×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • An overview of solutions for optimizing the management system of facility protection complex

    Optimization of automated management systems for facility protection complexes remains relevant today. This research paper provides an overview of the tools for implementing separate monitoring processes: device polling, processing of the received data, and transferring data to the graphic user interface. Based on the analysis of the reviewed information, a basis of solutions for developing management system of the technical means complex is planned to be formed. During the research, it was found that the combination of multi-threading architecture and adaptive polling algorithm allows to implement a large-scale polling; the clustering algorithm and special settings of frameworks for processing large-scale datasets can enhance job performance; WebSocket protocol has proved its efficiency for transferring the real-time data. The result of the evaluation of solutions was a set of tools for implementation of a hardware-software complex.

    Keywords: sensor, management system, monitoring, SNMP manager, clustering, Hadoop, MapReduce, Spark, Apache Kafka, WebSocket

  • Current state and prospects of development of high-tech industrial systems based on 5th generation mobile broadband communications

    The paper examines the current state of the industrial Internet of Things market in Russia and around the world, the main areas of its application, as well as the prospects and challenges that businesses and industrial enterprises will face in implementing this technology. Special attention is paid to the advantages of implementing IIoT, such as increased productivity, reduced costs, improved security and transparency of processes. The barriers specific to the Russian market are discussed, including cybersecurity, hardware compatibility, and significant initial costs. Examples of successful implementations of IIoT technologies in various industries such as the oil and gas industry, logistics and chemical production are given. The emphasis is placed on the need for government support and adaptation of the regulatory framework to accelerate implementation. The article highlights the importance of an integrated approach to IIoT implementation, including using international experience and consolidating efforts to develop the digital economy in the face of global and local challenges.

    Keywords: industrial Internet of Things, IIoT, industry 4.0, 5G, production automation, digital transformation

  • Design and Development of Information System for Automated Processing of Orders for the Production of Abrasive Tools

    The article is devoted to the creation of a highly specialized automated information system for automated processing of orders for the production of abrasive tools. The development of such software products will improve production efficiency through the transition from order-based production to batch production.

    Keywords: automated information system, production order processing system, Rammler-Breich diagram, role-based data access system

  • System analysis of the information system for accounting of human resources in risk management

    The article is the result of an analytical study on the topic of risk management in the creation and modernization of business processes. The article proposes risk management methods using the organization's human resources and methods for training personnel taking into account trends in the labor market. The effect of implementing risk management measures and the method for assessing the effectiveness of the implemented training are separately noted.

    Keywords: risk management, human resources, employee training, experts, SWOT analysis

  • Modeling the dynamics of mixing of a two-component mixture by a Markov process

    The article considers the issues of imitation modeling of fibrous material mixing processes using Markov processes. The correct combination and redistribution of components in a two-component mixture significantly affects their physical properties, and the developed model makes it possible to optimize this process. The authors propose an algorithm for modeling transitions between mixture states based on Markov processes.

    Keywords: modeling, imitation, mixture, mixing, fibrous materials

  • Integration of Cloud, Fog, and Edge Computing: Opportunities and Challenges in Digital Transformation

    This article explores the opportunities and challenges of integrating cloud, fog, and edge computing in the context of digital transformation. The analysis reveals that the synergy of these technologies enables optimization of big data processing, enhances system adaptability, and ensures information security. Special attention is given to hybrid architectures that combine the advantages of centralized and decentralized approaches. Practical aspects are addressed, such as the use of the ENIGMA simulator for modeling scalable infrastructures and the EC-CC architecture for smart grids and IoT systems. The role of specialized frameworks in optimizing routing and improving infrastructure reliability is also highlighted. The integration of these technologies drives advancements in key industries, including energy, healthcare, and the Internet of Things, despite challenges related to data security.

