The Bulletin of the Adyghe State University,<br />
the series “Natural-Mathematical and Technical Sciences” The Bulletin of the Adyghe State University,
the series “Natural-Mathematical and Technical Sciences”
Ðóññêèé Ðóññêèé
Home page   Subjects   Chief Editor   Editors   Instructions to Authors   Rules of the reviewing   Subscription   Contacts   Publishing house
Journal archive

Founder

Publisher
Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55

Search
Key words:
Author:

#2 / 2020

Mathematics

  • Roytenberg V.Sh.
    On some bifurcations of reversible piecewise smooth planar dynamical systems

    There are quite a few works in which local bifurcations of piecewise-smooth vector fields on the plane are considered. In a number of papers, local bifurcations of smooth vector fields on the plane that are reversible with respect to involution were also studied. In this paper, we consider reversible dynamical systems defined by piecewise-smooth vector fields on the coordinate plane (x, y), for which the discontinuity line y=0 coincides with the set of fixed points of the involution of the system. We consider generic one-parameter perturbations of such vector fields. The bifur-cations of the singular point O lying on this line are described in two cases. In the first case, the point O is a rough focus of smooth vector fields that coincide with a piecewise smooth vector field in the half-planes y>0 and y<0. In the second case, O is the third-order tangent point of the trajectories of the corresponding smooth vector fields.

    pdf 11-17.pdf  (428 Kb)

  • Kozlov V.A., Palandzhyants L.Zh.
    On the structure of a subalgebra of the second order polynomial multiplicatively integrable matrix functions. VI

    The article continues to study the problem of polynomial curvilinear multiplicative integrals. The structure of a subalgebra of multiplicatively integrable matrix functions of the second order is revealed. The study is carried out by degrees of polynomial curves.

    pdf 18-24.pdf  (315 Kb)

    Technical Sciences

  • Ocheredko A.R., Gerasimenko V.S., Putyato M.M., Makaryan A.S.
    Research of SIEM systems based on the analysis of mechanisms for detecting cyber attacks

    The article presents the analysis and classification of SIEM systems based on the analysis of the correlation and forecasting mechanisms used. A review of the current state of the SIEM systems market was made and groups of criteria were introduced for evaluating identification mechanisms, taking into account the specifics of the applied correlation methods, as well as incident forecasting modules. The study of the Splunk SIEM system is carried out: methods and algorithms for correlation and forecasting. An example of creating a trend line for a set of information security incident events is given. The conclusion can be the fact that the existing algorithms currently do not allow the full use of methods and techniques for detecting cyber threats, since the development and implementation of this research direction requires additional costs and resources. It is necessary to continue to constantly expand and modernize the functions of SIEM systems to maintain a high level of security in the face of an increasing number of cyber threats.

    pdf 25-31.pdf  (534 Kb)

  • Sergeev N.E., Samoylov A.N., Gushansky S.M.
    Using some plausible reasoning schemes to identify personality traits in a network

    The statement of the problem of identifying the personality characteristics of the subject by indirect signs is described. The article proposes an approach to the identification of personality traits based on plausible reasoning. Several schemes of plausible reasoning are considered. A method for calculating the likelihood measure is proposed.

    pdf 32-39.pdf  (378 Kb)

  • Kumratova A.M., Popova E.V., Kurnosova N.S., Sivkov K.A.
    Complex process management based on the phase analysis method

    The forecast of the dynamic development of the behavior of socio-economic systems is an urgent problem that requires study in modern conditions; computer modeling tools of the process are in demand by both theoretical researchers and practical managers. The paper is devoted to the description of the authors’ tool “methods of nonlinear dynamics”, in particular, testing of the phase analysis algorithm in the study of the time series of tourist flow of the ski village Dombay, the Karachay-Cherkess Republic. The forecast approach implemented in the presented software stands out as an approach with a new implementation of trend accounting, which makes it possible to consistently allocate quasicycles, plot the movement of areas and centers of dimensional rectangles.

    pdf 40-46.pdf  (936 Kb)

  • Chastikova V.A., Malykhina M.P., Petrov V.Ya.
    Approach to the development of a malware detection software package using convolutional neural networks

