Ашық рұқсат Ашық рұқсат  Рұқсат жабық Рұқсат берілді  Рұқсат жабық Тек жазылушылар үшін

Том 12, № 5 (2025)

Мұқаба

Бүкіл шығарылым

Ашық рұқсат Ашық рұқсат
Рұқсат жабық Рұқсат берілді
Рұқсат жабық Тек жазылушылар үшін

SYSTEM ANALYSIS, INFORMATION MANAGEMENT AND PROCESSING, STATISTICS

Methodology for identifying and ranking road traffic accident hotspots based on spatial analysis and program-targeted approach

Zagorodnikh N., Konstantinov I.

Аннотация

The article proposes an enhancement of an information system for analyzing road traffic accident hotspots (RTAs), developed within the framework of a program-targeted approach and geoinformation technologies. The system’s architecture is described, including spatial analysis algorithms, methods for identifying and consolidating clusters, as well as mechanisms for formalized accident representation. Special attention is given to the implementation of accident hotspot prioritization based on risk factors, recommended measures, and the expected mitigation effect. Verification was conducted using real-world urban accident data. The proposed solution demonstrates the stability of the implemented algorithms and their applicability in digital transformation tasks related to transport infrastructure. Key directions for future development are outlined, including the integration of fuzzy logic, digital twins, and artificial intelligence modules.

Computational nanotechnology. 2025;12(5):11-28
pages 11-28 views

Efficiency analysis of a biogas plant based on mathematical modeling of mesophilic fermentation processes

Klyosov D., Lomazov V., Lomazov A., Miroshnichenko I.

Аннотация

The article presents a mathematical model of the biochemical processes occurring in a biogas plant under the mesophilic fermentation regime. The aim of the research was to increase the efficiency of biogas plants by developing mathematical models of biochemical processes. The model is based on a system of differential equations that take into account the dynamics of the key components of the substrate, such as moisture, ash, nitrogen-free extractives (BEV), fats, proteins, and fiber. A number of factors have been identified that may affect the reaction rate, including the temperature regime, the hydrogen index of the reaction medium, as well as the content of ammonia and volatile fatty acids, which exhibit the ability to inhibit. During the calculations, the time dependences of the concentrations of the main components of the substrate were obtained and plotted graphically. As a result, the dependence of the volume output of biogas on the substrate parameters was obtained. The simulation results showed high accuracy in predicting biogas output, especially for piglet manure (R2 > 0.96). The model also takes into account the dynamics of microbial biomass and the accumulation of intermediates such as methane and carbon dioxide. The results obtained indicate that the developed mathematical model of the biochemical processes of a biogas plant has high accuracy and can be used to predict the key parameters of anaerobic digestion in the mesophilic regime. The developed approach can be integrated into biogas complex management systems to optimize substrate loading and increase energy generation efficiency. The work prospects include adapting the model to thermophilic conditions and complex substrates.

Computational nanotechnology. 2025;12(5):29-36
pages 29-36 views

Information technologies in the design of electronic components and equipment

Lepeshkin D., Razumova N., Linkov A.

Аннотация

Amid growing requirements for the quality and reliability of electronic equipment in high-tech products (including rocket and space technology), there is a noticeable gap between industry needs and the capabilities of domestic electronic component bases (ECB). This article examines existing approaches to the selection and application of ECB, including both Russian and imported components, with a focus on current limitations. Special attention is given to the necessity of transitioning from traditional ECB selection to automated component design using modern information technologies. A detailed design workflow for equipment components is presented, covering modeling, physical verification, integrated circuit design, unit and printed circuit board (PCB) design, enclosure development, and the use of modern CAD and process simulation tools. The paper emphasizes information support for various design stages, as well as methods and tools that ensure high precision, reliability, and compliance with technical-economic requirements.

Computational nanotechnology. 2025;12(5):37-46
pages 37-46 views

Formation of synthetic data in machine learning models based on multiscale analysis of binary Markov models

Pushkin P., Konyshev M., Perevezentsev D., Grachev A.

