Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55


#2 / 2020
Mathematics
Roytenberg V.Sh.
On some bifurcations of reversible piecewise smooth planar dynamical systems
There are quite a few works in which local bifurcations of piecewisesmooth vector fields on the plane are considered. In a number of papers, local bifurcations of smooth vector fields on the plane that are reversible with respect to involution were also studied. In this paper, we consider reversible dynamical systems defined by piecewisesmooth vector fields on the coordinate plane (x, y), for which the discontinuity line y=0 coincides with the set of fixed points of the involution of the system. We consider generic oneparameter perturbations of such vector fields. The bifurcations of the singular point O lying on this line are described in two cases. In the first case, the point O is a rough focus of smooth vector fields that coincide with a piecewise smooth vector field in the halfplanes y>0 and y<0. In the second case, O is the thirdorder tangent point of the trajectories of the corresponding smooth vector fields.
Kozlov V.A., Palandzhyants L.Zh.
On the structure of a subalgebra of the second order polynomial multiplicatively integrable matrix functions. VI
The article continues to study the problem of polynomial curvilinear multiplicative integrals. The structure of a subalgebra of multiplicatively integrable matrix functions of the second order is revealed. The study is carried out by degrees of polynomial curves.
Technical Sciences
Ocheredko A.R., Gerasimenko V.S., Putyato M.M., Makaryan A.S.
Research of SIEM systems based on the analysis of mechanisms for detecting cyber attacks
The article presents the analysis and classification of SIEM systems based on the analysis of the correlation and forecasting mechanisms used. A review of the current state of the SIEM systems market was made and groups of criteria were introduced for evaluating identification mechanisms, taking into account the specifics of the applied correlation methods, as well as incident forecasting modules. The study of the Splunk SIEM system is carried out: methods and algorithms for correlation and forecasting. An example of creating a trend line for a set of information security incident events is given. The conclusion can be the fact that the existing algorithms currently do not allow the full use of methods and techniques for detecting cyber threats, since the development and implementation of this research direction requires additional costs and resources. It is necessary to continue to constantly expand and modernize the functions of SIEM systems to maintain a high level of security in the face of an increasing number of cyber threats.
Sergeev N.E., Samoylov A.N., Gushansky S.M.
Using some plausible reasoning schemes to identify personality traits in a network
The statement of the problem of identifying the personality characteristics of the subject by indirect signs is described. The article proposes an approach to the identification of personality traits based on plausible reasoning. Several schemes of plausible reasoning are considered. A method for calculating the likelihood measure is proposed.
Kumratova A.M., Popova E.V., Kurnosova N.S., Sivkov K.A.
Complex process management based on the phase analysis method
The forecast of the dynamic development of the behavior of socioeconomic systems is an urgent problem that requires study in modern conditions; computer modeling tools of the process are in demand by both theoretical researchers and practical managers. The paper is devoted to the description of the authors’ tool “methods of nonlinear dynamics”, in particular, testing of the phase analysis algorithm in the study of the time series of tourist flow of the ski village Dombay, the KarachayCherkess Republic. The forecast approach implemented in the presented software stands out as an approach with a new implementation of trend accounting, which makes it possible to consistently allocate quasicycles, plot the movement of areas and centers of dimensional rectangles.
Chastikova V.A., Malykhina M.P., Petrov V.Ya.
Approach to the development of a malware detection software package using convolutional neural networks
Information security problems have always been acute, but at present the cost of malicious intervention has increased many times and can have significant negative consequences. The paper considers one of the possible malware detection technologies based on convolutional neural networks, as well as a number of algorithms that prepare and transform the necessary source data. An algorithm has been developed and described for the process of converting executable files received in the software package into black and white images, which allows one to form their own data set for training a neural network based on the images obtained. The structure and functioning of a software package that implements the proposed methodology is described, which includes a subsystem for converting analyzed files, a subsystem for training and testing a neural network, and a malware recognition subsystem based on a trained neural network model. As a result of studies on a number of test data sets, a fairly high accuracy of malware detection was obtained.
Dovgal V.À., Dovgal D.V.
Detecting and preventing the man in the middle attack in the foggy layer of a swarm of drones
When data is exchanged between IOT devices, a significant amount of data is transmitted, which leads to increased time delays for cloud services. Fog nodes located on the edge of the network near the user can reduce this delay by preventing the data processed by the user from going all the way to the data center. However, data centers, unlike foggy devices, are equipped with powerful resources (for example, processors, energy, and memory). Using traditional methods to prevent intrusions at the fog level of devices with low power and computing power (such as an unmanned aerial vehicle) will lead to a large delay and/or energy consumption, which can lead to mission failure. Therefore, there is a need for a strong security system with a low resource intensity that will protect the fog layer from attack. This paper proposes an intrusion detection system (IDS) and an intrusion prevention system (IPS) for a “man in the Middle” (MitM) attack in the foggy layer of a drone swarm.
Kashin Ya.M., Knyazev A.S., Kopelevich L.E., Samorodov A.V., Kashin A.Ya.
Procedure of thermal and ventilation calculation of synchronous generator with excitation from permanent magnets for hybrid power complexes and its implementation
The article presents the procedure of thermal and ventilation calculation of the generator with excitation from permanent magnets of conical structure and the calculation of the generator developed by the authors for operation as part of the hybrid energy complex.
Kostyuk A.I., Bespalov D.A., Romanov V.V.
The principles of creating a system for processing and storage of GNSS data for the task of perimeter protection
The principles of creating a system for processing and storing GNSS data for the task of perimeter protection are described. The article proposes a basic algorithm for the operation of a GNSS data collection, processing and storage system that allows you to track processed GNSS data on a remote web service in public formats, as well as to send signals through a client mobile application to available platforms and systems about temporary suspending or canceling GNSS data recording.
Kumratova A.M.
Tools for nonlinear dynamics methods: analysis, forecast and management of a complex process
This paper describes the author's tool “methods of nonlinear dynamics”, which includes the following tabs: calculating statistical indicators with the construction of an empirical distribution function; conducting phase analysis, conducting R/S analysis; and obtaining a forecast based on a linear cellular automaton. A distinctive feature of this software product is the ability to work with both short time series and large data. The paper presents a software implementation of “methods of nonlinear dynamics”, created for decisionmaking in determining the forecast dynamics of complex socioeconomic processes.
Kashin Ya.M., Kirillov G.A., Sidorenko V.S., Shkoda V.V., Sharshak A.A.
Inductiveacoustic cable detector
The essence of the inductionacoustic method for determining the location of cable damage is considered. The design of the device for its implementation is developed.
Pukhovsky V.N., Gushansky S.M., Potapov V.S., Borodyansky Yu.M.
Consideration of techniques for accelerating the simulation of quantum computing and the implementation of an optimization algorithm that excludes the tensor product during modeling
The paper discusses techniques for accelerating the simulation of quantum computing and the implementation of an optimization algorithm that excludes the tensor product during modeling.