    Keywords: cloud computing, fog computing, edge computing, hybrid architectures, Internet of Things, digital transformation, big data, decentralized systems, computing integration, distributed computing, data security, resource optimization, data transfer speed

  • Substantiation of the effectiveness of using recycling and waste disposal technologies based on the materials management model

    The paper analyzes existing effective technologies of waste recycling and utilization. The authors consider various approaches in the international practice of recycling production and consumption waste. An assessment is given of the possibilities of using effective technologies for waste recycling and disposal and the necessary costs for their implementation in relation to the conditions of an industrial enterprise. The types and volumes of waste that can be recycled and disposed of irrevocably are considered, for which the carbon footprint parameters are calculated using the materials management model. A statistical regression analysis of data on the production, processing, disposal and incineration of polyethylene waste, solid municipal waste and paper was carried out. The principles of building a system for reducing technogenic risks and managing production and consumption waste were determined.

    Keywords: waste processing; waste disposal; carbon footprint; carbon footprint calculation methods; man-made risk management system; hazardous impact factors; industrial waste management

  • Application of neural networks in modern radiography: automated analysis of reflectometry data using machine learning

    This article will present the mlreflect package, written in Python, which is an optimized data pipeline for automated analysis of reflectometry data using machine learning. This package combines several methods of training and data processing. The predictions made by the neural network are accurate and reliable enough to serve as good starting parameters for subsequent data fitting using the least-mean-squares (LSC) method. For a large dataset consisting of 250 reflectivity curves of various thin films on silicon substrates, it was demonstrated that the analytical data pipeline with high accuracy finds the minimum of the film, which is very close to the set by the researcher using physical knowledge and carefully selected boundary conditions.

    Keywords: neural network, radiography, thin films, data pipeline, machine learning

  • Analysis of the influence of data representation accuracy on the quality of wavelet image processing using Winograd method computations

    This paper is devoted to the application of the Winograd method to perform the wavelet transform in the problem of image compression. The application of this method reduces the computational complexity and also increases the speed of computation due to group processing of pixels. In this paper, the minimum number of bits at which high quality of processed images is achieved as a result of performing discrete wavelet transform in fixed-point computation format is determined. The experimental results showed that for processing fragments of 2 and 3 pixels without loss of accuracy using the Winograd method it is enough to use 2 binary decimal places for calculations. To obtain a high-quality image when processing groups of 4 and 5 pixels, it is sufficient to use 4 and 7 binary decimal places, respectively. Development of hardware accelerators of the proposed method of image compression is a promising direction for further research.

    Keywords: wavelet transform, Winograd method, image processing, digital filtering, convolution with step

  • Using neural networks to solve computer vision problems

    The article discusses the main approaches to solving computer vision problems using neural networks, focusing on their application to a wide range of tasks. It describes the types of problems addressed by computer vision, such as image classification, object detection, segmentation, and activity recognition. The functioning mechanisms of convolutional neural networks (CNNs) are explained in detail, highlighting key features like convolutional layers, pooling operations, and activation functions. The problem of selecting object detection models, which generalize the more studied problem of object classification, is examined in depth, along with an evaluation of the efficiency of various algorithms using metrics like mAP (mean Average Precision) and IoU (Intersection over Union). Modern approaches to training neural networks are discussed, including the use of pre-trained models, transfer learning methods, and fine-tuning techniques for domain-specific applications. The article describes the advantages and limitations of prominent CNN architectures such as ResNet, VGG, and EfficientNet, offering insights into their suitability for different tasks. Data augmentation methods, aimed at improving the generalization ability of models, are also considered, emphasizing their importance for addressing data scarcity challenges. Practical examples of computer vision applications in areas like facial recognition, autonomous driving, and medical diagnostics are provided to illustrate the real-world relevance of these methods. Additionally, the integration of computer vision algorithms into complex systems and workflows is analyzed, highlighting its transformative potential across industries. Finally, the article discusses the future directions for research in this domain, including advancements in unsupervised learning, real-time processing, and explainable AI in computer vision.

    Keywords: computer vision, architecture, convolutional neural networks, digital image, object classification

  • Programming using the actor model on the Akka platform: concepts, patterns, and implementation examples

    This article discusses the basic concepts and practical aspects of programming using the actor model on the Akka platform. The actor model is a powerful tool for creating parallel and distributed systems, providing high performance, fault tolerance and scalability. The article describes in detail the basic principles of how actors work, their lifecycle, and messaging mechanisms, as well as provides examples of typical patterns such as Master/Worker and Proxy. Special attention is paid to clustering and remote interaction of actors, which makes the article useful for developers working on distributed systems.