Аннотация

A method for generating synthetic data for training systems in binary Markov data sources is presented, based on estimates of the elements of the transition probability matrices of binary Markov chains obtained as a result of a multiscale analysis, which differs from the known ones by taking into account the ranges of values of the matrix elements in the observed objects. An algorithm for the formation of synthetic data is proposed, which implements the calculation of elements of transition probability matrices within the estimates obtained on real data. The results of a computational experiment organized to test the quality of machine learning using the developed method and algorithm confirmed the possibility of improving the quality of artificial intelligence systems.

Computational nanotechnology. 2025;12(5):47-55
pages 47-55 views

A system approach to incorporating consumer expectations in the satellite services development process

Chistyakov V., Yudin A., Grosheva P.

Аннотация

The article examines a systematic approach to the development and implementation of innovative satellite services, based on accounting for consumer expectations and forecasting market needs. The authors analyze key factors influencing the successful promotion of such services, including technological trends, competitive environment, and quality management methods. Special attention is paid to technological forecasting methodologies, such as Foresight analysis and weak signal monitoring, as well as the development of roadmaps for creating radically new solutions. A conceptual model of consumer satisfaction integrating ISO 9000 principles is proposed, and mechanisms for adapting services to changing market conditions are discussed.

Computational nanotechnology. 2025;12(5):56-66
pages 56-66 views

MANAGEMENT IN ORGANIZATIONAL SYSTEMS

Methodology for predicting the demand for university graduates using data mining techniques

Presnetsova V., Konstantinov I.

Аннотация

The purpose of this research is to develop and validate an integrated methodology for predicting the demand for university graduates in a regional labor market by applying data-mining tools and machine-learning techniques. Employment monitoring data from Turgenev Orel State University for 2022–2024 served as the empirical basis. The Random Forest algorithm was used to forecast graduate employment rates across aggregated fields of study, while the K-means clustering method grouped specialties according to their demand levels. The analysis identified three stable clusters – “high”, “medium”, and “low” employment prospects – provided actionable recommendations for adjusting curricula and enrollment quotas, and highlighted programs that need additional interdisciplinary digital competencies. The resulting models demonstrated high accuracy (MAE = 13.33%, R2 = 0.78) and no multicollinearity issues, as confirmed by VIF values. The proposed methodology offers universities an effective tool for strategic enrollment planning, improving graduate employability, and real-time adaptation of educational offerings to the dynamic needs of the economy. It can also be embedded into digital education-management platforms and regional workforce-demand forecasting systems.

Computational nanotechnology. 2025;12(5):67-79
pages 67-79 views

Analysis of requirements for IT professionals based on vacancies, educational standards, and student preferences using large language models

Aleksandrov A., Zaripova V.

Аннотация

This study aims to identify discrepancies between the requirements of employers and the labor market, educational standards and preferences of students in the field of information technology using large language models. Based on the texts of vacancies, using the open APIs of the Head Hunter service, an algorithm has been developed for compiling an average vacancy on the market, reflecting the most frequent requests from employers. To verify compliance and identify discrepancies between the requirements of the labor market and the actual knowledge of students, this study proposes an algorithm for forming a target vacancy according to the work program of disciplines and the expected vacancy by students based on a survey of knowledge, skills, current and planned to study, skills of students. The paraphrase-MiniLM-L6-v2 language model was used to compare vacancies compiled in the framework of this study. Results: The analysis revealed significant discrepancies between market requirements for IT specialists and educational programs in the field of information technology, as well as a discrepancy between students’ expectations and competencies demanded by employers (compliance 65.3%). The results emphasize the need to adapt educational programs in the field of information technology to rapid changes in the labor market and demonstrate the effectiveness of using large language models in automating this process.

Computational nanotechnology. 2025;12(5):80-94
pages 80-94 views

Analysis of the effectiveness of neural network architectures for protecting industrial systems from targeted social engineering attacks

Krasnoslobodtseva D., Yudin A.

