The Bulletin of the Adyghe State University,<br />
the series “Natural-Mathematical and Technical Sciences” The Bulletin of the Adyghe State University,
the series “Natural-Mathematical and Technical Sciences”
Đóññêèé Đóññêèé
Home page   Subjects   Chief Editor   Editors   Instructions to Authors   Rules of the reviewing   Subscription   Contacts   Publishing house
Journal archive

Founder

Publisher
Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55

Search
Key words:
Author:

#2 / 2024

Biological Sciences

  • Tsikunib A.D., Kolesnikova A.V.
    Differentiated approach to determining the diastase number of honey depending on the analytical tasks of the study

    A differentiated approach to determining the diastase number of honey depending on the set of analytical tasks is considered. Based on the analysis of various data, the role of diastase (amylase) in the composition of honey as an indicator of quality and naturalness is shown. The influence of climatic and geographical conditions and breed characteristics of bees on the activity of amylase, expressed in the diastase number, which was determined by colorimetric and amyloclastic methods, is substantiated. The authors propose to use the amyloclastic method in the short tape version for rapid assessment of the naturalness and safety of honey, in the medium tape version for assessing the monoflora of honey and long tape to identify characteristic values of amylase activity during scientific research.

    doi: 10.53598/2410-3225-2024-2-341-21-26

    Release date: 28.06.2024

    pdf 21-26.pdf  (283 Kb)

    Mathematics

  • Ushkho A.D.
    Straight-line isoclines of planar polynomial vector fields

    A brief review of scientific articles on the theory of direct isoclines of polynomial vector fields of degree n in the plane is presented. Examples of application of this theory for solving some prob-lems of qualitative theory with respect to quadratic and cubic systems are given.

    doi: 10.53598/2410-3225-2024-2-341-11-20

    Release date: 28.06.2024

    pdf 11-20.pdf  (347 Kb)

    Technical Sciences

  • Aliev M.V., Berbentsev D.A., Nemykin V.O., Alieva S.M.
    Algorithms for recognizing objects in a video stream and determining the properties of their relative position

    An algorithm for detecting and identifying objects with possibility of determining characteristics of their mutual arrangement is presented. The algorithm is based on the use of the YOLO neural network model. Its practical application in copper-zinc is demonstrated and an efficiency assessment is given.

    doi: 10.53598/2410-3225-2024-2-341-27-34

    Release date: 19.01.2038

    pdf 27-34.pdf  (484 Kb)

  • Kumratova A.M., Zaletaev V.A., Starchikov I.S.
    Performance and reliability of encryption algorithms in processing and protecting Big Data

    This article examines the application of various encryption algorithms in the context of processing and securing large volumes of data. With the increasing volume of information and the advancement of information technologies, ensuring data security becomes increasingly relevant. A comparative analysis of eight different encryption algorithms, including AES, Blowfish, Camellia, ChaCha20, DES, GOST, RC4, SEED and using the Java programming language, is car-ried out. The article presents the results of the analysis, including comparative performance and reliability characteristics of each encryption algorithm. The advantages and disadvantages of each algorithm are discussed, along with conclusions about the most suitable algorithms for processing large volumes of data in terms of performance and reliability are drawn.

    doi: 10.53598/2410-3225-2024-2-341-35-42

    Release date: 28.06.2024

    pdf 35-42.pdf  (556 Kb)

  • Teploukhov S.V., Tatarintsev V.A., Belousov A.S.
    Design of a portable insect trap (for field research)

    In the process of searching and catching insect samples for further study and classification, var-ious types of passive and active traps are used, but many such devices require direct human participation, and many traps destroy insects, which does not allow their use for further study. One of the effective tools for catching samples is a trap based on the effect of positive phototaxis – the property of insects to orient and move towards a light source, but to ensure its autonomy it is advisable to use renewable energy sources. In this regard, the paper considers the process of designing a mobile autonomous insect trap, the use of which will allow effective collection of samples without damaging them. The trap is controlled by ESP32 microcontroller, which controls the time of operation of the device, in addition, the modular design of the trap allows its modification depending on the species of insects, for example, enable for replacement the LED-trap with the required wavelength. The use of a photovoltaic panel allows for a significant increase the autonomy of the device. Thus, the designed camera trap for catching insects has a modular structure, a sufficient degree of autonomy and can be adapted for catching insects of different species.

