+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 1(121) 27 february 2026 year
Rubric: Algorithmic efficiency
Authors: Kychkin A., Chernitsin I.

Купить статью

Download the first page

The results of the development of a software microservice embedded in atmospheric air quality monitoring systems to support the identification of industrial pollution sources are presented. The emission and subsequent spread of harmful substances in the lower layers of the atmosphere is dynamic and characterized by high uncertainty due to the specific features of technological installations, their operating modes, the influence of terrain relief, buildings and meteorological factors. The relationship between the location of the emission source and the information from sensors installed in central areas of the city or on the boundaries of sanitary protection zones of large industrial facilities cannot be described analytically, Therefore, formalizing the knowledge of environmentalists and subsequently automating the detection of objects responsible for the formation of hazardous concentration levels at control points is a pressing task. The aim of the study is to develop an algorithm for the continuous optimization of search strategies using Approximate Dynamic Programming technology. This article proposes implementing the ADP mechanism based on Q-Learning, which in turn is performed in simulation mode through interaction with the Lagrange model describing the physical processes of pollution dispersion. The developed model learns to select the best search steps (actions) on a marked map of the terrain, considering the cost function approximated by a neural network, meteorological factors and terrain relief, which is a new technological solution. The design of basic information processes was carried out, including the consideration of processes for collecting and pre-processing data on the measurement of harmful substance concentrations and meteorological data at control points, the preparation of a table for Q-Learning and its use for training a neural network model, and the application of the model to solve the problem of determining the source of an emergency release. The results of experimental testing showed that the microservice developed and integrated into the digital ecomonitoring platform accurately captures the characteristics of industrial pollution dispersion processes in the atmosphere and can be used for automated identification of emission sources in dynamics. The average values of the contribution of the emergency release source to the formation of pollution in a given territory differ from the values calculated using the UPRZA example by no more than 15%, which allows us to conclude that the results are highly reliable and can be compared with GOST methods that operate in static conditions. Continue...
№ 1(121) 27 february 2026 year
Rubric: Algorithmic efficiency
The author: Mikheev A.

Купить статью

Download the first page

A multifactor probabilistic model of product sales on an electronic trading platform (marketplace) is proposed, allowing to calculate the dependence of such key performance indicators as sales volume and sellers’ revenue on the time characteristics of product reliability: actual lifespan, guaranteed (established by the manufacturer) lifespan and expected (desired by the consumer) lifespan of the product. It was assumed that there is an unlimited amount of goods on the marketplace and, in addition, each consumer purchases only one unit of the product, choosing a seller within the window of their purchasing power at the minimum price. It is shown that the sales volume and revenue from the sale of goods are random variables, the expected values of which, as well as their distribution laws, can be represented as functionals of the probability distributions of the above-mentioned characteristics of product reliability. Within the framework of the proposed probabilistic model of product sales, formulas for these functionals are derived. In a particular case, when the lifespan of the product does not depend on the price, and the price itself is described by one- or two-parameter exponential distribution laws, mathematical expressions are obtained for the distribution laws and raw moments of the amount of goods sold and sellers’ revenue. The dependence of expected values of sales volume and revenue on the average actual, average guaranteed and average expected lifespan of the product is analysed. As an example of taking into account the effect of the price dependence of the product lifespan on sales volume, revenue and profit, the sale of smartphones on the Yandex Market marketplace is considered. Based on empirical data, the dependence of the guaranteed lifespan to the actual lifespan ratio on the price is established. With its help, numerical modelling is carried out, revealing the effect of the parameters included in the lifespan distribution laws on the average sales volume of smartphones and the average profit from their sale. Continue...
№ 1(121) 27 february 2026 year
Rubric: Study of processes and systems
The author: Geraskin M.

