of the most common encryption algorithms, such as AES, RSA and SHA. The main part of the article includes an analysis of vulnerabilities of modern encryption algorithms and considers various attack methods. It concludes by drawing conclusions that it is necessary to use comprehensive data protection methods and periodically update the encryption algorithms used to prevent possible attacks.
Keywords: Encryption algorithm, data security, vulnerability, attack method, complex method of data protection
Тhe article discusses the mechanism for the rapid creation and maintenance of Kubernetes clusters without low-level operations with a significant reduction in time and labor costs using automation based on Rancher, VMware vSphere and Ubuntu products.
Keywords: Kubernetes, Ubuntu, Rancher, Docker, cluster, containerization, automation
Forecasting the consumption of electrical energy and power is an urgent and significant problem. This paper discusses current methods for predicting the consumption of electrical energy, reflected in various scientific papers, their analysis is carried out with the identification of more promising forecasting methods.
Keywords: energy consumption forecasting, statistical forecasting methods, neural network forecasting methods, hybrid forecasting methods
The paper considers a data visualization model of numerical simulation of a convective cloud. Data visualization is used for visual representation and analysis of processes in a convective cloud. New methods and approaches to visualization of results based on modern technologies and algorithms, such as real-time visualization and the use of calculations on GPUs. An approach to automating the process of rapid qualitative analysis are presentedThe paper aims to create a specialized software for three-dimensional visualization. This software is used for tasks related to the study of complex processes of interaction of processes in a convective cloud based on a numerical model with detailed microphysics.The article considers a data visualization model for numerical simulation of a convective cloud. Data visualization is used for visual representation and analysis of processes in a convective cloud. New methods and approaches to visualization of results based on modern technologies and algorithms, such as real-time visualization and the use of calculations on graphics processors, are presented. The approach to automating the process of rapid qualitative analysis of numerical simulation data is to create specialized software for three-dimensional visualization. This software is used for tasks related to the study of complex processes of interaction of processes in a convective cloud based on a numerical model with detailed microphysics.
Keywords: application program, three-dimensional visualization, numerical simulation data, machine graphics, visualization model, cloud parameters, modeling
The article is devoted to the creation of a specialized automated information system for accounting project decisions in the structural unit responsible for this business process in companies engaged in project activities. Targeted development of such software products will cover and take into account all features of engineering organizations. In turn, electronic accounting of such documentation will not only simplify and accelerate the work of employees, allowing them to pay attention to their other responsibilities, but also reduce the human factor in such a responsible process, when the documents of project decisions are the core of activity.
Keywords: automated information system, design decision accounting system, sequence diagram, precedent, database, report, Windows Forms
The operation of unmanned aerial vehicles (UAVs), as well as their compactness and ease of use, allow them to be actively used in various conditions and situations. UAVs have a number of parameters, from remotely piloted to fully automated, including the degree of their autonomy, as well as design and purpose. AIS transponders receive and process AIS signals, receiving at the output messages about the name of the vessel, data on the course, speed and current navigation status with the display of its location on an electronic map. The use of an open data transfer protocol in AIS makes it vulnerable when false signals (LS) appear in traffic containing distorted information with the display of false targets on the screens of AIS monitors, which can lead to navigation accidents. The purpose of the article is to develop proposals for the detection and identification of AIS UAVs. The paper analyzes the possibility of the formation of an AIS UAV, considers approaches to solving the problems of detecting and identifying drugs and suggests methods for their implementation of technical analysis of radio signals.
Keywords: automatic identification system, false signals, false signal detection, bearing
The article considers a probabilistic-temporal model for assessing the intelligence protection of a group of unmanned aerial vehicles for military purposes from enemy radio and radio intelligence complexes in service with the US Army, provides analytical expressions and a calculation sequence with examples.
Keywords: intelligence security, a group of unmanned aerial vehicles, the probability of temporary contact, the probability of energy detection, stealth, signal-to-noise ratio, surveillance reconnaissance zone, detailed reconnaissance zone, radio and radio intellig
Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.
Keywords: network traffic, computer attack, artificial neural network, traffic analysis, neural network configuration
The article discusses commodity futures price forecasting using a temporal convolutional network. Commodity futures forecasting is an important task for investors and traders because it allows you to predict future prices and the direction of the market. Commodity futures forecasting can be done using a variety of methods and approaches. One such approach is the use of deep learning models, which consists in predicting futures quotes using artificial neural networks. There are many types of neural networks, among them the most popular for the task of processing time series are recurrent neural networks. However, recurrent neural networks have certain disadvantages that a temporal convolutional network does not have. The temporal convolutional network architecture has unique features such as parallel processing of data, extraction of short- and long-term dependencies, and extraction of important features on different time scales. An experiment was conducted to assess the accuracy of predicting the closing price of seven commodity futures using a temporary convolutional network and an ARIMA statistical model with automatic selection of parameters. As a result of the experiment, it was revealed that the temporary convolutional network is superior to the statistical ARIMA model and is a very effective model for forecasting commodity futures. However, despite the high potential of the proposed forecasting model, it is also important to take into account various other analytical methods, such as fundamental analysis and expert opinion.
