Informacionnye Tehnologii

Monthly theoretical and applied scientific and technical journal

Editor-in-chief

  • professor Stempkovsky Alexander L., Doctor of Engineering Science, Academician at Russian Academy of Sciences, Scientific Superviser , AlphaCHIP Innovation Center.

Publisher

  • LLC Publishing House «New Technologies»

Founder

  • LLC Publishing House «New Technologies»

WEB official

About the journal

The journal "Information Technologies" has been published since November 1995 on the monthly basis.

The journal is focused on generating knowledge in the field of information technologies. Articles on the development of information technology methods as a result of authors’ research are published.

The journal is included in the Unified State List of Scientific Publications - "White List", the database of the Russian Science Citation Index (RSCI). The Editorial Council and the Editorial Board consist of 40 Doctors of Sciences and 4 Candidates of Sciences.

The journal is included in the list of peer-reviewed scientific publications where the main scientific results of dissertations for the degree of Candidate of Sciences, for the degree of Doctor of Sciences, should be published, in specialties (in accordance with the current list of specialties of the Higher Attestation Commission).

 


Current Issue

Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 32, No 3 (2026)

Cover Page

Full Issue

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Modeling and optimization

Adaptive calibration of fuzzy models for early warning of emergency situations
Kureichik V.V., Danilchenko V.I.
Abstract

This paper examines the problem of improving the quality and effectiveness of emergency forecasting in rapidly changing and uncertain conditions. The relevance of the study is determined by the increasing frequency and complexity of emergency situations, as well as the heterogeneity, noisy nature, and incompleteness of monitoring data, which limit the applicability of traditional methods and fuzzy early warning models that do not take into account changes in the structure of input flows and real risk criteria. The goal of the study is to improve the accuracy and robustness of emergency forecasting by developing an adaptive method for calibrating fuzzy early warning models for emergency situations. The paper also proposes a mechanism for dynamically updating the parameters of membership functions and rule weights, ensuring stable and efficient model behavior in the face of structural shifts, noise, and missing observations. А software product was developed, and a computational experiment was conducted on various emergency scenarios, including changes in the intensity of input signals and abrupt shifts in data distribution. The obtained results confirm an increase in the quality of forecasting and a reduction in the level of fuzzy uncertainty compared to the baseline model without adaptation, while the root mean square error decreased by 26-40 %, and the level of uncertainty by 18-27 %, which indicates the practical applicability of the proposed approach in early warning and real-time monitoring systems.

Informacionnye Tehnologii. 2026;32(3):115-126
pages 115-126 views
A methodology for evaluating the training effectiveness of quadrocopter operators based on digital behavioral trace analysis and latent action patterns
Serebryakov M.Y.
Abstract

The paper proposes and substantiates a new methodology for evaluating the effectiveness of quadcopter operator training Digital Behavioral Trace Analysis, based on end-to-end analysis of the digital trace of small managerial actions. Unlike traditional approaches that rely on objective performance metrics, psychological questionnaires or expensive physiomonitoring, Digital Behavioral Trace Analysis captures high-frequency control parameters: reaction time to a command, frequency of stick micro-corrections, statistics of deviations from the optimal trajectory and additional attributes. To test the methodology, a quadrocopter flight simulator was used, in which 10 operators performed five runs of a standard scenario "takeoff — maneuver — landing". Using automated logging, data were collected for four key attributes, after which the mean values for each participant underwent clustering using the K-means method. The experimental results showed a clear separation of the participants into two groups: "confident" operators with low reaction times and infrequent micro-corrections and uncertain participants with elongated reaction times and high frequency of minor corrections. Identifying latent patterns of behavior without involving subjective assessments or sophisticated equipment provides new opportunities for adaptive simulators and predictive monitoring systems. In particular, DBTA can serve as a basis for automatic adjustment of the complexity of training tasks in real time, timely detection of operator fatigue or overload, and more objective selection of candidates for the position of UAV pilot. In the future, the methodology is planned to be extended to include additional attributes: camera operation, trajectory analysis, interaction with the user interface, and application of supervised models for predicting readiness to perform complex flight scenarios.

