×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Analyzing loading sequence problems of client web applications

    This paper examines the problems of optimizing the loading of client web applications and ways to solve them, taking into account various practical conditions. It provides ways to speed up the loading of web applications and remove blocking elements in the data processing chains in order to improve various aspects of the user experience. An approach is proposed that allows you to design an optimal application loading chain that meets the highest quality standards in the front end industry and provides the best user experience.

    Keywords: front end, rendering, client web applications, load time, performance optimization, user experience

  • Studying the Effectiveness of Tree-Shaking in Modern Web Application Build Tools

    This paper analyzes the effectiveness of the Tree-Shaking mechanism, which is a key way to optimize the size of client web applications. Its implementation is compared in five popular tools for building projects: Webpack, Rollup, Parcel, Vite and Esbuild. Test results demonstrate differences in their behavior and overall effectiveness in removing redundant code, highlighting the relevance of Tree-Shaking in web development.

    Keywords: tree-shaking, javascript, front end, web applications, optimization, loading speed

  • Securing of images in the city traffic management system from unauthorized use

    The paper discusses a stegoalgorithm with localization of the embedding area in the YCbCr color space to protect images of a license plate, a vehicle from different angles, a traffic event, as well as issues of developing a software system that implements the stegoalgorithm. Image protection allows you to effectively implement the concept of multimodal interaction of socio-cyberphysical systems in an automotive self-organizing network. Evaluations of the effectiveness of the developed method are provided.

    Keywords: VANET, intelligent transport networks, city traffic management system, steganography, information security, watermark

  • Differences and prospects for the development of cloud, fog and edge computing technologies

    The article thoroughly explores cloud, fog, and edge computing, highlighting the distinctive features of each technology. Cloud computing provides flexibility and reliability with remote access capabilities, but encounters delays and high costs. Fog computing focuses on data processing at a low level of infrastructure, ensuring high speed and minimal delays. Edge computing shifts computations to the data source itself, eliminating delays and enhancing security. Applications of these technologies in various fields are analyzed, and their future development is predicted in the rapidly evolving world of information systems.

    Keywords: cloud computing, fog computing, edge computing, cloud technologies, data processing infrastructure, scope of application, hybrid computing, Internet of Things, artificial intelligence, information systems development

  • Logic resynthesis to improve the fault tolerance of combinational circuits for single failures

    The paper discusses methods for protecting logical elements of combinational circuits from single failures. Until recently, the problem of creating microelectronic devices resistant to single failures in logic elements was relevant primarily in the military and space industries. In these areas, increased requirements are placed on the fault tolerance of circuits due to the influence of external destabilizing factors. Such factors can be heavy charged particles that affect the operation of logic elements and cause their single failures. Due to the scaling of semiconductor devices, technological standards for the design and manufacture of integrated circuits are changing, and the problem of fault tolerance becomes relevant for devices on the civilian market. The article proposes a technique for resynthesising vulnerable sections of logical combinational circuits. To assess stability, it is proposed to use logical constraints obtained by the resolution method.

    Keywords: resynthesis, combinational circuits, reliability, logical correlations, resolution method

  • Development of an algorithm for recognizing human emotions using a convolutional neural network using Python tools

    This article deals with the problem of analyzing and recognizing human emotions using sound data processing. In view of the increase in the scope of application, which is largely caused by the difficult epidemiological situation in the world, the solution of the described problem is an urgent issue. The main stages are described: the audio data stream is recorded and, in accordance with the “sound fingerprinting” approach, is converted into an image that is a spectrogram of the sound data set. The stages of training a convolutional neural network on a pre-prepared set of sound data are described, and the structure of the algorithm is also described. To validate the neural network, a different set of audio data was selected, not participating in the training. As a result, graphs were constructed demonstrating the accuracy of the proposed method.