Keywords: machine learning, temporal convolutional neural network, commodity futures forecasting, commodities, financial time series
Prompt adjustment of the composition of the asphalt concrete mixture is key to achieving high quality asphalt concrete. To enable easy and rapid adjustment of the asphalt concrete mixture formulation, predicting the properties of asphalt concrete (Marshall stability) is critically important. There are many methods for predicting the properties of asphalt concrete, but the choice of one method or another is a very pressing problem. This article proposes two methods for forecasting Marshall stability: forecasting using a multiple linear regression model and forecasting using an autoregressive model. To evaluate the forecasting accuracy of models, we use two metrics: average absolute error (MAE) and average absolute percentage error (MAPE). The results of the study show that the autoregressive model exhibits better forecasting results, especially the second-order autoregressive model.
Keywords: asphalt concrete, control, composition adjustment, forecasting, multiple linear regression model, autoregression model, Marshall stability, forecast accuracy, mean absolute error, mean absolute percentage error
The article discusses the method of recognizing contours in the primary image. An algorithm has been developed for finding the absolute minimum of functionality in an image.
Keywords: contour, algorithm, defect, recognition, cut, reference frame, minimum search
This article discusses the problem of ensuring the control of the state and strength of the device for handling radioactive materials at nuclear power facilities and proposes the development of a remote ultrasonic control system for continuous-periodic monitoring of the state of critical structural elements of the service traverse operating in a radiation hazardous environment. The basic principles of processing the results of ultrasonic flaw detection and obtaining characteristics are given.
Keywords: ultrasonic testing, piezoelectric transducer, defect, strength, monitoring
To improve the efficiency of low-orbit satellite Internet systems (LOSIS) and ensure high apeed of data exchange, systems supporting orthogonal frequency-division multiplexing (OFDM) technology are widely used. The use of OFDM methods makes it possible to expand the bandwidth of the radio channel based on the increase in spectral efficiency. In order to do this, OFDM systems use orthogonal signal transformation based on fast Fourier transformation (FFT). To reduce the time spent on signal processing, the article proposes to use discrete wavelet transformations of signals (DWT) implemented in modular residue classes codes (MRCC). The scientific novelty of the work lies in the fact that based on the integration of methods for constructing discrete wavelet transforms and methods for developing modular codes, mathematical models of DWT implemented in the MRCC will be created, the use of which will reduce the execution time of orthogonal signal processing in OFDM systems. This result will be achieved by parallelizing arithmetic operations on the modules of the modular code. At the same time, the use of low-bit operands makes it possible to switch from performing multiplication, addition, and subtraction operations in the MRCC to retrieving data from LUT tables. Thus, the development of mathematical models of discrete wavelet transformations implemented in modular codes of residue classes is an urgent task.
Keywords: OFDM systems, discrete wavelet transformation, parallel coding, modular residue classes code
The most informative methods in diagnostics of retinal pathological conditions are ophthalmoscopy, fluorescence angiography (FAG), optical coherence tomography (OCT) and optical coherence tomography with angiography (OCT-angiography, angio-OCT, OCT-A). This paper describes an algorithm of retinal pathologic focus formation based on optical coherence tomography (OCT) scans. The algorithm allows to create a volumetric model of the pathological focus within clinically significant boundaries by separate segmentation of each of the macular cube scans, extraction of the pathological focus point cloud and its reconstruction into a polygonal 3D model. Certain morphometric parameters extracted from such a model are important for better analysis of retinal pathology. This will allow the ophthalmologist to prescribe the appropriate type and amount of treatment to stabilize and improve visual functions.
Keywords: AMD, OCT, macula, retinal pathology, dot cloud, medicine, computer vision, wet AMD
The article considers the well-known methods for comparing graphic images. To improve the accuracy of comparison of low-informative images, which are used as formalized symbols of elements on topographic maps, the paper proposes a method for comparing low-informative graphic images, consisting of a set of image comparison methods - the root mean square deviation of the pixels of one image from another and the method of pixel-by-pixel comparison of images. The definition of a formalized graphic document is given. A detailed description of the proposed methodology is presented. By way of example of two data sets, consisting of graphic elements distributed by classes depending on their style, the operation of the technique was tested and the optimal parameters were experimentally selected in the context of solving the problem. The results of the computational experiments carried out in the paper showed the effectiveness of its application in comparison with known methods for solving the problem.
Keywords: image comparison, technique, formalized graphic document, root mean square deviation, pixel-by-pixel comparison, experiment, low-informative image, class, topographic map, image size
The article presents an overview of modern veterinary diagnostic software used both in Russia and abroad. The purpose of this study is to formulate the requirements for the diagnostic information system being developed. During the review process, the software, guided by its purpose and functionality, was divided into several groups. The most famous and characteristic examples are presented and described in each group. This review of existing systems made it possible to formulate user requirements more fully and take into account current trends in the field of veterinary medicine accumulated in various information systems when developing the concept of an expert system.
