×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • The methodology of full-scale testing of reinforced concrete beams as part of a ribbed monolithic floor

    In accordance with the requirements of Federal Law No. 384-FZ, the safety and reliability of buildings and structures must be ensured. One of the ways to confirm the safety and reliability of building structures is to conduct field tests. The authors of this article have developed a method for full-scale testing of a reinforced concrete beam with a span of 14.52 m as part of a monolithic reinforced concrete ribbed floor. The procedure for testing the beam was drawn up with the development of measures to ensure safety during work, the adjustment of the beam testing method by loading was performed, the beam was tested by loading method with fixation of its deflections, followed by analysis of the test results. The test results showed that the developed method can be used as a full-scale test to confirm the safety and reliability of building structures, namely horizontal reinforced concrete structures.

    Keywords: building structures, beam, destruction, safety, methodology, technical condition, field tests

  • Basics of calculating a quantitative assessment of the installation manufacturability of steel structures with a span of up to 18 m

    The relevance of the issue of variant design is considered, taking into account the analysis of previously applied solutions. The concept of installation manufacturability of objects is revealed, its component properties are substantiated. A table of the hierarchy of installation manufacturability properties has been generated. The functions of each level of the property hierarchy are disclosed. The weight indicators of the criteria were calculated using an expert survey. a formula for a complex indicator of installation manufacturability was obtained. A hypothesis has been put forward about the quantitative assessment of the levels of installation manufacturability.

    Keywords: manufacturability, installation manufacturability, levels of hierarchy of installation manufacturability, weight of indicators of properties of installation manufacturability, installation of steel structures

  • Mathematical modeling of the motion of a planning body of complex configuration

    motion of the body are obtained, which can only be solved numerically. The equilibrium equations are solved and the basic stationary modes of body motion are obtained. The main result is the most gentle body planning mode. In the matlab computer mathematics system, a set of programs is written that searches for a numerical solution and outputs trajectories. The movement of the modes under consideration is modeled and the stability of the main modes is looked at using numerical calculations.

    Keywords: body, planning mode, stability, geometric dimensions

  • Development of a data indexing system for the production, economic and labor sectors of the penitentiary system

    The development of business analytics, decision-making and resource planning systems is one of the most important components of almost any enterprise. In these matters, enterprises and production facilities of the penitentiary system are no exception. The paper examines the problem of the relationship between existing databases and statistical reporting forms of the production, economic and labor sectors of the penitentiary system. It has been established that indirectly interrelated parameters are quite difficult to compare due to different data recording systems, as well as approved statistical forms. One of the first steps in solving this problem could be the introduction of a generalized data indexing system. The paper discusses data indexing systems, the construction of their hierarchical structures, as well as the possibility of practical application using SQL. Examples of implementation using ORM technology and the Python language are considered.

    Keywords: databases, indexing, ORM, SQL, Python, manufacturing sector, economic indicators, penitentiary system

  • Development of a retiling microservice in the Python programming language

    In the modern world, it is increasingly necessary to process geographical information in a variety of forms. This paper discusses the concept of «tile», its purpose, features, as well as the process of retiling, which is a method of creating and updating tiles. This technology helps to increase the efficiency of modern cartographic services, reducing the loading time of maps. The main stages of the development of a microservice implementing the retiling logic are presented sequentially. The main data provider is the OpenStreetMap (OSM) open source project. The spatial data set is a core OSM product and contains up-to-date geographic data and information from around the world. The technology stack is based on the Python language, to which specialized modules for working with tiles are added, as well as a library for implementing a simple and high-quality API.

    Keywords: Python, tile, retiling, OpenStreetMap, microservice, Flask-RESTX, mercantile

  • Statical algorithms for identifying unique features from a person's handwritten signature

    One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.

    Keywords: static algorithms, metrics, signature length, scaling, signature angle

  • Dynamic algorithms for identifying unique features from a person's handwritten signature

    Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.

    Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform

  • Development of a mathematical model and a software package for automating scientific research in the field of financial industry news analysis

    The article is devoted to the development of a mathematical model and a software package designed to automate scientific research in the field of financial industry news analysis. The authors propose an approach based on the use of graph theory methods to identify the most significant scientific hypotheses, the methods used, as well as the obtained qualitative and quantitative results of the scientific community in this field. The proposed model and software package make it possible to automate the process of scientific research, which contributes to a more effective analysis of it. The research results can be useful both for professional participants in financial markets and for the academic community, since the identification of the most cited and fundamental works serves as the starting point of any scientific work.

    Keywords: software package, modeling, graph theory, news streams, Russian stock market, stocks, citation graph

  • A website for debugging of robots artificial intelligence technologies

    The article presents the state of technology of websites for designing robots with artificial intelligence. The image of a modern technical site-book as a place for the development of artificial intelligence applications is considered, the possibility of executing algorithms from the page to ensure the connection of robots with real and virtual objects is shown.