    Keywords: actor model, akka, parallel programming, distributed systems, messaging, clustering, fault tolerance, actor lifecycle, programming patterns, master worker, proxy actor, synchronization, asynchrony, scalability, error handling

  • Adaptation of the dynamic time warping algorithm for the problem of finding the distance between two time series with periods of low value variability

    The dynamic time warping algorithm (DTW) is designed to compare two time series by measuring the distance between them. DTW is widely used in medicine, speech recognition, financial market and gaze trajectories analysis. Considering the classic version of DTW, as well as its various modifications, it was found that in the tasks of analyzing the distance between gaze trajectories, they are not able to correctly take into account the duration of its fixations on visual stimuli. The problem has not attracted much attention so far, although its solution will improve the accuracy and interpretation of the results of many experimental studies, since assessing the time of visual focus on objects is an important factor in visual analysis. Hence the need to adapt DTW for such tasks. The goal of this work is to adapt the classic DTW to the problem of finding the distance between two time series with periods of low variability of values. During the demonstration of the developed algorithm, it was proven that the effect of a given minimum threshold of fixation duration on the result is significant. The proposed adaptation of DTW will improve the quality of visual data analysis and can be applied to understanding the mechanisms of human perception and decision-making in various fields of activity, such as psychology and marketing, as well as to developing effective methods for testing interfaces.

    Keywords: dynamic time warping algorithm, eye tracking, time series, gaze trajectory, gaze fixation duration

  • Comparative analysis of ResNet18 and ResNet50 neural network resilience to adversarial attacks on training sets

    This article is devoted to a comparative analysis of the resilience of ResNet18 and ResNet50 neural networks to adversarial attacks on training sets. The issue of the importance of ensuring the safety of learning sets is considered, taking into account the growing scope of artificial intelligence applications. The process of conducting an adversarial attack is described using the example of an animal recognition task. The results of two experiments are analyzed. The purpose of the first experiment was to identify the dependence of the number of epochs required for the successful execution of an adversarial attack on the training set on the neural network version of the ResNet architecture using the example of ResNet18 and ResNet50. The purpose of the second experiment was to get an answer to the question: how successful are attacks on one neural network using modified images of the second neural network. An analysis of the experimental results showed that ResNet50 is more resistant to competitive attacks, but further improvement is still necessary.

    Keywords: artificial intelligence, computer vision, Reset, ResNet18, ResNet50, adversarial attacks, learning set, learning set security, neural networks, comparative analysis

  • Comparative Analysis of Methods of Knowledge Extraction from Texts for Building Ontologies

    This article is devoted to a comparative analysis of methods for extracting knowledge from texts used to build ontologies. Various extraction approaches are reviewed, such as lexical, statistical, machine learning and deep learning methods, as well as ontology-oriented methods. As a result of the study, recommendations are formulated for choosing the most effective methods depending on the specifics of the task and the type of data being processed.

    Keywords: ontology, knowledge extraction, text classification, named entities, machine learning, semantic analysis, model

  • Comparative Analysis of Machine Learning Models for Driver Classification Using Data from Microelectromechanical System Sensors

    This study presents a comparative analysis of machine learning models used for driver classification based on microelectromechanical system (MEMS) sensor data. The research utilizes the “UAH-DriveSet” open dataset, which includes over 500 minutes of driving data with annotations for aggressive driving events, such as sudden braking, sharp turns, and rapid acceleration. The models evaluated in this study include gradient boosting algorithms, a recurrent neural network and a convolutional neural network. Special attention is given to the impact of data segmentation parameters, specifically window size and overlap, on classification performance using the sliding window method. The effectiveness of each model was assessed based on classification metrics such as accuracy, precision, and F1 score. The results show that gradient boosting “LightGBM” outperforms the other models in terms of accuracy and F1 score, while long short-term memory model demonstrates good performance with time-series data but requires larger datasets for better generalization. Convolutional neural network, while effective for identifying short-term patterns, faced difficulties with class imbalances. This research provides valuable insights into selecting the most appropriate machine learning models for driver behavior classification and offers directions for future work in developing intelligent systems using MEMS sensor data.