Keywords: expert system, information system, database, diagnostic software
It is reported that recently, in many sectors of human activity, there has been an increasing interest in involving chatbots in company, organization or firm websites and in various applications to provide necessary assistance. This article deals with the current definitions of a chatbot and artificial intelligence. A chatbot is a computer program that imitates human speech using artificial intelligence. Artificial intelligence is a science and technology based on such disciplines as computer science, biology, psychology, linguistics, mathematics, and engineering. In the educational field, chatbots are useful for providing guidance and information about courses, admission processes and procedures, academic programs and academic services. However, these virtual assistants have limited mechanisms that could help the teaching and learning process. Attention is drawn to the fact that these mechanisms should be beneficial to all people involved. For this reason, the Voronezh State Industrial and Humanitarian College (GBPOU VO «VGPGK») was identified as the subject area in the development of a chatbot in the social network "VKontakte" for the page of an educational organization.The article considers the possibilities of using chatbots in the social network "VKontakte" for an educational organization focused on students and their parents. The article gives information about the development of the client part of the chatbot, namely the possibility of launching an electronic assistant using the page of the social network, the description of the data storage system for the chatbot and the server part. It is specially noted the variants of solutions for realization of a chatbot and the functioning of a chatbot.
Keywords: chatbot, website, server, client part, applications, social network, "VKontakte", mobile devices, artificial intelligence, computer program, information, educational sphere, message, training, data storage, electronic assistant
Mobile applications today are a necessary tool for work, study, entertainment and communication with the entire information world. Every year, the requirements for applications are increasing, as well as the need for stable and multifunctional software tools that will be able to quickly perform the tasks assigned to them. Although most applications require Internet access to provide access to services, it is also necessary to ensure that data is stored on the device itself in order to allow offline access to data. To solve this problem when developing mobile applications, there are many different tools, but the most common is the Room library, which is included in the "Android Jetpack" package. The article provides a brief description of the functionality of this library. The work of all the main components with basic annotations is considered. The interaction of the main components of the library is also schematically presented and an example of implementation in a mobile application for the Android operating system is shown.
Keywords: database, sqlite, Android Jetpack, Room, android
The paper presents a study of the problems of organizing the process of designing technical means that are involved in the technological process of production by enterprises. Under the technical means it is proposed to understand both software, hardware, and software and hardware solutions. The main problem is identified - the discrepancy between the functionality of technical means and the technological process. In this regard, a study is being made of the processes of linking the technological process of output of enterprises with the processes of designing and developing technical means. From the results of the study, it was determined that the models of the functional of technical means are constructed by developers, and not by actors. Such models are formally presented not as a description of the procedures for performing the functions of a technological process by actors, but as a model of how the functions of future technical means will be used by actors. The necessity is substantiated and a hypothesis is put forward about the possibility of solving the indicated problem.
Keywords: technological process, actor, developer, functions of the technological process, procedures for performing functions, a model for the formation of a need for a technical means, a model for the use of technical means
This article presents an overview of the tools for solving the problem of monitoring the network infrastructure. Foreign solutions are considered, their characteristics are presented, key features are described, as well as their shortcomings. The problem of import substitution in the Russian Federation is emphasized. The results were summed up, and the relevance of developing a domestic IT infrastructure monitoring system with additional functionality was developed.
Keywords: monitoring, IT infrastructure, network infrastructure, negios, zabbix, cacti, import substitution, information security, Linux, Windows
For prototyping virtual resources, there are modern UI/UX development applications that have the means to build highly productive interaction algorithms, for example, Figma or its promising new competitor Pixso. These programs support the joint redating of projects, and also allow planning and discussion of ideas and stages of work here, in the environment. The correctly chosen method of interaction leads to a multiple increase in productivity. One of the recognized approaches to project planning and management is the Agile design methodology.
Keywords: team, layout, prototype, website, methodology, formal language, brainstorming, frame, project, interface, plugin, editor
The work is devoted to the problems of strategic planning in the digital technology market. The aim of the work is to build a decision support procedure for choosing a strategy, based on internal (related to the characteristics of the firm choosing the strategy) and external (conditioned by the state of the market) factors. It is assumed that the elementary strategy is described by the type, direction and applied area of activity. In this case, the possibility of combining several elementary strategies is considered. The main result of the work is a procedure for choosing a combined strategy based on the application of a genetic algorithm. The use of the methodological apparatus of evolutionary calculations is due to the large number of possible options for combined strategies and the complexity of their evaluation, which makes a complete enumeration of options impractical. The final choice is made by the decision maker based on their own preferences.
Keywords: IT market, decision support, genetic algorithm
The purpose of the work is to show the influence of the works of Nikolai Orem on the formation of the science of dynamics. Methods. The paper shows that the study of motion led N. Omer to the conclusion that the sum of the harmonic series, which gives an estimate of the traveled path of a uniformly tired traveler, diverges. This proved that the traveler would walk any arbitrarily long distance. The connection of the model proposed by N. Orem with the zeta function and similar paradoxical models in which the path turns out to be finite, despite the slowdown or acceleration of movement, is considered. Result. The trajectory of the wayfarer Orem is demonstrated according to the Riemann formula. Links to training servers with dynamic models animated in 3D graphics and built using the ""live book"" technology are provided.
Keywords: Orem's wayfarer, zeta function, zeros of the function, Riemann problem