    Information security problems have always been acute, but at present the cost of malicious intervention has increased many times and can have significant negative consequences. The paper considers one of the possible malware detection technologies based on convolutional neural networks, as well as a number of algorithms that prepare and transform the necessary source data. An algorithm has been developed and described for the process of converting executable files received in the software package into black and white images, which allows one to form their own data set for training a neural network based on the images obtained. The structure and functioning of a software package that implements the proposed methodology is described, which includes a subsystem for converting analyzed files, a subsystem for training and testing a neural network, and a malware recognition subsystem based on a trained neural network model. As a result of studies on a number of test data sets, a fairly high accuracy of malware detection was obtained.

    pdf 47-52.pdf  (641 Kb)

  • Dovgal V.À., Dovgal D.V.
    Detecting and preventing the man in the middle attack in the foggy layer of a swarm of drones

    When data is exchanged between IOT devices, a significant amount of data is transmitted, which leads to increased time delays for cloud services. Fog nodes located on the edge of the network near the user can reduce this delay by preventing the data processed by the user from going all the way to the data center. However, data centers, unlike foggy devices, are equipped with powerful resources (for example, processors, energy, and memory). Using traditional methods to prevent intrusions at the fog level of devices with low power and computing power (such as an unmanned aerial vehicle) will lead to a large delay and/or energy consumption, which can lead to mission failure. Therefore, there is a need for a strong security system with a low resource intensity that will protect the fog layer from attack. This paper proposes an intrusion detection system (IDS) and an intrusion prevention system (IPS) for a “man in the Middle” (MitM) attack in the foggy layer of a drone swarm.

    pdf 53-59.pdf  (356 Kb)

  • Kashin Ya.M., Knyazev A.S., Kopelevich L.E., Samorodov A.V., Kashin A.Ya.
    Procedure of thermal and ventilation calculation of synchronous generator with excitation from permanent magnets for hybrid power complexes and its implementation

    The article presents the procedure of thermal and ventilation calculation of the generator with excitation from permanent magnets of conical structure and the calculation of the generator developed by the authors for operation as part of the hybrid energy complex.

    pdf 60-73.pdf  (726 Kb)

  • Kostyuk A.I., Bespalov D.A., Romanov V.V.
    The principles of creating a system for processing and storage of GNSS data for the task of perimeter protection

    The principles of creating a system for processing and storing GNSS data for the task of perimeter protection are described. The article proposes a basic algorithm for the operation of a GNSS data collection, processing and storage system that allows you to track processed GNSS data on a remote web service in public formats, as well as to send signals through a client mobile application to available platforms and systems about temporary suspending or canceling GNSS data recording.

    pdf 74-79.pdf  (328 Kb)

  • Kumratova A.M.
    Tools for nonlinear dynamics methods: analysis, forecast and management of a complex process

    This paper describes the author's tool “methods of nonlinear dynamics”, which includes the following tabs: calculating statistical indicators with the construction of an empirical distribution function; conducting phase analysis, conducting R/S analysis; and obtaining a forecast based on a linear cellular automaton. A distinctive feature of this software product is the ability to work with both short time series and large data. The paper presents a software implementation of “methods of nonlinear dynamics”, created for decision-making in determining the forecast dynamics of complex socio-economic processes.

    pdf 80-84.pdf  (550 Kb)

  • Kashin Ya.M., Kirillov G.A., Sidorenko V.S., Shkoda V.V., Sharshak A.A.
    Inductive-acoustic cable detector

    The essence of the induction-acoustic method for determining the location of cable damage is considered. The design of the device for its implementation is developed.

    pdf 85-91.pdf  (439 Kb)

  • Pukhovsky V.N., Gushansky S.M., Potapov V.S., Borodyansky Yu.M.
    Consideration of techniques for accelerating the simulation of quantum computing and the implementation of an optimization algorithm that excludes the tensor product during modeling

    The paper discusses techniques for accelerating the simulation of quantum computing and the implementation of an optimization algorithm that excludes the tensor product during modeling.

    pdf 92-98.pdf  (371 Kb)