Address: 385000, Maikop, Adyghea Republic, Pervomayskaya Street, House 208. Ph.: 8(8772) 52 48 55
|
|
#2 / 2024
Biological Sciences
Tsikunib A.D., Kolesnikova A.V.
Differentiated approach to determining the diastase number of honey depending on the analytical tasks of the study
A differentiated approach to determining the diastase number of honey depending on the set of analytical tasks is considered. Based on the analysis of various data, the role of diastase (amylase) in the composition of honey as an indicator of quality and naturalness is shown. The influence of climatic and geographical conditions and breed characteristics of bees on the activity of amylase, expressed in the diastase number, which was determined by colorimetric and amyloclastic methods, is substantiated. The authors propose to use the amyloclastic method in the short tape version for rapid assessment of the naturalness and safety of honey, in the medium tape version for assessing the monoflora of honey and long tape to identify characteristic values of amylase activity during scientific research.
doi: 10.53598/2410-3225-2024-2-341-21-26
Release date: 28.06.2024
Mathematics
Ushkho A.D.
Straight-line isoclines of planar polynomial vector fields
A brief review of scientific articles on the theory of direct isoclines of polynomial vector fields of degree n in the plane is presented. Examples of application of this theory for solving some prob-lems of qualitative theory with respect to quadratic and cubic systems are given.
doi: 10.53598/2410-3225-2024-2-341-11-20
Release date: 28.06.2024
Technical Sciences
Aliev M.V., Berbentsev D.A., Nemykin V.O., Alieva S.M.
Algorithms for recognizing objects in a video stream and determining the properties of their relative position
An algorithm for detecting and identifying objects with possibility of determining characteristics of their mutual arrangement is presented. The algorithm is based on the use of the YOLO neural network model. Its practical application in copper-zinc is demonstrated and an efficiency assessment is given.
doi: 10.53598/2410-3225-2024-2-341-27-34
Release date: 19.01.2038
Kumratova A.M., Zaletaev V.A., Starchikov I.S.
Performance and reliability of encryption algorithms in processing and protecting Big Data
This article examines the application of various encryption algorithms in the context of processing and securing large volumes of data. With the increasing volume of information and the advancement of information technologies, ensuring data security becomes increasingly relevant. A comparative analysis of eight different encryption algorithms, including AES, Blowfish, Camellia, ChaCha20, DES, GOST, RC4, SEED and using the Java programming language, is car-ried out. The article presents the results of the analysis, including comparative performance and reliability characteristics of each encryption algorithm. The advantages and disadvantages of each algorithm are discussed, along with conclusions about the most suitable algorithms for processing large volumes of data in terms of performance and reliability are drawn.
doi: 10.53598/2410-3225-2024-2-341-35-42
Release date: 28.06.2024
Teploukhov S.V., Tatarintsev V.A., Belousov A.S.
Design of a portable insect trap (for field research)
In the process of searching and catching insect samples for further study and classification, var-ious types of passive and active traps are used, but many such devices require direct human participation, and many traps destroy insects, which does not allow their use for further study. One of the effective tools for catching samples is a trap based on the effect of positive phototaxis – the property of insects to orient and move towards a light source, but to ensure its autonomy it is advisable to use renewable energy sources. In this regard, the paper considers the process of designing a mobile autonomous insect trap, the use of which will allow effective collection of samples without damaging them. The trap is controlled by ESP32 microcontroller, which controls the time of operation of the device, in addition, the modular design of the trap allows its modification depending on the species of insects, for example, enable for replacement the LED-trap with the required wavelength. The use of a photovoltaic panel allows for a significant increase the autonomy of the device. Thus, the designed camera trap for catching insects has a modular structure, a sufficient degree of autonomy and can be adapted for catching insects of different species.
doi: 10.53598/2410-3225-2024-2-341-43-50
Release date: 29.06.2004
Markelov V.K., Privalov A.N.
Pretexting method as a threat to information security in social networks
The article examines the phenomenon of the popularity of social networks, which attracts the attention of cybercriminals who consider social networks an attractive environment for using social engineering methods in order to lure money and personal data from users of social net-works. Based on the quantitative and qualitative analysis of publications in the databases of scientific publications eLibrary and Google Scholar, current areas of research on problems of in-formation security in social networks, one of which is the problem of protecting users from social engineering attacks in social networks, including phishing and pretexting, are identified. An analysis of publications in the databases of scientific publications eLibrary, Scopus, Google Scholar over the past 10 years on the problems of countering social engineering methods in social networks demonstrates the growing interest of scientists in this area of research. At the same time, in recent years there has been an increase in the number of studies devoted to the study of pretexting as a method of social engineering, but the number of studies devoted to the problem of pretexting in social networks remains insufficient. In conclusion, the article proposes countermeasures for social engineering in social networks using pretexting.
doi: 10.53598/2410-3225-2024-2-341-51-61
Release date: 28.06.2024
Korzhakov V.E., Sedoy K.V.
Features of realization of the subsystem of monitoring and control of access of individual persons to the territory of the university
The work presents a subsystem for monitoring and controlling the access of individual persons to the university territory, implemented on the automated workplace of the operator of the access control and management system, connected to the corporate information system of the uni-versity on the platform “1C:Enterprise”, version 8.3.21. The developed subsystem allows to automate the process of updating the lists of admitted individuals in the access control and man-agement system, as well as to add additional tools to optimize the management process.
doi: 10.53598/2410-3225-2024-2-341-62-72
Release date: 28.06.2024
Merkulova A.V., Napso I.M.
System for indicating the user's proximity to a pre-selected geographical object when traveling along a route
A service that determines the indication of the user's approach to a pre-selected location is developed. Using the Telegram Bot API to determine the current coordinates of the user in real time, the system notifies about approaching a geographical object. Using geocoding technologies and Overpass API, it is possible to find the end point of the route. The results obtained in the work with the OpenStreetMap API and other geolocation technologies can be applied in once-personal areas, including transport, logistics, tourism and many others, where navigation plays an important role.
doi: 10.53598/2410-3225-2024-2-341-73-77
Release date: 28.06.2024
Dovgal V.A.
Using an operational task scheduling method for a drone swarm with language model support
The rapid development of unmanned aerial vehicle (UAV) technologies has led to the idea of combining drones into a single system, which nevertheless is not free from problems with task planning. The drone flock still faces challenges such as the complexity of remote control and the convenience of human-machine interaction. On the other hand, large language models are currently actively developing as a way for computing devices to communicate in a natural language of communication. In this study, it is proposed to combine the control of several unmanned aerial vehicles with the semantic understanding of the context of phrases by large language models. The method proposed in this article for operational task planning for a swarm of drones, based on the operational information received by sensors, will enable drones to accurately understand user tasks in natural language, allowing them to simplify, improve the efficiency and safety of controlling several drones, thereby increasing the flight characteristics and range of application of a flock of drones.
doi: 10.53598/2410-3225-2024-2-341-78-85
Release date: 28.06.2024
|