Аннотация

This study presents a comprehensive comparative analysis of the effectiveness of modern neural network architectures for countering targeted social engineering attacks on industrial systems. The paper characterizes the main social engineering methods, based on which a group of them is identified that have a critical impact on domestic production. The experimental part of the study is based on an open dataset containing 651 191 URLs categorized into four types: safe resources, defaced links, phishing resources, and malware distributors. The paper presents a systematic evaluation of both classical and innovative machine learning approaches, including Kolmogorov-Arnold networks (KAN), graph neural networks (GNN), capsule neural networks (CapsNets), and their hybrid combinations. The results demonstrate significant superiority of hybrid architectures, where the combination of CNN + LSTM achieved a maximum accuracy of 92.29%, and CNN + KAN demonstrated a result of 92.00%. A detailed analysis revealed the specific effectiveness of various architectures for specific threat categories: CapsNets demonstrated the best results in identifying safe resources (98.60%), while CNN + LSTM were most effective in detecting phishing attacks (72.76%). The scientific novelty of this work lies in establishing a correlation between the type of neural network architecture and the nature of a potential cyberthreat, which creates a methodological basis for developing next-generation adaptive security systems for industrial infrastructure.

Computational nanotechnology. 2025;12(5):95-109
pages 95-109 views

METHODS AND SYSTEMS OF INFORMATION PROTECTION, INFORMATION SECURITY

A technique for categorizing objects of critical information infrastructure, taking into account industry criticality

Mityakov E.

Аннотация

The article presents an advanced technique for categorizing objects of critical information infrastructure (CII), taking into account industry criticality. The aim of the study is to improve the objectivity and accuracy of the categorization process, minimize subjective distortions, and optimize the allocation of resources for ensuring information security. The authors propose a methodology based on calculating an industry criticality coefficient, which integrates expert assessments across five key criteria: national security, economic significance, social importance, industry interdependence, and potential damage. The methodology was tested on 14 industries, enabling their classification into three criticality categories. The results demonstrated high consistency among expert evaluations and confirmed the effectiveness of the proposed approach. Implementing this technique facilitates differentiated planning of CII protection measures and optimizes regulatory requirements.

Computational nanotechnology. 2025;12(5):110-117
pages 110-117 views

INFORMATICS AND INFORMATION PROCESSING

Mathematical modeling of clustering based on the results of monitoring the activities of educational institutions of higher education

Aynazarov R., Vostroknutov I.

Аннотация

The article discusses the application of mathematical modeling and cluster analysis methods for processing monitoring data on the activities of educational institutions of higher education. The relevance of the research is determined by the need for an objective assessment of the effectiveness of universities, the identification of problem areas and the development of targeted management solutions. The paper analyzes key indicators, including educational, research, international, financial and economic activities, as well as the salary level of teachers. The main focus is on clustering methods that allow universities to be grouped according to similar characteristics. Hierarchical, centroid, and density algorithms are considered, as well as the specifics of their application in the context of multidimensional educational data. Special importance is attached to the preprocessing of indicators, including normalization and standardization, to ensure the correctness of the results. The clustering quality is assessed using the silhouette index and other metrics, which makes it possible to determine the stability of the selected groups. The results of the study demonstrate that automated clustering of monitoring data helps identify typical university development trajectories, optimize resource management, and develop differentiated support measures. The proposed approach can be integrated into a regular monitoring system, providing operational analytics for management decision-making. The prospects for further research are related to the development of adaptive algorithms, forecasting the dynamics of indicators and the creation of interactive analytical platforms.

Computational nanotechnology. 2025;12(5):118-128
pages 118-128 views

The Algorithm for constructing a digital fingerprint of a sensor based on a dynamic model of its output signal for data protection in automated systems

Bogacheva D.