Informacionnye Tehnologii. 2026;32(3):126-133
pages 126-133 views
Deepfake detection using an optimal ensemble of deep learning models
Lapsar A.P., Pogulyay G.S.
Abstract

The article proposes a method for combined detection of deepfakes based on the ensemble of several deep learning models that differ as much as possible in their properties. The method involves the use of ResNet, EfficientNet and MobileNe models. The integral result of the combination is formed by averaging the partial detection probabilities. The results of an experimental study are presented, demonstrating the advantages of the synthesized method when working with heterogeneous types of deepfakes.

Informacionnye Tehnologii. 2026;32(3):134-142
pages 134-142 views
Finding patterns in nested samples of objects with dynamically distributed data values
Ignatev N.A., Zguralskaya E.N.
Abstract

The problem of finding hidden patterns in nested samples of objects, the measurement of feature values was considered. The objects of each sample were divided into representatives of two non-intersecting classes. Using a recursive method, the feature values were divided into intervals within which representatives of one of the classes dominated. The results of the partitioning were used to calculate the stability of features. The presence of restrictions on the set of admissible stability values is explained through the properties of membership functions to fuzzy sets. The results of the computational experiment were used to predict the survival of patients with chronic lymphocytic leukemia, depending on the stages of their examination.

Informacionnye Tehnologii. 2026;32(3):142-148
pages 142-148 views

Information security

The adaptive firewall with log predictive analysis based on neural network
Kuznetsov D.A., Rysin M.L.
Abstract

The article considers the development of an adaptive IDS/IPS system based on neural networks, capable of detecting both known and previously unknown attacks. The analysis is conducted using the NF-ToN-IoT dataset. Three neural networks were trained: for attack detection, attack type identification, and unknown threat prediction. The results demonstrate high attack detection accuracy (96.97 %) and the ability to identify new threats (81.94 %), surpassing existing solutions.The developed firewall and intrusion prevention system demonstrates high efficiency, enabling the creation of a domestic security system capable of minimizing the risk of hacker attacks and ensuring reliable protection of network infrastructure.

Informacionnye Tehnologii. 2026;32(3):149-156
pages 149-156 views
On the data protection in distributed systems founded on Cryptographic Message Syntax
Asratian R.E., Kozlov A.D., Orlov V.L.
Abstract

A new approach to building secure network channels (tunnels) over the Internet for servicing web services in distributed systems based on the use of the Cryptographic Message Syntax (CMS) standard for secure data representation on the network is considered. Unlike VPN technology, the described approach is strictly focused on supporting only HTTP/SOAP interactions in distributed systems — the basis of network.NET architecture. This approach is based on creating a secure "tunnel" through the Internet that uses the structure of a secure CMS message as a secure "container" for transporting HTTP/SOAP documents over the network: information requests to web services and "responses" to them. The approach implies the use of special gateways that provide encapsulation of HTTP/SOAP-documents into the safe CMS-message structures on the sender side and deencaptulating on the receiver side to make up a "transparent" communication channel for system components. It is assumed that both client programs and web servers are located in the same secure private network (or even on the same network node) with the gateways serving them, and only the interaction between the gateways is carried out through the public network. The implementation of the approach in the Linux environment and the results of an experimental study are described. As this study has shown, the use of OpenSSL crypto-libraries can significantly speed up the work of CMS-based data protection tools, which is of great importance in the development of distributed systems based on the.NET network architecture.

Informacionnye Tehnologii. 2026;32(3):156-162
pages 156-162 views

Information technologies in biomedical systems

On the possibility of using a hybrid approach in the recognition of potentially dangerous physiological conditions
Bogdanov M.R., Shakhmametova G.R., Shaibakov I.S., Ishakov A.R., Oskin N.N.
Abstract

The paper is devoted to the recognition of potentially dangerous physiological conditions. It is proposed to convert one-dimensional signals used in medical diagnostics into a video sequence. To recognize a video sequence, it is proposed to combine a convolutional and recurrent neural network. The effectiveness of multiclass classification of various physiological conditions is compared using a method combining recurrent and convolutional neural networks (accuracy metric is 0.98) with recurrent (0.53) and convolutional neural networks (0.41). The high efficiency of the proposed approach is shown.

Informacionnye Tehnologii. 2026;32(3):163-168
pages 163-168 views