    Keywords: neural network; human emotion recognition; convolutional neural network; sound fingerprinting; Tenserflow; Keras; Matlab; Deep Network Toolbox

  • Visualization of scientific data using interpolation methods and the NVIDIA IndeX plugin in the ParaView software

    The paper presents a solution to the problem of accelerating the process of visualizing the results of numerical simulation. The volumes of such data can be very large and the development of tools to speed up the process of analyzing modeling results is an urgent task. This article proposes a solution to the problem based on the development of a set of programs that automate the process of processing large-volume scientific data of the same type to create high-quality visualizations of the results of numerical modeling. The results are presented using the example of solving problems in astrophysics, but the proposed methodology can be quite easily applied to other subject areas in which models based on the dynamics of particle systems are used. The research described in the work is devoted to solving issues related to converting data obtained from numerical modeling into a format that can be read by the ParaView softwart, which implements many methods that allow obtaining very high-quality visualization. The work also describes the process of automating batch processing of a large amount of data that has the same structure, presents the results of an analysis of the acceleration of the visualization process when using the NVIDIA IndeX plug-in, and considers the possibility of improving the quality of visualization results when applying Delaunay triangulation to the original data.

    Keywords: data visualization, Delaunay triangulation, rendering acceleration, ParaView, NVIDIA IndeX, VTK

  • Localization of round objects in images using fast radial symmetry transform

    Currently, there is an increase in the number of scientific papers on models, methods and software and hardware for image processing and analysis. This is due to the widespread introduction of computer vision technologies into information processing and control systems. At the same time, approaches that provide fast image processing in real time using limited computing resources are relevant. Such approaches are usually based on low-level image filtering algorithms. One of the tasks to be solved in computer vision-based systems is the localization of round objects. These objects have the property of radial symmetry. Therefore, the approach based on the Fast Radial Symmetry Transform, which is considered in this paper, is effective for solving this problem. The paper describes the basic steps of the basic transformation, provides a procedure for determining the centers of radially symmetric areas for localization of round objects in images, and discusses examples of its application.

    Keywords: computer vision, image processing, image analysis, localization of objects, methods of localization of round objects, fast radial symmetry transf, detecion of the centers of radially symmetric areas

  • Design of the SPI slave based on gate arrays

    Results of the Serial Peripheral Interface (SPI) Slave node design based on gate arrays 5503 series are presented in this paper. SPI is used for high-speed synchronous data transmission between control and peripheral devices. Developed chip could be applied in connection with SPI Master node for matching microcontrollers and microprocessors with different sensors, analog-to-digital and digital-to-analog converters, memory and communication units. Upon the results of the development, design approach of digital integrated circuits is proposed. The approach supposes using Russian freeware CAD "Kovcheg" ("Ark") designated for gate arrays design (IC based on prefabricated crystals, components on which are supposed to be interconnected during design to form logic devices). According to the proposed approach, behavioural descriptions of the devices, written on hardware description languages (e.g. Verilog), are used, since it is often easier to describe circuit operational principal algorithmically than construct structure from components library. The problem is that "Kovcheg" can't execute structural synthesis of the circuit from behavioural description. So it is proposed in the approach to use outside CAD environments, intended even for design of custom full-integrated circuits (like Cadence) or FPGA (like Vivado), to synthesize structural description of desired device from known behavioural ones and available process design kits (PDK) or library, appropriate for the chosen CAD. The entire design cycle using "Kovcheg" is outlined in the paper.

    Keywords: gate arrays, serial peripheral interface, hardware description language, computer-aided design

  • Exploring the React framework for implementation of the View part of client web applications

    This paper examines the need to use frameworks as such, as well as React, the most commonly used framework for creating the View portion of client-side web applications. Its design, the proposed approach to developing client applications, the problems it solves and creates, its strengths and weaknesses, as well as its features and limitations in application are studied.

    Keywords: view frameworks, client web applications, front end, React, Reconciliation, Fiber, rendering

  • Modification of the algorithm for correcting errors that occur during the operation of the satellite authentication system

    The prospects for building a satellite Internet based on a low-orbit constellation of satellites (LOСS) are due to the fact that only it allows for stable and reliable communications anywhere on the planet. Therefore, the technology of satellite industrial Internet of things IIoT has become widespread in the oil and gas industry, many of whose facilities are located in the Far North. However, when using satellite low-orbit Internet (SLOEI), new threats and attacks arise against it. Among attacks on LOCS, a special place is occupied by attempts to impose unauthorized content on SLOEI subscribers. This situation can be prevented using a satellite identification system. For the effective operation of the “friend or foe” challenge-response system for LOCS, a copy-resistant authentication protocol with zero knowledge disclosure was developed. This property was achieved by reducing authentication time through the use of modular deduction class codes (MDCC). The use of parallel VDCC codes has led to a change in the method of satellite identification, which entails a revision of the principles for constructing a request-response system. Therefore, the development of a block diagram of a satellite identification system operating in the MDCC for a low-orbit satellite Internet system is relevant.