Купить статью

Download the first page

The article examines a game-theoretic model describing the interaction between two firms selling identical products, a classic duopoly model. The model expresses competition between the firms, as the players’ objective functions express their utility (profit) and are mutually inconsistent, i. e., a noncooperative, zero-sum game is considered. The players’ objective functions are formed based on the linear inverse demand function for the product and the linear cost functions of the participating firms. The solution to the game is a Nash equilibrium, determined using a system of first-order necessary optimality conditions. Unlike the classical approach, the model incorporates two new aspects. First, players are considered reflexive, meaning each player hypothesizes the counterparty’s likely response, which is formally expressed as a conjectural variation – the expected change in one player’s output in response to a single increase in the output of the other. Second, an aggregative game in a duopoly model, in which the players’ objective functions are interdependent, is analyzed from the perspective of controlling the behavior of one player by manipulating their mental representations of the other player’s intentions. The analysis of the game is based on a reflexive model of player behavior, in which players sequentially predict each other’s representations, resulting in the identification of a mental model of one player that is optimal from the perspective of the other player. An iterative procedure is proposed for inducing this mental model in the controlled player by creating phantom instances of the controlling player. Numerical experiments illustrate various aspects of the mental control process, whereby the technical characteristics of the player firms, such as their production volumes, interact with the mental behavioral parameters of decision makers, forming a cyber-physical system. Continue...
№ 1(121) 27 february 2026 year
Rubric: Researching of processes and systems
Authors: Zhuk A., Makarov I., Pashintsev V.

Купить статью

Download the first page

An effective way to ensure the required level of structural secrecy of code sequences used in wireless data transmission systems with multiple access and code division multiplexing is to employ a representative set of code sequence structures that can be changed according to a specific rule. A variant of increasing the structural secrecy of code sequences used in the telecommunication systems under consideration is to employ the necessary arsenal of non-repeating ensembles of multiphase orthogonal code sequences modeled by the eigenvectors of a Hermitian matrix. In known works, the functional relationship between the diagonal coefficients of a tridiagonal Hermitian matrix and the systems of its eigenvectors modeling ensembles of multiphase orthogonal code sequences has not previously been established. This precluded the demonstration of a strict deterministic relationship between the pseudo-random assignment of the phases of the diagonal coefficients of a Hermitian matrix and the properties of its eigenvectors, which determines the relevance of this study. This article proves the existence of a functional relationship between the coefficients of a Hermitian matrix and the system of its eigenvectors. It is shown that the pseudorandom uniform distribution law of the phase values of the coefficients of the second diagonal of Hermitian matrices, with constant values of their moduli, is preserved for the arguments (phases) of the coordinates of the eigenvector systems of the matrices under consideration, based on estimates by the Wald – Wolfowitz criteria, chi-square, and Welch t-criterion. Based on the analysis of the conducted experiment, it was established that the spectrum of the Hermitian matrix does not change with a pseudorandom change in the phases of its diagonal coefficients using the Mersenne Twister pseudorandom number generator with fixed values of the moduli of its diagonal coefficients. Analytical and experimental proof of the relationship between the arguments of the diagonal coefficients of a tridiagonal Hermitian matrix and the arguments of the coordinates of its eigenvector systems, considered as models of ensembles of multiphase orthogonal code sequences, shows that the statistical properties of the latter are determined by the statistical properties of the pseudorandom number generator that specifies the initial data for the stochastic transformation. A conclusion is made about the independence of the spectrum of the Hermitian matrix from the pseudo-random assignment of phase values to its diagonal coefficients with constant values of their moduli. Continue...
№ 1(121) 27 february 2026 year
Rubric: Data protection
The author: Kuznetsov S.

Купить статью

Download the first page

This paper presents a novel hybrid zero-knowledge proof protocol resistant to quantum computer attacks. The protocol combines classical cryptography based on the Learning with Errors problem complexity with quantum state properties. The main objective of the protocol is to enable a prover to convince a verifier of knowledge of a secret parameter alpha without revealing its value, even against adversaries with quantum computational capabilities. A key feature of the protocol is the explicit dependence of quantum operations on the secret parameter through a cryptographic hash function modeled as a quantum random oracle. This ensures an inseparable connection between the quantum and classical phases of protocol execution. The protocol includes a mechanism for regular secret updates between interaction rounds, providing protection against adaptive attacks. Special attention is given to accounting for real physical errors of quantum devices – a difference threshold is introduced that allows for a certain level of noise and decoherence. The paper presents a formal security analysis of the protocol. The properties of honest-verifier zero-knowledge and proof of knowledge against quantum polynomial-time adversaries are proven. Security is justified through constructing a sequence of hybrid games showing that the probability of a successful attack is negligible relative to the security parameter plus the probability of physical implementation error. The protocol is of practical interest for building cryptographic systems in the context of quantum computing development. Continue...