The Bulletin of the Adyghe State University,<br />
the series “Natural-Mathematical and Technical Sciences” The Bulletin of the Adyghe State University,
the series “Natural-Mathematical and Technical Sciences”
Đóññêèé Đóññêèé
Home page   Subjects   Chief Editor   Editors   Instructions to Authors   Rules of the reviewing   Subscription   Contacts   Publishing house
Journal archive

Founder

Publisher
Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55

Search
Key words:
Author:

#1 / 2021

Biological Sciences

  • Chernyavskaya I.V., Domracheva N.A., Tolstikova T.N.
    Influence of the urban environment on the concentration of photosynthetic pigments and the intensity of photosynthesis of plants of the genus Acer L.

    The article presents the results of physiological studies of representatives of the genus Acer L. the most widely represented in the landscaping of Maikop. The influence of the urban environment on the concentration of photosynthetic pigments (chlorophyll a, b and carotenoids) and the intensity of photosynthesis of Acer pseudoplatanus and Acer saccharinum plants in comparison with the local species of Acer campestre was determined. The adaptive abilities of the introduced species were revealed.

    pdf 26-32.pdf  (313 Kb)

    Mathematics

  • Shumafov M.M.
    Second-order stochastic differential equations: stability, dissipativity, periodicity. III. – A survey

    This paper is a continuation of the previous paper and presents the third part of the author’s work. The paper reviews results concerning qualitative properties of second-order stochastic differential equations and systems. In the first part we gave a short overview on stability of solutions of the second-order stochastic differential equations and systems by Lyapunov functions techniques and introduced some mathematical preliminaries from probability theory and stochastic processes. In the second part the construction of Ito’s and Stratonovich’s stochastic integrals are given. Here, in the third part, analog of the chain rule for stochastic differentials (Ito’s formula), is presented. The stochastic differential equations in the sense of Ito and in the sense of Stratonovich are introduced and the relation between these two forms of equations is established. The existence and uniqueness theorem for solutions of stochastic differential equations is formulated.

    pdf 11-21.pdf  (376 Kb)

  • Roytenberg V.Sh.
    On the number of periodic solutions for some differential equations in which the right-hand sides are polynomials with periodic coefficients

    In this paper, we consider first-order differential equations whose right-hand sides are polynomials with respect to the desired function with periodic continuous coefficients. In the case when some of the coefficients vanish, and the remaining coefficients satisfy additional conditions, the possible number of periodic solutions is established, taking into account their multiplicity.

    pdf 22-25.pdf  (298 Kb)

    Technical Sciences

  • Teploukhov S.V., Chernenko A.A., Onishchenko S.V., Avdzhiyan A.A.
    Hardware implementation of an intelligent multipoint temperature sensor on the Arduino platform

    This paper discusses the possibility of creating a multipoint intelligent temperature sensor based on the Arduino platform. To achieve the highest temperature measurement accuracy, it is proposed to implement a multipoint meter that allows measurements at several points in the environment, basing on which the average temperature value in the object is calculated. The main requirements for the designed intelligent sensor are its low cost and sufficient accuracy of measurements. The paper presents an algorithm for functioning of the designed sensor and a schematic diagram of the designed device based on the Arduino platform is developed.

    pdf 33-39.pdf  (358 Kb)

  • Cherkasov A.N., Turkin E.A., Chemulova A.V.
    Development of a verbal cyber deviant model in the study of online communities based on multinomial logistic regression

    A theoretical analysis of the relevance and existing works on the study of the human factor in the field of information security has been carried out. On its basis a model of multinomial logistic regression has been developed, which performs tasks of classification of users into intruders of different rank based on text analysis of the Internet forum. Taking into account the peculiarities of the obtained data, the algorithm of automatic extraction of keywords from messages using the decision tree algorithm has been developed. During the training process, the accuracy of this algorithm reached the highest value in comparison with other algorithms (SVM, k-NN) – 78.74%. The modelling carried out allowed creating a questionnaire for carrying out a psycho-linguistic experiment to determine the level of tendency of a person to commit cybercrime. A key aspect of the significance of the work carried out was to test the adoption of a research approach that was unconventional for modern science, which consisted in the integration of sociology, psycholinguistics and statistical modeling.

    pdf 40-47.pdf  (389 Kb)

  • Kashin Ya.M., Knyazev A.S., Kopelevich L.E., Samorodov A.V., Gorbunov I.A.
    Method for determining the overall dimensions of equivalent electric machines with permanent magnets