Аннотация

The article considers the problem of an intruder’s interference in the technological (e.g. automated) system operation by replacing an endpoint device (sensor) or its signal; it also considers approaches to detecting such interference. A brief overview of existing methods for detecting device substitution is provided. As a solution to the problem, it is proposed to identify the device by comparing some of its current parameters with reference parameters collected in advance. For the purposes of identifying an endpoint device, the author proposes to compare digital fingerprints (current and reference ones) constructed using dynamic models of the signal of this device. The main requirements for the input data are formulated. Ways for preliminary improving the input data are proposed in case the data do not meet the above requirements. The algorithm for creating a digital fingerprint is described with a detailed explanation of the mathematical apparatus used; the algorithm is also presented in a flowchart form. The application of the algorithm for the identifying purposes both in laboratory conditions (using a specially created test bench) and on real data from the functioning microclimate analysis system of the Center of Digital Solutions for Smart Grid of the Institute of Control Sciences of the Russian Academy of Sciences is considered.

Computational nanotechnology. 2025;12(5):129-142
pages 129-142 views

A Model for the intelligent analysis and detection of anomalies in the data of statistical observation of educational organizations

Vinogradov N., Vostroknutov I.

Аннотация

This article describes an algorithm for applying an intelligent analysis model to detect anomalies in statistical observation data for educational organizations. The definition of an anomaly is given, typical anomalies that may be contained in statistical reporting data are analyzed. The classification of anomaly detection techniques is given depending on the level of markup of the training sample, and possible ways of marking up data to present the results of the anomaly search are analyzed. The analysis and description of the process of collecting and processing statistical data of educational organizations in the Scientific and Technical Center of RTU MIREA is carried out. The weaknesses of the data collection process are analyzed, which can be strengthened by applying intelligent analysis to search for anomalies in the data. The analysis and mathematical description of the format and features of the received and stored statistical data is carried out. An algorithm has been developed for preparing data for training an intelligent analysis model, taking into account their specifics, as well as the subsequent application of the trained model to detect anomalies in the data under consideration. The algorithm was tested on real data using the autoencoder neural network model.

Computational nanotechnology. 2025;12(5):143-153
pages 143-153 views

Transitional analysis of a multi-linear QMS with impatient applications

Dvoretsky A., Barabanova E., Vytovtov K.

Аннотация

This study presents a mathematical model capable of evaluating non-stationary operating modes of medical information-measurement systems in order to improve their efficiency. Such systems play a critical role in medicine and are used for forecasting and assessing patient conditions in life-threatening situations. The mathematical model introduced in this work is a multichannel queuing system with impatient requests in a transient regime, along with its performance characteristics. This type of model appropriately describes real-time medical information systems not only during normal operation but also under conditions of reboot, failure, or equipment malfunction. To analyze the transient regime of the multichannel queuing system with impatient requests, a system of Kolmogorov differential equations is used, along with a solution based on the probability transition matrix method. The study derives expressions for determining the average number of requests in the buffer, the probability of request servicing, the absolute and relative throughput of the system, and the transient time. The paper presents the results of a transient regime analysis for an M/M/2/4 system with impatient requests, including numerical calculations for various service rates and abandonment rates of impatient requests from the queue.

Computational nanotechnology. 2025;12(5):154-166
pages 154-166 views

Application of the method of video-computer diagnostics and psychocorrection to improve the efficiency of determining the reliability of bank clients

Novikova E.

Аннотация

This article discusses the application of the video-computer-psychodiagnostics and psychocorrection (VCP) method to determine the reliability of Tinkoff Bank clients in addition to credit scoring, as well as an example of diagnosing clients of the microfinance organization Bank 911 in on-line mode. The problem of reducing the risks of consumer lending in Russia and the importance of solving it are identified, existing methods for determining reliable borrowers in the banking sector, such as Personal Credit Rating, scoring system, psychoscoring, their shortcomings in the context of a large flow of borrowers are studied, the essence of the video-computer psychodiagnostics and psychocorrection method is described and the result of the study of its application for diagnosing Tinkoff Bank clients is given. The advantage of the VKP method is indicated, which consists in the fact that, using this method, it is possible to quickly identify a fraudster who deliberately came with forged documents, or simply a borrower who initially does not intend or cannot repay the loan, and also to give a forecast of the behavior of clients for a long period, since with the help of the program it is possible to identify a potential predisposition to fraud, such properties as “falsehood” and “carelessness”. A comparison of the VKP method with other systems for recognizing emotions in an image, its advantage and the possibility of application in organizations associated with a danger to life and extreme situations are given.