    Keywords: imitation resistance, zero-knowledge authentication protocol, modular codes of residue classes, block diagram of the low-orbit satellite identification system

  • Features of the selection of price-forming factors in the individual assessment of an undeveloped land plot in Vsevolozhsk, Leningrad region

    The above study is aimed at calculating the market value of a land plot free from development, located in the city of Vsevolozhsk, Leningrad region. The authors consider a comparative approach to the assessment of the object, its positive sides and disadvantages are indicated. The features of the implementation of the method of comparative sales and the construction of regression models are noted. The dependence of the cost of land plots on the distance from the local center in the territory of elite cottage development was revealed. Vsevolozhsk. The conclusion is formulated about the influence of a set of factorial features and the method of their accounting on the reliability and compliance of the result with the current situation in the real estate market.

    Keywords: comparative approach, comparative sales method, correlation and regression analysis, real estate market, market information, price-forming factor, analogue object, real estate object, land plot, individual housing construction

  • Feasibility study for the selection of optimal attack (intrusion) detection tools for the needs of monitoring centers of the Russian Federation

    The subject of the study is the technical and economic characteristics of attack detection tools that affect the effectiveness of their use for the system for detecting, preventing and eliminating the consequences of computer attacks on critical information infrastructure facilities of the Russian Federation. An analysis of approaches to selecting the best solutions is presented, the result of which formed the basis of the proposed solution. The article contains a study of approaches to solving the problem of feasibility study of choice, formalizing the formulation of the problem and a mathematical model for solving the problem of choosing the optimal attack detection tool for implementing the corresponding tasks. The research methods used include systems analysis, modeling and peer review methods. The purpose of developing the methodology is to increase the level of validity of decision-making on choosing the best of the proposed attack detection tools. The research results presented in the article can be used to carry out a feasibility study of decisions made when choosing attack detection tools for the needs of monitoring centers of the Russian Federation. The proposed methodology for conducting competitive analysis can be used as the basis for conducting appropriate research for each means of the system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation.

    Keywords: attack detection tools, intrusion detection tools, feasibility study, competitive analysis, information security tools, decision support system, information security system, optimization, integer linear programming

  • Solutions to optimize the process of collecting and recycling plastic waste in the ocean

    The article discusses the issues related to the solution of an actual problem – the recycling of accumulations of plastic waste in the ocean. It is proposed to organize the plastic recycling process directly in the ocean on recycling vessels. At the same time, the products of mechanical processing and pyrolysis can be used to support the construction, road construction, and electric power industries of coastal developing countries in Africa and Latin America, near which the largest amount of plastic waste is concentrated. It is proposed to use both systems with artificial intelligence trained to recognize and identify plastic by shape, and systems based on spectral analysis of the composition of plastic for sorting and identification.

    Keywords: plastic waste, microplastics, plastic recycling in the ocean, recycling vessel, plastic type recognition, use of recycled plastic

  • Comparative analysis of additive technologies used to form electromechanical structures of functional devices

    The paper provides a comparative analysis of additive technologies in the field of formation of electromechanical designs of functional devices. In particular, the problem of using additive technologies, their relevance in relation to modern needs in different fields of science and technology is put, the essence of additive technological processes for the production of various kinds of products is revealed and a specific design and technological approach for creating a modular product on the basis of these technologies is defined.

    Keywords: additive technologies, printed circuit board, 3D printing, fused deposition modeling , selective laser sintering, stereolithography, digital light processing, direct metal laser sintering, selective laser melting, direct ink writing

  • Digital Transformation of Education: Cognitive Models of Collective Cognition and Communication

    The article shows the relevance of solving the problem of conceptual analysis of traditional and digital educational structures integrated in the process of transformation, identification and evaluation of their effective interaction. It is proposed to use the methodology of the cognitive analysis that has already passed the stages of approbation in the subject environment of education. It is noted that the educational process includes continuously generated and continuously modified cycles of cognition of reality. Within the framework of generalized descriptions presented by models of cognition, a transition is naturally made from individualized cycles of cognition to a collective study of reality, in which models already control collective cognition, forming a cycle of cognition based on collective communication. An initial cognitive model has been developed which illustrates the situation that has developed in the modern educational system under the powerful influence of the "technocratic" point of view on digitalization. A cognitive model of collective cognition and communication in the digital environment is proposed, which systematically integrates three important parts from the point of view of transformational processes in education, namely, the traditional structure of cognition of reality, the newest structure of digital communication built in the paradigm of the collective subject of cognition, and, finally, the structure of strategic management based on the socio-cultural development of society and the country.