    Keywords: driver behavior analysis, microelectromechanical system sensors, machine learning, aggressive driving, gradient boosting, recurrent neural networks, convolutional neural networks, sliding window, driver classification

  • Automation of the fire dynamics numerical simulation results

    The results of fire dynamics simulation based on the FDS software kernel are a large amount of data describing the dynamics of various parameters in the space of the studied object. Solving various research problems based on them may require quite complex processing, which goes beyond the functionality of existing software solutions. The article is devoted to the method of efficiency increasing for numerical fire dynamics simulation results processing by automating the implementation of relevant operations. The article describes the functional model of the developed technology and its main stages. Approbation of the proposed method was carried out using the example of solving the problem of forming initial data arrays in high spatial and time resolution for the subsequent study of enclosing tunnel structures heating in case of fire. Graphs of the gas medium temperature at various points under the roof of the tunnel structure from the coordinate are presented, as well as temperature fields in the vertical section of the investigated structure in the plane passing through the fire focus at different times. Based on the comparative analysis, it was shown that the speed of calculation results automated processing is several orders of magnitude higher compared to methods that use the functionality of existing software solutions designed to view the output of the fire dynamics simulation.

    Keywords: fire dynamics simulation, automation, data processing, tunnel structures, mathematical model, FDS

  • Smart Home Wireless Local Area Network Based on Splitter-Repeater Modules

    The article discusses current issues related to the design of a smart home wireless local area network based on splitter-repeater modules. Special attention in the study is paid to the modules of wired and wireless hubs and switches. The results of the comparative characteristics of PLC and FBT splitter-repeaters are also presented. Particular emphasis is placed on the network topology and its main components.

    Keywords: wireless network, topology, data, transmission, power, traffic, packet, failures, adapter, cable, connection

  • The actor model in the Elixir programming language: fundamentals and application

    The article explores the actor model as implemented in the Elixir programming language, which builds upon the principles of the Erlang language. The actor model is an approach to parallel programming where independent entities, called actors, communicate with each other through asynchronous messages. The article details the main concepts of Elixir, such as comparison with a sample, data immutability, types and collections, and mechanisms for working with the actors. Special attention is paid to the practical aspects of creating and managing actors, their interaction and maintenance. This article will be valuable for researchers and developers interested in parallel programming and functional programming languages.

    Keywords: actor model, elixir, parallel programming, pattern matching, data immutability, processes, messages, mailbox, state, recursion, asynchrony, distributed systems, functional programming, fault tolerance, scalability

  • A method for automatic analysis of thermal images of high-voltage equipment using unsupervised computer vision and machine learning algorithms

    The transition from scheduled maintenance and repair of equipment to maintenance based on its actual technical state requires the use of new methods of data analysis based on machine learning. Modern data collection systems such as robotic unmanned complexes allow generating large volumes of graphic data in various spectra. The increase in data volume leads to the task of automating their processing and analysis to identify defects in high-voltage equipment. This article analyzes the features of using computer vision algorithms for images of high-voltage equipment of power plants and substations in the infrared spectrum and presents a method for their analysis, which can be used to create intelligent decision support systems in the field of technical diagnostics of equipment. The proposed method uses both deterministic algorithms and machine learning. Classical computer vision algorithms are applied for preliminary data processing in order to highlight significant features, and models based on unsupervised machine learning are applied to recognize graphic images of equipment in a feature space optimized for information space. Image segmentation using a spatial clustering algorithm based on the density distribution of values ​​taking into account outliers allows detecting and grouping image fragments with statistically close distributions of line orientations. Such fragments characterize certain structural elements of the equipment. The article describes an algorithm that implements the proposed method using the example of solving the problem of detecting defects in current transformers, and presents a visualization of its intermediate steps.

