+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 3(111) 20 june 2024 year
Rubric: Models and althorithms
Authors: Borisov A., Chigarev A., Chigareva Y., Konchina L.

Купить статью

Download the first page

The article considers a fundamentally new generation of soft exoskeletons based on magnetic rheological modules. A model of an exoskeleton link with adjustable rigidity is proposed, for which a system of differential equations of motion is compiled. A model of an exoskeleton for human lower extremities, composed of modules with magnetic rheological fluid, has been developed. The problems of kinematics and dynamics that arise when controlling the movement of an exoskeleton are presented. A block diagram of an algorithm for controlling the movement of an exoskeleton has been developed, solving control problems taking into account neural network methods. A qualitative study by analytical methods of the proposed mathematical model of an exoskeleton with links with adjustable stiffness is carried out. The use of regulation of the rigidity of the links of the exoskeleton modules in the necessary way will make it possible to create devices that are comfortable for the user, both from the physiological and psychological points of view. Soft exoskeletons will be in demand in many industries and medicine. The use of electromagnetic actuators, which, as a rule, have smaller dimensions and energy consumption, an almost instantaneous response speed in comparison with pneumatic drives, hydraulic drives and electric drives, is promising and technically, energetically, environmentally, economically more acceptable. Under the action of electric or magnetic fields, the stiffness of electroelastic and magneto-rheological materials can change by more than an order of magnitude. This makes it possible to create exoskeleton links with adjustable stiffness. Regulation of the rigidity of the elements of the exoskeleton modules in real time is a complex control task. Therefore, exoskeleton motion control requires the development of adaptive type algorithms based on a neuro-fuzzy approach, using information received from feedback. Neural network algorithms for self-learning in the process of functioning are a logically expedient part of a soft bionic exoskeleton. Also, as a necessary component of the exoskeleton, along with the actuator part, a sensor system is needed with sensitive sensors for the user’s neuromuscular impulses and various sensors for position, speed, acceleration, force, moment of force of the exoskeleton. A comprehensive study of scientific and technical problems of the functioning of the model of the magnetic-rheological medium, exoskeleton modules and their compilation into a single multi-link structure, its movement using the technology of modern mathematical modeling was carried out. The construction of neuro-fuzzy control systems for soft exoskeletons is described as part of the development of new mathematical methods for modeling complex technical objects using modern mechatronics and cyborgics. Continue...
№ 3(111) 20 june 2024 year
Rubric: Algorithmic efficiency
The author: Lavrenkov Y.

Купить статью

Download the first page

Neural network architecture based on polymer macrocells acting as neural elements and capable to generate electrically conductive synaptic junctions is developed. The architecture of a neural network processor where each component can record and produce a response to energy effects of different nature: electrical, optical and electrostatic has been developed. This function of the neural network eliminates the limitations related to the perception of the input information only by the input layer of the neural network processor. The impact of the influence of different input data representations on the information processing by the macrocell has been studied. The efficiency of temporal and electrical degradation of a neural network macrocell as a complex phenomenon directed on adaptation of a neural network to this process and generation of an algorithm for distribution of elements of a tutorial sample evenly over the total volume of available neural cells has been studied. The article studies a method of generation of episodic circulating memory, which significantly improves the speed of generation of a solution by the network, taking into account the gravitational interaction with macrocells. The revealed specific nature of the influence of the gravitational field on the functioning of neural network clusters was the basis for natural selection of cells by the performed properties depending on the spatial position in the neural network architecture. A method of exposure of the cell to physical equivalents of tutorial sample elements converted into different energy patterns to control the configuration of the macrocell using all available modes of information perception has been provided. Each exposure containing information on the tutorial element (optical and electrostatic) supports the generated generalising abilities of the neural macrocells composition. Practical significance of the performed research comprises the designed neural network system, which achieves an increase in performance due to self-organising oscillating neural clusters. The developed neural network model is used to reduce radio deviation and associated navigation errors due to conductive obstacles or atmospheric formations. Continue...
№ 3(111) 20 june 2024 year
Rubric: Software engineering
Authors: Tumbinskaya M. V., Khaertdinov A., Sentsova A.

Купить статью

Download the first page

The presence of vulnerabilities in software is a pressing problem. Vulnerabilities can serve as a basis for breach of confidentiality and information leakage. The purpose of this study is to increase the level of software security at all stages of the life cycle from development and implementation to operation. Achieving this goal is possible through automated analysis of program code and increasing the types of vulnerabilities detected. The work proposes a secure software delivery pipeline that allows for static and dynamic analysis of program code, analysis of the search for vulnerabilities in third-party components and Docker images. The article reviewed popular software tools, their distinctive features, and provided justification for the choice of software solutions that form the basis of the developed secure delivery pipeline. The novelty of the work is the ability of the pipeline to automatically detect vulnerabilities at all stages of the software life cycle, from planning and design to testing, deployment and monitoring in a production environment, which allows you to eliminate vulnerabilities at an early stage, thereby increasing the level of software security. Conducted testing and approbation of a secure software delivery pipeline. Based on the assessment results, the developed secure software delivery pipeline showed that on average 98% of vulnerabilities were identified using the Semgrep tool, 90% of vulnerabilities using the OWASP ZAP tool, 96% of vulnerabilities using the Dependency-Track tool, and 88% using the Trivy tool. The results of the study and experimental data showed that on average, as a result of testing, the accuracy of detecting vulnerabilities is 93%. The practical value of the work lies in the fact that the developed secure software delivery pipeline can be used as a tool for detecting program code vulnerabilities by software development specialists, as well as information security specialists of IT companies. The results obtained can be used in the field of secure software development, formalization and interpretation of vulnerabilities in program code, which will make it possible to create new rules for their identification and development of countermeasures to neutralize them. Continue...
№ 3(111) 20 june 2024 year
Rubric: Researching of processes and systems
Authors: Kalinin A., Radkov A.