    Keywords: Cognitive model, education, digital transformation, cognition, communication

  • The use of neural network detectors to prevent accidents at work

    This article discusses the features of the use of neural network detectors in the tasks of recognizing protective helmets and helmets. Nowadays, workplace safety is becoming an increasingly relevant topic, especially in industries with a high level of injuries. There are accidents caused by violations of rules and regulations at work sites, among them cases related to non-compliance with the rules of wearing protective helmets. The article examines methods and algorithms for recognizing protective helmets and helmets, and assesses their effectiveness.

    Keywords: convolutional neural network, object recognition, protective helmets. helmets, SSD, YOLOv5, Faster R-CNN, machine learning, deep learning, image classification

  • Determination of the geometry of the room by the impulse response using convolutional neural networks

    Existing methods for determining the geometry of an enclosed space using echolocation assume the presence of a large amount of additional equipment (sound sources and receivers) in the room. This paper investigates a method for determining the geometry of enclosed spaces using sound location. The method does not assume the presence of a priori knowledge about the surrounding space. One sound source and one sound receiver were used to create and capture real impulse characteristics. A microphone was used as a sound receiver and a finger snap was used as a sound source to produce the impulse response. In this work, we used convolutional neural networks that were trained on a large dataset consisting of 48000 impulse responses and a number of room geometry parameters corresponding to them. The trained convolutional neural network was tested on the recorded impulse responses of a real room and showed accuracy ranging from 92.2 to 98.7% in estimating room size from various parameters.

    Keywords: convolutional neural networks, room geometry, echolocation, impulse response, robotics, recognition, contactless methods of measuring objects, sonar, geometry prediction, virtual reality

  • A Study and Comparative Analysis of the Computational Performance of AssemblyScript

    In the world of web development, there is a growing need for tools that can provide high performance for client applications. In response to this challenge, WebAssembly technology has been developed to compile various programming languages into a binary format that can be executed in web browsers. The new AssemblyScript programming language provides the ability to create high-performance WebAssembly modules using the TypeScript language syntax familiar to Web developers. This paper investigates WebAssembly and AssemblyScript, and compares the performance of AssemblyScript and JavaScript using four computational algorithms as examples. The test results demonstrate faster execution speed of AssemblyScript in most tasks, as well as more stable performance when executed in different browsers. The study highlights the relevance of using AssemblyScript to optimize computationally intensive operations in web application development.

    Keywords: assemblyscript, webassembly, wasm, javascript, front end, performance, web applications

  • Using statistical edge-based modeling for motion detection in video

    In this article we present a novel algorithm for detecting moving objects using a stationary camera, which is based on statistical background modeling using edge segments. Traditional algorithms that rely on pixel intensity struggle in dynamic environments due to their inability to handle sudden changes in lighting conditions. These algorithms also tend to produce ghosting artifacts when a sudden change occurs in the scene. To address this issue, edge-based features that are robust to intensity variations and noise have been introduced. However, existing methods that rely on individual edge pixels suffer from scattered edge pixels and cannot effectively utilize shape information. Additionally, traditional segment-based methods struggle with variations in edge shape and may miss moving edges that are close to the background edges. In contrast to conventional approaches, our proposed method constructs the background model using regular training frames that may include moving objects. Furthermore, it avoids the generation of ghosting artifacts. Additionally, our method employs an automatic adaptive threshold for each background edge distribution to facilitate matching. This enhances the robustness of our approach to changes in illumination, camera movement, and background motion. Experimental results demonstrate that our method outperforms other techniques and efficiently detects moving edges despite the aforementioned challenges.

