The article presents the results of an attempt to solve the problem of finding the optimal route for a vessel. The vessel moves under the risk of collision with moving objects. Optimality is determined by the vessel's fuel consumption and arrival at the destination on time. To numerically determine the optimality of the path, a functional depending on the route is used. The solution to the...
В данной работе представлена гибридная методология численного моделирования турбулентных течений, основанная на сочетании волновой модели несжимаемого потока Шредингера (Incompressible Schrödinger Flow, ISF) и субсеточной фильтрации больших вихрей (Large Eddy Simulation, LES). Волновой подход ISF обеспечивает альтернативное описание динамики потока через эволюцию комплексной амплитуды, что...
In federated synthetic data generation, model queries can expose statistical patterns, labeling behavior, and membership information—creating complex, layered privacy vulnerabilities. To this end, we propose PATE-FL: a federated learning framework that combines the PATE mechanism, Rényi Differential Privacy (RDP), and Paillier additive homomorphic encryption (HE), designed for the context of...
The rapid growth in data volume and complexity has exposed the limitations of traditional storage solutions. While data lakes offer scalable handling of large and unstructured datasets, they fall short in integrating data across distributed sites - a critical requirement for modern workflows such as machine learning that demand seamless, aggregated access to diverse data sources.
In this...
The study touches upon the relevant topic of ensuring the security of the Internet of Things (IoT), in particular, to prevent distributed denial of service (DDoS) attacks. Currently, especially in the context of active use of IoT on the African continent, it is necessary to constantly pay attention to a detailed study of DDoS attack vectors, detection of network traffic anomalies, as well as...
The article uses the example of the automatic measurement monitoring subsystem (AMMS) to consider the organization of proactive maintenance for monitoring measurement channels for reading information from sensors of the Industrial Internet of Things (IIoT). In order to improve the quality of proactive monitoring, it is proposed to use the tools underlying the software package of invisible...
The article proposes a concept for creating a distributed platform (DP) to improve the quality and accelerate development in the field of IT technologies. The role of database management systems (DBMS) for building a system for collecting, storing and processing data when building a DP, where a large amount of heterogeneous data is collected within a single platform, is considered.
By...
Современные распределённые вычислительные системы, такие как инфраструктуры интернета вещей (IoT), характеризуются высокой динамичностью, децентрализацией и гетерогенностью устройств, что предъявляет особые требования к механизмам эффективного распределения вычислительных и энергетических ресурсов между множеством конкурирующих и динамически поступающих задач. В условиях ограниченной...
Nowadays, Secure Data Transfer (SDT) is a crucial part of data exchange processes, especially in cross-organizational environments. Such data exchanges often rely on untrusted public networks, which are known to suffer from data loss, corruption, and even unauthorized data access.
To address these challenges, we propose the use of a blockchain-based system with a message broker-like...
Personal data anonymization is an important step in dataset preprocessing, especially when dealing with sensitive information. However, the impact of this process on the quality of clustering remains poorly understood. The presented study analyzes the impact of different anonymization techniques affect the clustering results. The experimental part of the work is based on the application of...
The paper proposes a method for hidden encryption of text information that combines the symmetric AES algorithm and elements of visual steganography. The text is encrypted using a 128-bit key presented in hexadecimal format, and the encryption result is also converted into hexadecimal blocks. A JPG image is used as a container, which is segmented into fragments. The coordinates for embedding...