The article presents an analysis of modern methods and prospects for the application of automated technologies and laser triangulation for visual inspection of weld quality in the production of large-diameter longitudinally welded pipes. A review of scientific and patent publications over the past 5 years was conducted using databases such as Google Scholar, Scopus, Web of Science, eLibrary, and Google Patents. Key aspects such as the use of laser triangulation sensors (hereafter referred to as LTS) for assessing the geometric parameters of welds and the integration of machine learning methods to enhance inspection accuracy and automation were considered. The study shows that the application of LTS in combination with machine learning methods ensures high accuracy in evaluating weld quality, which is crucial for ensuring the reliability of pipelines in various industries. Based on the conducted analysis, recommendations for developing an automated system for visual inspection of welds on production lines have been identified.
Keywords: laser triangulation, visual inspection, welds, automated technologies, machine learning, quality control, large-diameter welded pipes
The article is devoted to ancient mansions and mansions of the XVIII-XX century, which are in an abandoned state. But with the restoration, they could become new cultural spaces. We will talk about three mansions in St. Petersburg (Nobel Mansion, Ernest Igel mansion, Demidov manor) and four country estates in the Leningrad region (Faberge cottage, Mikhailovka Manor, Princess Paley Palace, Eliseev-Novinsky manor). The article describes: the history of the estates up to the present day, their current state against the background of their architectural value. Based on a brief analysis, the following features of the location of the described architectural objects can be distinguished. Within walking distance are: the Nobel Mansion, the Ernest Igel mansion, the Demidov estate. And the following objects are accessible by transport: Faberge cottage, Mikhailovka manor, Princess Paley Palace, Eliseev-Novinsky manor. And it is proposed to transform them into a new point of attraction for people – the "third place", which is an urgent issue for a modern city.
Keywords: estates, architectural monuments, cultural heritage sites, mansions, monuments of the past, restoration, third place
At the moment, quantum key distribution (QKD) technology guarantees the highest level of data exchange security, which makes QKD networks one of the most promising areas in the field of computer security. Unfortunately, the problem of topology optimization when planning and extending QKD networks has not attracted enough attention. This paper reviews approaches that use analytical models in the topology optimization problem of quantum key distribution networks. Different methods that solve problems of network capacity and security maximization and cost minimization are reviewed, the utilized algorithms are described, and conclusions about possible further research in this area are drawn.
Keywords: quantum key distribution, mathematical modeling, network topology, analytical modeling, topology optimization
The article is devoted to the development of automated information systems (AIS) for electronic document management in the educational field. Using the example of the process of accreditation monitoring of basic professional educational programs implemented in university departments, functional requirements, user algorithms and a prototype AIS (web system) for generating documents have been developed. The use of the considered AIS allows you to flexibly customize the structure of documents and data completion forms for accreditation monitoring, add and edit the required data about teachers in visual web interfaces, automatically generate documents based on information stored in the database, manage the life cycles of documents, evaluate the quality of the documents compiled. The labor intensity of working with documents is significantly simplified compared to existing business processes. The proposed approach can be applied to the development of document flow subsystems for various business processes of a university within the framework of educational, methodological, scientific and other types of activities of employees and, as a result, towards the creation of a unified AIS for electronic document management of the university, based on the integration of all subsystems. The described functionality and algorithms can be adapted to the creation of web systems for electronic document management of computer training complexes (CTC) for collecting and processing data on the progress of students, managing the life cycle of developing exercises for the CTC and performing them by trainees.
Keywords: automated information systems, electronic document management, information technologies in education, document life cycle, UML graphic notation
Detecting aggressive and abnormal driver behavior, which depends on a multitude of external and internal factors, is critically important for enhancing road safety. This article provides a comprehensive review of machine learning methods applied for driver behavior classification. An extensive analysis is conducted to assess the pros and cons of existing machine learning algorithms. Various approaches to problem formulation and solution are discussed, including supervised and unsupervised learning techniques. Furthermore, the review examines the diverse range of data sources utilized in driver behavior classification and the corresponding technical tools employed for data collection and processing. Special emphasis is placed on the analysis of Microelectromechanical Systems sensors and their significant contribution to the accuracy and effectiveness of driver behavior classification models. By synthesizing existing research, this review not only presents the current state of the field but also identifies potential directions for future research, aiming to advance the development of more robust and accurate driver behavior classification systems.
Keywords: machine learning, driver classification, driver behavior, data source, microelectromechanical system, driver monitoring, driving style, behavior analysis
This article explores methods for improving the reliability of telecommunication systems in Turkmenistan. The authors consider modern approaches to ensuring the stability and reliability of communication networks in the context of a rapidly changing technological environment. The article analyzes the main challenges faced by telecom operators in the country and proposes effective strategies to ensure the smooth operation of telecommunication systems. The results of the study allow us to identify key measures to improve the reliability of the communication infrastructure in Turkmenistan and ways to optimize user service processes.