    Keywords: mathematical network, technical website-book, artificial intelligence, algorithms executed on the website-book, network development of robots

  • Developing a Piecewise Linear Regression Model for a Steel Company Using Continuous Form of Maximum Consistency Method

    The paper presents a brief overview of publications describing the experience of using mathematical modeling methods to solve various problems. A multivariate piecewise linear regression model of a steel company was built using the continuous form of the maximum consistency method. To assess the adequacy of the model, the following criteria were used: average relative error of approximation, continuous criterion of consistency of behavior, sum of modules of approximation errors. It is concluded that the resulting model has sufficient accuracy and can be used for forecasting.

    Keywords: mathematical modeling, piecewise linear regression, least modulus method, continuous form of maximum consistency method, steel company

  • On image masking as the basis for building a visual cryptography scheme

    The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.

    Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding

  • Organizational scheme of major repairs of radiation diagnostics facilities

    The article deals with the issues of major repairs of rooms for radiation diagnostics in medical institutions, which is becoming more and more relevant in modern conditions. Functional diagnostics plays a key role in early detection of diseases, correct diagnosis and effective treatment of patients. With the development of technology and the advent of high-tech diagnostic equipment, there is a need to upgrade medical institutions to integrate such equipment. The study, conducted on the basis of an analysis of regulatory and technical documentation and scientific papers, highlighted the main stages of major repairs of radiation diagnostics facilities, identified the main participants in these stages. Organizational charts have also been developed for each stage, which emphasize the importance of coordination between all project participants, including builders, engineers, architects and medical specialists. The implementation of such schemes helps to minimize time and financial costs, ensures the implementation of all necessary requirements and standards, and guarantees the high quality of the work performed. As a result, we receive an organized repair process that allows medical institutions to effectively use new diagnostic equipment to improve the quality of medical services and improve the diagnosis and treatment of patients.

    Keywords: major repairs, healthcare facilities, radiation diagnostics facilities, medical organization, project documentation

  • Modeling the probabilistic characteristics of blocking requests for access to radio resources of a wireless network

    Fifth-generation networks are of great interest for various studies. One of the most important and relevant technologies for efficient use of resources in fifth-generation networks is Network Slicing technology. The main purpose of the work is to simulate the probabilistic characteristics of blocking requests for access to wireless network radio resources. The main task is to analyze one of the options for implementing a two–service model of a wireless network radio access scheme with two slices and BG traffic. In the course of the work, the dependence of the probability of blocking a request depending on the intensity of receipt of applications of various types was considered. It turned out that the probability of blocking a type i application has the form of an exponential function. According to the results of the analysis, request blocking occurs predictably, taking into account the nature of incoming traffic. Previously, there are no significant drawbacks in the considered model. The developed model is of great interest for future, deeper and long-term research, for example, using simulation modeling, with the choice of optimal network parameters.

    Keywords: queuing system, 5G, two - service queuing system, resource allocation, Network Slicing, elastic traffic, minimum guaranteed bitrate

  • Choosing the shape of a rational structural covering

    The paper deals with the problem of choosing the most rational form of spatial metallic cross-barrel coating. Mathematical models of flat structural coating, elliptical paraboloid and hyperbolic paraboloid coatings in SCAD software package based on finite element method are analyzed. Nodal connections of rod elements of coatings are taken according to the system “Kislovodsk”. The obtained parameters of stress-strain state of three different structural coverings allow us to speak about practically identical operation of the structures.

    Keywords: structural covering, spatial covering, cross-bar covering, stress-strain state, “Kislovodsk” system, SCAD program complex, finite element method, hyperbolic paraboloid, elliptic paraboloid

  • Development of a behavior pattern for a game bot with artificial intelligence elements based on Markov chains

    The subject of this article is the development of a behavior pattern with AI elements for an opponent bot in the single-player game Steal Tower. The essence of which is to collect resources to build a tower faster than opponents. To create the illusion that the same people are playing against the player, an imitation stochastic model based on the Monte Carlo method for Markov chains has been developed. Based on the results of its tests, balanced system parameters were determined, which are embedded in the behavioral pattern of the bot, which is implemented using the Enum AIStates enumeration consisting of five states: Idle (inactivity), GoTo (movement) and GoToWarehouse (return to the warehouse), Win (victory), Loose (scoring). Each of them has developed functions for the optimal behavior of the bot given in the article. So for the GoTo state, functions have been created that analyze the benefits of different types of behavior: steal or collect, or walk to the warehouse or to the tower.

    Keywords: game intelligence, behavioral pattern, live world emulation, bot behavior scenario, state structure, Markov chains, Monte Carlo method, simulation model, Unity environment, C# language