Купить статью

Download the first page

Land use processes are the basic economic processes that determine the efficiency of the functioning of socio-economic systems. This is especially true for large urban agglomerations, for which these processes directly and indirectly significantly affect the volume of revenues to the budgets of various levels, as well as determine the investment attractiveness of the regions. As a result, the principles of rational land use should be based on the results of system analysis and mathematical modeling of the impact of external and internal environmental factors on all subjects involved in the processes of using land plots as the most important resource of the urban economy. The article is devoted to the development of two-level models that involve the use of regression analysis to determine the characteristics of the game matrix in the presence of a sufficiently large number of players with different interests. This approach is distinguished by the possibility of more complete consideration of factors influencing the efficiency of land use when assessing the intensity of land use in large cities and agglomerations, in conditions of external volatility. As a result, the construction of a multiple regression model describing the influence of factors, and the subsequent matrix modeling of game-theoretic conflict situations in land use makes it possible to support decision-making in the development of investment programs for the development of territories. The article discusses an example of the application of the proposed approach to the analysis of factors that have a significant impact on the efficiency of land use in the Moscow agglomeration. The results of the regression analysis led to the conclusion that the predicate of increasing financial and economic returns in the implementation of land use processes is the level of investment in fixed assets. On the example of the Moscow agglomeration, it is also shown that the obtained results of regression analysis can be used in the construction of game-theoretic models of land use, which, in turn, are expedient to apply to support decisions on state management of the market of land plots for various purposes. Continue...
№ 3(111) 20 june 2024 year
Rubric: Defense software
Authors: Dli M. I., Okunev  B., Puchkov A., Tishchenko I.

Купить статью

Download the first page

The results of a study are presented, the purpose of which was to develop a steganography algorithm for hiding text messages in video files. The algorithm is based on the use of a diffusion-probability model with noise reduction, which is implemented by a deep artificial neural network. The algorithm consists of two parts – for the parties sending and receiving the message. On the transmitting side, the following is carried out: synthesis of handwritten images of symbols (signatures) of the line of the hidden message, alignment of their frequency; applying direct diffusion to signatures, resulting in the generation of a noisy image that is deposited into a video stego container. At the receiving end, signatures are extracted from the video content, back diffusion is performed to obtain signatures of handwritten string characters, which are recognized using a convolutional neural network. The novelty of the research lies in the original developed algorithm for steganographic information protection in video files, as well as in a modified method of signature deposition based on the method of replacing the least significant bits. The method consists of bitwise embedding of bytes characterizing the pixel brightness level in the signature into the same blue brightness digits in a sequence of 8 frames of a video stego container. This method made it possible to significantly reduce the visible changes made to the video content when replacing not the least significant bits, but the middle significant bits in the stego container. This, in turn, provides greater resistance to compression attacks when transmitting information over the stegochannel. The practical significance of the research results lies in the developed software, with the help of which the algorithm for steganographic information protection in video files was tested, which showed high values of the peak signal-to-noise ratio and the index of structural similarity of images when embedding information in the middle bits of the bytes that set the brightness of the pixels of the stego container. Continue...
№ 4(112) 31 july 2024 year
Rubric: Performance management
The author: Fomin I.

Купить статью

Download the first page

The article describes the technical concept of organizing data exchange between a specialized settlement center that carries out billing of consumed heat energy, and an energy sales company that supplies heat energy to industrial enterprises, government agencies and the population. The article describes the features of the technical problem of data exchange, which determine the parameters of mathematical models for calculating the volumes and costs of consumed energy resources, and then reviews approaches to solving this class of problems. To solve the technical problem, the features of the data preparation stage for the initial data exchange were formalized and schemes for organizing a regular data flow based on an ontological data model were proposed. The originality of the proposed approach was expressed in the definition of classes and their properties for concepts reflecting sets of information about the parameters of energy supply facilities, parameters for calculating volumes, prices and costs of energy resources, which made it possible, using an ontology editor, to form graphically formalized semantics, which became the basis for the formation of rules data processing for information exchange. The concepts of the ontological model were related to each other by sets of classified predicates, the use of which was illustrated by examples of descriptive logic queries. The implemented data exchange process based on the ontological model is illustrated with a data flow diagram. The ontological approach to solving the described problem made it possible to organize an end-to-end connection between the formalized reflection of the calculation models required for billing and the exchange data model, which made it possible to balance and comply with management and information technology requirements for this procedure. Continue...