    Keywords: motion detection, edges, canny edge detector, gaussian of color, gaussian of gradient magnitude, normal distribution, adaptive thresholds, statistical map

  • The regression modieling the level of Ia river, Irkutsk State

    Analyses for the current publishes show that the problem of forecast water overflowing is actual and often causing a lot health threaten and other dangerouses. This article offers computing, analysis and development the regression model of the level of Ia river. The final model correspont the real data with proper level. The final calculation means that this model could be used for real forecast for defend the people from water's overflow.

    Keywords: model, simulation, river, water level, flood, emergency, forecast, statistics, monitoring, analysis, iya river, Irkutsk region

  • Algorithm for fragmentation and defragmentation of formal contexts

    A combinatorial problem - the problem of finding the set of all formal concepts of formal concepts is considered. The computational complexity of the problem is that the number of formal concepts depends exponentially on the size of the initial formal context. in the article to solve this problem, an algorithm for fragmentation and defragmentation of the formal context is given, based on the method of decomposing the formal context into fragments. The essence of the method is that the original formal context is divided into various fragments. The fragments have different sizes and a non-empty intersection. Each fragment is subsequently considered as a formal context and can again be subject to decomposition. As a result, a finite set of fragments is formed. Then formal concepts are found in each fragment and combined to form the desired set of all formal concepts of the formal context. The method is “non-distorting”: when dividing the context into fragments, new formal concepts are not formed and the sought-for concepts are not lost. The results of computational experiments are presented, showing the effectiveness of the developed algorithm.

    Keywords: formal concepts analisys, fragmentation algorithm, formal context, object-attribute table, combinatorial problem, the problem of finding the set of all formal concepts

  • Study of synchronization of almost-proportional and almost-periodic characteristics of time series

    In this study, an analysis of the time series was conducted using a class of shift functions for arithmetic and geometric progressions, along with their synchronization using logarithmic decrement. The closing prices of IBM company stocks were taken as the examined data for each trading day. The shift functions of geometric and arithmetic progressions revealed almost-proportions and almost-periods in the examined data. These detected patterns emphasize the importance of applying shift functions in the analysis of time series, allowing the extraction of internal patterns and periodic fluctuations that might go unnoticed with standard analysis methods. Computing the minima and corresponding values of the geometric progression enabled the identification of almost-periods in the data. These results not only confirmed visual observations but also enhanced our understanding of the internal patterns of the time series. The findings underscore the effectiveness of applying methods for analyzing time series based on almost-proportions and metric techniques. These approaches play a crucial role in uncovering hidden patterns and subtle periodicities in data, providing a fundamental foundation for more accurate analysis and successful forecasting.

    Keywords: nearly-proportionalities, synchronization of geometric progression, empirical data, geometric progression, shift functions

  • Algorithms for automatic control of geometric parameters of steel ropes in elevator systems

    The paper considers the problem of automatic detection of defects in the geometric parameters of steel ropes of elevator systems using computer vision methods. The features of flaw detection of moving steel ropes based on video sequences are analyzed, associated with the fragmentation of the image of some defects in adjacent frames and the variability of the geometric dimensions of the rope and the characteristics of the defect visible by the camera due to vibrations of the rope during movement. Taking into account the considered features, two algorithms have been proposed: to determine the defect of thickening/thinning of the rope diameter and the defect of undulation. The paper presents the results of experimental testing of algorithms on a special test bench and calculates the reliability indicators of defect detection by the proposed algorithms in the form of precision and recall of detection of each defect individually, as well as the average precision and recall of detection of both considered defects of geometric parameters of the rope as a whole.

    Keywords: steel rope defects, instrumental control, non-contact flaw detection, computer vision

  • Study of hardware implementation of neural networks when processing information in residue number system

    This article examines models of arithmetic devices for finite ring neural networks of the second and third orders. The arithmetic devices under study were synthesized on the basis of FPGA. Estimates of hardware costs and performance of computers for system modules of residual classes of different capacity were obtained. The structure of a finite ring neural network with dynamic connections is proposed, the efficiency of which in terms of hardware costs is observed with increasing capacity of the residue number system module. The advantage of a finite ring neural network with dynamic connections is established for modules with a capacity of 64 bits and higher.

    Keywords: neural networks, residue number system, group of elliptic curve points, FPGA, multiplier, adder