    The article presents a method for determining the overall dimensions of equivalent electric machines with constant excitation from permanent magnets. Dependencies of the overall dimensions of magnetic cores and their ratios on the angle of inclination of the air gap to the axis of rotor rotation are constructed.

    pdf 48-56.pdf  (391 Kb)

  • Chastikova V.A., Abbasova S.S.
    Aspects of using convolutional neural networks for detecting hidden information in images

    This study presents an approach to solving the problems of steganalysis using the mechanisms of artificial neural networks. The paper describes the concept of steganographic image analysis technique, which consists in the synthesis of signature and statistical algorithms, as well as convolutional neural networks. The role of the signature method is related to checking empty containers in their filling. If the response is positive, the image is scanned using the chi-square method. The use of artificial neural networks makes it possible to increase the reliability of detecting hidden messages in digital files and sensitivity to staggering. The article describes the mechanisms of the proposed methodology and the rationale for the choice of the architecture of the convolutional neural network. A trained neural network can capture complex dependencies used with image analysis for hidden information, and more accurately detect steg-nesting using convolutional layers. The advantages of the proposed approach include a reduction in time costs and a simplified search for hidden information.

    pdf 57-61.pdf  (348 Kb)

  • Cherkasov A.N., Turkin E.A.
    Choosing the appropriate artificial neural network architecture for text classification

    In the context of the growing need to study the role of the human factor in information security, we made an attempt to apply artificial neural networks to solve socially significant problems related to information risks. The main purpose of the study is to choose the optimal neural network architecture, which is able to most effectively determine the tone of messages in Internet forums. This article provides an overview of a number of artificial neural network architectures that are used to determine the emotional tone of texts. The models discussed in this paper were analyzed for the quality of the text tone definition. Application of a model of a convolutional neural network combined with elements of a recurrent neural network made it possible to obtain accuracy of determination of text shadow equal to 87.77%. In the future, the selected model will become the basis for an integrated analytical platform in the form of software, which is aimed at identifying the features of lexical forms that form the basis of the verbal model of a potential cybercriminal within the framework of information security.

    pdf 62-66.pdf  (356 Kb)

  • Chastikova V.A., Zangiev T.T., Voroshilova E.I., Korotetskaya K.V.
    Analysis of the use of machine learning methods to solve the problems of detecting malicious Android applications

    The relevance of this work is explained by the increased use of mobile phones not only in everyday life, but also in professional activities, which leads to the emergence of new threats to information security. The article presents the results of a comparative analysis of publications from 2016 to 2020, obtained on the basis of research, the main purpose of which was to build a tool for detecting malicious software based on the Android operating system and using static, dynamic and hybrid methods of analysis. As a result, the maximum accuracy achieved by the tool based on static analysis was obtained by the DroidSieve classifier and was 99.82%. Methods of dynamic analysis were most effective with the use of the DL-Droid classifier, the accuracy was 98.5%. The DBN-CRU model, based on hybrid analysis, made it possible to achieve 97.79% detection accu-racy.

    pdf 67-74.pdf  (312 Kb)

  • Dovgal V.À., Dovgal D.V.
    Analysis of the problems of ensuring information security of wireless sensor networks and methods of ensuring the security of the Internet of Things

    To transfer data between IoT devices, wireless sensor networks are created, in which an acceptable level of information security is required. The article analyzes the problems in the field of security of the Internet of Things, whose devices use wireless sensor networks, as well as methods for preventing, detecting and mitigating attacks on wireless sensor networks and the Internet of Things.

    pdf 75-83.pdf  (317 Kb)

  • Kumratova A.M., Vasilenko I.I., Kurnosova N.S., Grigoryev D.Yu., Dyudyuk M.V.
    Automation of complex research on complex processes based on phase analysis

    The article is devoted to the adaptation of mathematical methods of nonlinear dynamics and the description of a tool for obtaining pre-forecast information about complex economic processes, in particular, testing the algorithm of phase analysis in the study of the time series of tourist flow to the ski village of Dombay in the Karachay-Cherkess Republic. Phase analysis is a method for studying local oscillations of a time series that are asymmetric, irregular, and have an unstable period. A distinctive feature of this development is that the system as an output file additionally presents a summary table of the results of phase analysis for the triad: the initial time series, a series of increments and aggregated data, while the resulting synergistic effect from the study of complex socio-economic processes in the context of the results obtained is important.

    pdf 84-90.pdf  (549 Kb)