    doi: 10.53598/2410-3225-2024-2-341-43-50

    Release date: 29.06.2004

    pdf 43-50.pdf  (449 Kb)

  • Markelov V.K., Privalov A.N.
    Pretexting method as a threat to information security in social networks

    The article examines the phenomenon of the popularity of social networks, which attracts the attention of cybercriminals who consider social networks an attractive environment for using social engineering methods in order to lure money and personal data from users of social net-works. Based on the quantitative and qualitative analysis of publications in the databases of scientific publications eLibrary and Google Scholar, current areas of research on problems of in-formation security in social networks, one of which is the problem of protecting users from social engineering attacks in social networks, including phishing and pretexting, are identified. An analysis of publications in the databases of scientific publications eLibrary, Scopus, Google Scholar over the past 10 years on the problems of countering social engineering methods in social networks demonstrates the growing interest of scientists in this area of research. At the same time, in recent years there has been an increase in the number of studies devoted to the study of pretexting as a method of social engineering, but the number of studies devoted to the problem of pretexting in social networks remains insufficient. In conclusion, the article proposes countermeasures for social engineering in social networks using pretexting.

    doi: 10.53598/2410-3225-2024-2-341-51-61

    Release date: 28.06.2024

    pdf 51-61.pdf  (672 Kb)

  • Korzhakov V.E., Sedoy K.V.
    Features of realization of the subsystem of monitoring and control of access of individual persons to the territory of the university

    The work presents a subsystem for monitoring and controlling the access of individual persons to the university territory, implemented on the automated workplace of the operator of the access control and management system, connected to the corporate information system of the uni-versity on the platform “1C:Enterprise”, version 8.3.21. The developed subsystem allows to automate the process of updating the lists of admitted individuals in the access control and man-agement system, as well as to add additional tools to optimize the management process.

    doi: 10.53598/2410-3225-2024-2-341-62-72

    Release date: 28.06.2024

    pdf 62-72.pdf  (961 Kb)

  • Merkulova A.V., Napso I.M.
    System for indicating the user's proximity to a pre-selected geographical object when traveling along a route

    A service that determines the indication of the user's approach to a pre-selected location is developed. Using the Telegram Bot API to determine the current coordinates of the user in real time, the system notifies about approaching a geographical object. Using geocoding technologies and Overpass API, it is possible to find the end point of the route. The results obtained in the work with the OpenStreetMap API and other geolocation technologies can be applied in once-personal areas, including transport, logistics, tourism and many others, where navigation plays an important role.

    doi: 10.53598/2410-3225-2024-2-341-73-77

    Release date: 28.06.2024

    pdf 73-77.pdf  (446 Kb)

  • Dovgal V.A.
    Using an operational task scheduling method for a drone swarm with language model support

    The rapid development of unmanned aerial vehicle (UAV) technologies has led to the idea of combining drones into a single system, which nevertheless is not free from problems with task planning. The drone flock still faces challenges such as the complexity of remote control and the convenience of human-machine interaction. On the other hand, large language models are currently actively developing as a way for computing devices to communicate in a natural language of communication. In this study, it is proposed to combine the control of several unmanned aerial vehicles with the semantic understanding of the context of phrases by large language models. The method proposed in this article for operational task planning for a swarm of drones, based on the operational information received by sensors, will enable drones to accurately understand user tasks in natural language, allowing them to simplify, improve the efficiency and safety of controlling several drones, thereby increasing the flight characteristics and range of application of a flock of drones.

    doi: 10.53598/2410-3225-2024-2-341-78-85

    Release date: 28.06.2024

    pdf 78-85.pdf  (330 Kb)