Keywords: communication infrastructure, trends, prospects, system reliability, mobile communications, evolution, 2G, 3G, 4G, network reliability
The article provides a brief overview of foreign experience in the application of information modeling technologies (BIM) in "green" construction. The work carried out a scientometric assessment of publications on the topic of BIM in "green" construction. As a result of the review, it was found that BIM has recently been increasingly used in the field of "green" construction, forming a new stage of resource efficiency and minimizing the negative impact on the environment.
Keywords: information modeling technologies, "green" construction, sustainable development, building life cycle, resource management, energy efficiency and environmental friendliness
This paper investigates the effectiveness of the distance fields method for building 3D graphics in comparison with the traditional polygonal approach. The main attention is paid to the use of analytical representation of models, which allows to determine the shortest distance to the objects of the scene and provides high speed even on weak hardware. Comparative analysis is made on the possibility of wide model detailing, applicability of different lighting sources, reflection mapping and model transformation. Conclusions are drawn about the promising potential of the distance field method for 3D graphics, especially in real-time rendering systems. It is also emphasized that further research and development in this area is relevant. Within the framework of this work, a universal software implementation of the distance fields method was realized.
Keywords: computer graphics, rendering, 3D graphics, ray marching, polygonal graphics, 3D graphics development, modeling, 3D models
The article analyzes the current threats and vulnerabilities of web applications. Based on the analysis, approaches to protection and recommendations for ensuring the security of web applications are proposed, taking into account current challenges and problems. The article may be useful for information security specialists, software developers and heads of organizations interested in the security of web applications being developed or used.
Keywords: cyber threat, cyber attack, exploitation of web vulnerabilities, web application
The article analyzes the features of the protection of modern cloud systems and the distribution of responsibility between the interacting parties, and offers recommendations for improving the security of cloud resources. Based on the analysis, comprehensive protection measures and recommendations for improving the security of cloud resources are proposed, which can be useful to information security specialists and IT specialists to understand the features of protecting cloud systems, as well as in choosing a cloud provider and preparing for the transition to the cloud.
Keywords: cloud computing, cloud provider, shared responsibility model, cloud resource security
The article describes the methodology for developing a client-server application intended for constructing a virtual museum. The creation of the server part of the application with the functions of processing and executing requests from the client part, as well as the creation of a database and interaction with it, is discussed in detail. The client part is developed using the Angular framework and the TypeScript language; the three-dimensional implementation is based on the three.js library, which is an add-on to WebGL technology. The server part is developed on the ASP.NET Core platform in C#. The database schema is based on a Code-First approach using Entity Framework Core. Microsoft SQL Server is used as the database management system.
Keywords: client-server application, virtual tour designer, virtual museum, three.js library, framework, Angular, ASP.NET Core, Entity Framework Core, Code-First, WebGL
The purpose of the study is to focus on the need to introduce the concept of a cyber attack as an emergency situation to reduce the number of cyber threats in institutions, organizations and enterprises when using modern information technologies. The study is devoted to the analysis of cyber attacks on people’s life support facilities in the world and in Russia, in particular. Currently, the media in different countries of the modern world are talking about the avalanche growth in the number of cyber-attacks; this makes information security one of the most important issues in the activities of government agencies and production facilities. The problem of information security is studied in detail, taking into account the consequences of cyber attacks on technological systems in all spheres of human activity.
Keywords: cybersecurity, cyber emergency, monitoring, Zero Trust model, cyber insurance
This article presents a study on the approach to the development of a medical decision support system (DSS) for the selection of formulas for calculating the optical strength of intraocular lenses (IOLs) used in the surgical treatment of cataracts. The system is based on the methods of building recommendation systems, which allows you to automate the process of choosing an IOL and minimize the risk of human error. The implementation of the system in the practice of medical organizations is expected to be highly accurate and efficient, significantly reduce the time allowed for decision-making, as well as improve the results of surgical interventions.
Keywords: intraocular lens, ophthalmology, formulas for calculating optical strength, web application, machine learning, eye parameters, prognostic model, recommendation system, prediction accuracy, medical decision
Modern simulation model design involves a wide range of specialists from various fields. Additional resources are also required for the development and debugging of software code. This study is aimed at demonstrating the capabilities of large language models (LLM) applied at all stages of creating and using simulation models, starting from the formalization of dynamic systems models, and assessing the contribution of these technologies to speeding up the creation of simulation models and reducing their complexity.The model development methodology includes stages of formalization, verification, and the creation of a mathematical model based on dialogues with LLMs. Experiments were conducted using the example of creating a multi-agent community of robots using hybrid automata. The results of the experiments showed that the model created with the help of LLMs demonstrates identical outcomes compared to the model developed in a specialized simulation environment. Based on the analysis of the experimental results, it can be concluded that there is significant potential for the use of LLMs to accelerate and simplify the process of creating complex simulation models.
