The Bulletin of the Adyghe State University,<br />
the series “Natural-Mathematical and Technical Sciences” The Bulletin of the Adyghe State University,
the series “Natural-Mathematical and Technical Sciences”
Đóńńęčé Đóńńęčé
Home page   Subjects   Chief Editor   Editors   Instructions to Authors   Rules of the reviewing   Subscription   Contacts   Publishing house
Journal archive

Founder

Publisher
Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55

Search
Key words:
Author:

#1 / 2024

Mathematics

  • Roytenberg V.Sh.
    On bifurcations of separatrix contours of dynamical systems with involutive symmetry

    A two-parameter family of smooth vector fields on the plane that are invariant under the involution I is considered. It is assumed that the involution has a single fixed point O and for the family of vector fields the point O is a hyperbolic saddle with nonzero saddle value, the separatrices of which, for zero parameter values, go to two saddle-nodes symmetric with respect to I, forming a polycycle homeomorphic to the figure eight. For generic families in the cases of positive and negative saddle values, bifurcation diagrams are obtained, that is, it is fulfiled a partition of a neighborhood of zero on the parameter plane into classes of topological equivalence of vector fields in a neighborhood of a polycycle.

    doi: 10.53598/2410-3225-2024-1-336-11-19

    Release date: 22.05.2024

    pdf 11-19.pdf  (842 Kb)

  • Ushkho A.D., Ushkho D.S.
    A cubic system with five centers, three of which located on one straight line, has no limit cycles

    In this paper the sufficient conditions for the lacking of limit cycles of a second order cubic differential system having five centers are obtained.

    doi: 10.53598/2410-3225-2024-1-336-20-25

    Release date: 22.05.2024

    pdf 20-25.pdf  (439 Kb)

    Technical Sciences

  • Aliev M.V., Chernyavskaya I.V., Ednich E.M., Lobanov A.G., Khizik M.I., Kuznetsov A.Yu.
    Classification algorithm of plants populations under morphological characteristics of leaves

    The algorithm for definition of distinctions between populations with use of the set of morpho-logical characteristics of leaves and detecting of laws between the distinctions found and conditions of environment in which populations grow is proposed.

    doi: 10.53598/2410-3225-2024-1-336-26-35

    Release date: 22.05.2024

    pdf 26-35.pdf  (715 Kb)

  • Putyato M.M., Makaryan A.S., Cherkasov A.N., Kucher V.A.
    Estimation of SIEM-systems functioning on the basis of set of effectiveness criteria

    Estimation of functioning of information security systems has always been a rather complex process that requires careful study. This process can provide important data and recommendations for improving information security and reducing risks. This article discusses a criteria-based system for assessment information security incident monitoring systems. Based on the indicators, a comparative analysis of domestic production SIEM systems is carried out. In addition, the effectiveness of implementing an information security system based on the generated indicators is shown. The results of this study can be used to increase the level of security of organizations' information systems and effective management of information security threats.

    doi: 10.53598/2410-3225-2024-1-336-36-42

    Release date: 22.05.2024

    pdf 36-42.pdf  (429 Kb)

  • Rybanov A.A.
    Creation of a virtual simulator for the formation of skills for working with fire alarm systems

    The article describes the approach to individualizing the training process at the fire alarm train-ing stands for students on the specialty 11.02.15 “Infocommunication networks and communica-tion systems” on the basis of the workshop “Information cable networks”. The relevance of vir-tual simulators is analyzed and the workshop's activities are described, in particular, methods of obtaining theoretical and practical skills in the process of training a certain interdisciplinary course, educational and production practice. A literary review of the use of computer simulators in various fields of education and their effectiveness is carried out. An example of the popular Cisco Packet Tracer simulator for communication specialists is considered. The material base for working with the fire alarm stand is analyzed. There are described methods that allow you to highlight the most effective functions for the interaction of students with a virtual simulator to increase the efficiency of the learning process. The operation of a virtual simulator, namely its interaction with electronic devices and a virtual camera, is considered. It is shown how as a re-sult of using a virtual simulator, one can increase the motivation of students, individualization of training and saving financial resources.