    Keywords: diversification of management, production diversification, financial and economic purposes of a diversification, technological purposes of ensuring flexibility of production

  • Formation of a search query for searching information in a subject area using the zipf law and the three sigma rule

    The annual growth of the load on data centers increases many times over, which is due to the growing growth of users of the information and telecommunications network Internet. Users access various resources and sources, using search engines and services for this. Installing equipment that processes telecommunications traffic faster requires significant financial costs, and can also significantly increase the downtime of the data center due to possible problems during routine maintenance. It is more expedient to focus resources on improving the software, rather than the hardware of the equipment. The article provides an algorithm that can reduce the load on telecommunications equipment by searching for information within a specific subject area, as well as by using the features of natural language and the process of forming words, sentences and texts in it. It is proposed to analyze the request based on the formation of a prefix tree and clustering, as well as by calculating the probability of the occurrence of the desired word based on the three sigma rule and Zipf's Law.

    Keywords: Three Sigma Rule, Zipf's Law, Clusters, Language Analysis, Morphemes, Prefix Tree, Probability Distribution

  • Using the determining the similarity of words method to evaluate text vectorization algorithms

    The article presents the existing methods of reducing the dimensionality of data for teaching machine models of natural language. The concepts of text vectorization and word-form embedding are introduced. The task of text classification is being formed. The stages of classifier training are being formed. A classifying neural network is being designed. A series of experiments is being conducted to determine the effect of reducing the dimension of word-form embeddings on the quality of text classification. The results of evaluating the work of trained classifiers are compared.

    Keywords: natural language processing, vectorization, word-form embedding, text classification, data dimensionality reduction, classifier

  • Performance analysis of cloud storage systems based on queuing models

    The paper discusses the use of the M/M/n mass service model to analyze the performance of cloud storage systems. Simulations are performed to identify the impact of system parameters on average latency, blocking probability, and throughput. The results demonstrate how optimizing the number of servers and service intensity can improve system performance and minimize latency. The relevance of the study is due to the need to improve the performance of cloud solutions in the context of growing data volumes and increasing load on storage systems.

    Keywords: cloud storage, mass service theory, M/M/n model, Python, modeling, performance analysis

  • Neural networks with wavelet transform in the task of detection of overwater objects under low visibility conditions

    This paper considered the problem of detection and classification of surface objects in low visibility conditions such as rain and fog. The focus is on the application of state-of-the-art deep learning algorithms, in particular the YOLO architecture , to improve detection accuracy and speed. The introduction to the problem includes a discussion of the limitations of visibility degradation, the change in shape and size of objects depending on the viewing angle, and the lack of training data. The paper also presents the use of discrete wavelet transform to improve image quality and increase the robustness of the systems to adverse conditions. Experimental results show that the proposed algorithm achieves high accuracy and speed, which makes it suitable for application in drone video monitoring systems.

    Keywords: YOLO, wavelet transform, overwater objects, drones, low visibility condition, Fourier transforms, Haar

  • Implementation adaptation of extreme filtering to real time

    In the work describes the extreme filtering method and the author's approaches that allow adapting it to work in real time: frame-by-frame processing and the method with signal loading. Further, solutions are presented that can be used to implement the above on real devices. The first solution is to use the Multiprocessing library for the Python language. The second approach involves creating a client-server application and sending asynchronous POST requests to implement the frame-by-frame signal processing method. The third method is also associated with the development of a client-server application, but with the WebSocket protocol, not HTTP, as in the previous approach. Then, the results are presented, and conclusions are made about the suitability of the author's approaches and solutions for working on real devices. It is noted that the solution based on the use of the WebSocket protocol is of particular interest. This solution is suitable for both the frame-by-frame signal processing method and the method with value loading. It is also noted that all approaches proposed by the author are workable, which is confirmed by the time values ​​and the coincidence of the graphs.

    Keywords: extreme filtering, frame-by-frame signal processing method, method with value loading, Multiprocessing, HTTP, WebSocket, REST, JSON, Python, microcontrollers, single-board computers

  • Application of visualization software systems for solving engineering problems in the educational process

    The main maintenance of a diversification of production as activity of subjects of managing is considered. being shown in purchase of the operating enterprises, the organizations of the new enterprises, redistribution of investments in interests of the organization and development of new production on available floor spaces. The most important organizational economic targets of a diversification of management are presented by innovative activity of the industrial enterprise.

    Keywords: software systems, visualization, data, graphic systems, parts, models, diagrams, drawings