Keywords: Simulation modeling, large language model, neural network, GPT-4, simulation environment, mathematical model
The growing popularity of large language models in various fields of scientific and industrial activity leads to the emergence of solutions using these technologies for completely different tasks. This article suggests using the BERT, GPT, and GPT-2 language models to detect malicious code. The neural network model, previously trained on natural texts, is further trained on a preprocessed dataset containing program files with malicious and harmless code. The preprocessing of the dataset consists in the fact that program files in the form of machine instructions are translated into a textual description in a formalized language. The model trained in this way is used for the task of classifying software based on the indication of the content of malicious code in it. The article provides information about the conducted experiment on the use of the proposed model. The quality of this approach is evaluated in comparison with existing antivirus technologies. Ways to improve the characteristics of the model are also suggested.
Keywords: antivirus, neural network, language models, malicious code, machine learning, model training, fine tuning, BERT, GPT, GPT-2
The article discusses the application of neural network autoencoder in the problem of monochrome image colorization. The description of the network architecture, the applied training method and the method of preparing training and validation data is given. A dataset consisting of 540 natural landscape images with a resolution of 256 by 256 pixels was used for training. The results of comparing the quality of the outputs of the obtained model were evaluated and the average coefficients of metrics as well as the mean squared error of the VGG model outputs are presented.
Keywords: neural networks, machine learning, autoencoder, image quality analysis, colorization, CIELAB
The article is devoted to the development of an algorithm for three-dimensional terrain reconstruction based on single satellite images. The algorithm is based on the algorithmic formation of three-dimensional models based on the output data of two deep learning models to solve the problems of elevation restoration and instance segmentation, respectively. The paper also presents methods for processing large satellite images with deep learning models. The algorithm proposed in the framework of the work makes it possible to significantly reduce the requirements for input data in the problem of three-dimensional reconstruction.
Keywords: three-dimensional reconstruction, deep learning, computer vision, elevation restoration, segmentation, depth determination, contour approximation
The article discusses the capabilities of the domestic software development environment CoDeSys using the example of a control program for regulating automobile traffic of an enterprise within its own territory.
Keywords: program, controller, variable, code, functional block, automated systems
This article presents a study aimed at evaluating the use of the Matlab Simulink software environment for the development of microcontroller systems of the STM32 family. The possibilities of Simulink in the field of modeling and testing control algorithms, as well as in generating code that can be directly applied to microcontrollers, are analyzed. The article describes in detail the process of creating conceptual models and their dynamic modeling. The advantages of using Simulink include speeding up the development process through automated assembly and the ability to adjust model parameters in real time. In addition, Simulink allows you to generate processor-optimized code, which significantly increases the efficiency of microcontroller systems. However, attention is also drawn to some limitations associated with using Simulink, such as the need to create a configuration file in STM32CubeMX and potential difficulties in configuring it. The article provides an in-depth analysis of the application of Simulink in the context of the development of STM32 microcontrollers and can become a key material for those who want to deepen their knowledge in this area.
Keywords: model-oriented programming, MatLab, Simulink, STM32, microcontroller, code generation, automatic control system, DC motor
The article proposes the use of intelligent methods for predicting the reliability of contract execution as a key element of the system for ensuring information security of the critical infrastructure of financial sector organizations. Based on the analysis of historical data and the use of machine learning methods, a comprehensive model for assessing and predicting the risks of failure or poor performance of contracts by suppliers has been developed. It is shown how the use of predictive analytics can improve the efficiency of information security risk management, optimize planning and resource allocation, and make informed decisions when interacting with suppliers of critical services and equipment.
Keywords: intelligent system, predictive analytics, information security, critical infrastructure, financial sector, contract execution, machine learning
The article is devoted to the creation of a highly specialized automated information system for recording the parameters of the technological process of production of an industrial enterprise. The development of such software products will simplify and speed up the work of technologists and reduce the influence of the human factor in collecting and processing data.
Keywords: automated information system, system for recording production process parameters, Rammler-Breich diagram, role-based data access system
The paper proposes a hybrid multi-agent solution search algorithm containing procedures that simulate the behavior of a bee colony, a swarm of agents and co-evolution methods, with a reconfigurable architecture. The developed hybrid algorithm is based on a hierarchical multi-population approach, which allows, using the diversity of a set of solutions, to expand the areas of search for solutions. Formulations of metaheuristics for a bee colony and a swarm of agents of a canonical species are presented. As a measure of the similarity of two solutions, affinity is used - a measure of equivalence, relatedness (similarity, closeness) of two solutions. The principle of operation and application of the directed mutation operator is revealed. A description of the modified chromosome swarm paradigm is given, which provides the ability to search for solutions with integer parameter values, in contrast to canonical methods. The time complexity of the algorithm is O(n2)-O(n3).
Keywords: swarm of agents, bee colony, co-evolution, search space, hybridization, reconfigurable architecture
The article discusses the automation of the control of an environmentally friendly furnace reactor produced by various grades of carbon black. The complexity of au-tomation is caused by the variety of furnace reactors and the spread of process pa-rameters depending on the products. Chemical equations of processes and control features in all reactor zones are considered. The proposed reactor automatic con-trol system is implemented using fuzzy logic.
Keywords: furnace reactor, carbon black, combustion zone, mixing zone, pyrolysis zone, quenching zone, granulation, chemical equations, ammonia