Computational nanotechnology. 2025;12(5):167-178
pages 167-178 views

Prioritization algorithms for restoring damaged critical infrastructure facilities

Sereda L., Grebenyuk G.

Аннотация

The article is devoted to the development of prioritization algorithms for critical engineering infrastructure facilities repair in order to optimize the process of restoring the resource supply to consumers. Damage caused by external influences of various natures, such as intentional impacts and natural phenomena, is considered. The connected power of consumers (or their number in a simplified case) is considered as a criterion for forming the repair sequence of damaged objects, and their importance is also taken into account. The proposed approach analyzes the topology of engineering infrastructures, considering both the own consequences of failed elements and the complex synergistic consequences of these elements’ failures. The application of the developed algorithms for intentional and natural negative impacts is demonstrated. The restoration sequence generation is illustrated via the example of an electrical network, which is a modified 14-bus IEEE test electrical circuit.

Computational nanotechnology. 2025;12(5):179-189
pages 179-189 views

Согласие на обработку персональных данных с помощью сервиса «Яндекс.Метрика»

1. Я (далее – «Пользователь» или «Субъект персональных данных»), осуществляя использование сайта https://journals.rcsi.science/ (далее – «Сайт»), подтверждая свою полную дееспособность даю согласие на обработку персональных данных с использованием средств автоматизации Оператору - федеральному государственному бюджетному учреждению «Российский центр научной информации» (РЦНИ), далее – «Оператор», расположенному по адресу: 119991, г. Москва, Ленинский просп., д.32А, со следующими условиями.

2. Категории обрабатываемых данных: файлы «cookies» (куки-файлы). Файлы «cookie» – это небольшой текстовый файл, который веб-сервер может хранить в браузере Пользователя. Данные файлы веб-сервер загружает на устройство Пользователя при посещении им Сайта. При каждом следующем посещении Пользователем Сайта «cookie» файлы отправляются на Сайт Оператора. Данные файлы позволяют Сайту распознавать устройство Пользователя. Содержимое такого файла может как относиться, так и не относиться к персональным данным, в зависимости от того, содержит ли такой файл персональные данные или содержит обезличенные технические данные.

3. Цель обработки персональных данных: анализ пользовательской активности с помощью сервиса «Яндекс.Метрика».

4. Категории субъектов персональных данных: все Пользователи Сайта, которые дали согласие на обработку файлов «cookie».

5. Способы обработки: сбор, запись, систематизация, накопление, хранение, уточнение (обновление, изменение), извлечение, использование, передача (доступ, предоставление), блокирование, удаление, уничтожение персональных данных.

6. Срок обработки и хранения: до получения от Субъекта персональных данных требования о прекращении обработки/отзыва согласия.

7. Способ отзыва: заявление об отзыве в письменном виде путём его направления на адрес электронной почты Оператора: info@rcsi.science или путем письменного обращения по юридическому адресу: 119991, г. Москва, Ленинский просп., д.32А

8. Субъект персональных данных вправе запретить своему оборудованию прием этих данных или ограничить прием этих данных. При отказе от получения таких данных или при ограничении приема данных некоторые функции Сайта могут работать некорректно. Субъект персональных данных обязуется сам настроить свое оборудование таким способом, чтобы оно обеспечивало адекватный его желаниям режим работы и уровень защиты данных файлов «cookie», Оператор не предоставляет технологических и правовых консультаций на темы подобного характера.

9. Порядок уничтожения персональных данных при достижении цели их обработки или при наступлении иных законных оснований определяется Оператором в соответствии с законодательством Российской Федерации.

10. Я согласен/согласна квалифицировать в качестве своей простой электронной подписи под настоящим Согласием и под Политикой обработки персональных данных выполнение мною следующего действия на сайте: https://journals.rcsi.science/ нажатие мною на интерфейсе с текстом: «Сайт использует сервис «Яндекс.Метрика» (который использует файлы «cookie») на элемент с текстом «Принять и продолжить».