    doi: 10.53598/2410-3225-2024-1-336-43-50

    Release date: 22.05.2024

    pdf 43-50.pdf  (444 Kb)

  • Dorgushaova A.K., Dovgal V.A., Kozlova N.Sh., Kozlov R.S.
    A survey of the use of machine learning technologies in providing information security of data: present and future

    This article reviews modern machine learning technologies in the context of ensuring infor-mation security of data. The main directions of using machine learning methods, such as analysis of anomalous behavior, threat prediction, identification and authentication are considered. Specific technical solutions, analysis of their effectiveness, complexity, current trends and prospects for the development of machine learning technologies in the field of information security of data are presented. The presented results can be useful both for information security special-ists and researchers in the field of machine learning.

    doi: 10.53598/2410-3225-2023-4-336-51-59

    Release date: 22.05.2024

    pdf 51-59.pdf  (442 Kb)

  • Putyato M.M., Makaryan A.S., Cherkasov A.N., Kucher V.A.
    Development of a simulation model in the information protection in the field of using AnyLogic software

    The application of simulation models for information security problems is a complex multi-step process. The result of the simulation model operation will make it possible to determine the nec-essary data and recommendations for strengthening the information security system. This article examines the basic concepts and methods of modeling, notes the importance of threat analysis and vulnerability identification. To determine the general principles of operation, a comparative analysis of simulation modeling systems is carried out. In addition, the implementation of simulation models in the field of information security using AnyLogic software is shown and the gen-eral principles of the development of simulation models in the field of information security that can be used to analyze and evaluate the security of information systems are defined. The results of this study can be applied to increase the level of security of information systems of organizations and effective management of threats to information security.

    doi: 10.53598/2410-3225-2024-1-336-60-69

    Release date: 22.05.2024

    pdf 60-69.pdf  (740 Kb)

  • Onishchenko S.V., Mamiy A.R., Vasilenko D.A., Vasyuk S.S.
    Realization of the program part of the data collection module on the functioning of microhydropower plants

    The realization of the module of automated data collection on microhydroelectric power plant functioning is proposed, which will allow to record the parameters necessary to evaluate the effectiveness of such generating devices and transfer the obtained data to a third-party device acting as a server.

    doi: 10.53598/2410-3225-2024-1-336-70-79

    Release date: 22.05.2024

    pdf 70-79.pdf  (650 Kb)

  • Vasilyev M.A., Kanishchev M.V., Chibisov R.E.
    Development of heat integration methods and their testing at prime and secondary oil refining plants**

    In the oil refining, chemical and petrochemical industries, the main operating costs fall on fuel and energy resources necessary for heating and raw materials cooling and manufactured prod-ucts. This paper discusses approaches for optimizing operating regenerative heat exchange systems (RHES), taking account of the available technological constraints. The algorithm devel-oped by the authors is based on pinch analysis methods, while significantly complementing the algorithms for finding optimal RHES placement. Realization of the algorithm in the form of soft-ware will make it possible to search for the optimal RHES configuration depending on various optimum criteria taking into account technical and economic constraints, reducing the influence of the human factor, as well as reduce the time from the beginning of solution development to the end of the project to implement the optimal RHES.

    doi: 10.53598/2410-3225-2024-1-336-80-91

    Release date: 22.05.2024

    pdf 80-91.pdf  (2 Mb)

    Memory

  • ANTONOV V.I.
    KADYRBECH DELOKAROV: A PROMINENT SCHOLAR AND OUTSTANDING METHODOLOGIST

    . In the article dedicated to the 70th anniversary of the birth of K. Delokarov, the author provides a detailed creative portrait of the famous Russian scholar, philosopher and methodologist. At the same time, the portrait is represented not only in the focus of his academic and pedagogical activities, taking into account his scholarly works and educational works, but also, importantly, through the prism of the personal qualities and individual traits of the scientist. The article shows the search-and-research, creativity of his nature, along with scientific creativity itself, and another interesting example of a practical plan.

    doi: 10.53598/2410-3691-2024-1-334-115-122

    Release date: 31.05.2024

    pdf 115-122.pdf  (170 Kb)