Evstigneeva O.A., Yuganson A.N., Korobeinikov A.G., Grishentsev A.Y., Kubasheva E.S. —
Optimization of Transitional Commutation Processes in Thermal Operations Systems
// Cybernetics and programming. – 2017. – ¹ 5.
– P. 89 - 102.
DOI: 10.25136/2644-5522.2017.5.24411
URL: https://en.e-notabene.ru/kp/article_24411.html
Read the article
Abstract: The subject of the research is the method of reducing the spark load and commutation noise by separating the power elements of thermal plants. The object of the research is thermal installations. The aim of the research is to develop a method for separating the power elements of thermal plants in order to reduce the switching currents when performing thermal control. In the course of their research the authors have conducted simulation based on the example of a heating installation. The results of simulation and comparison of the systems with separation and without separation of the thermal circuits show the efficiency of the application of the separation method to reduce the switching currents while maintaining the admissible system characteristics by the cosφ criterion. The authors also offer their method for reducing switching currents in the process of temperature control of the temperature of thermal installations by transition from one power element of the thermal installation to several, the power of which is distributed in proportion to the first members of the Fibonacci series. The analysis carried out in the research has showed the possibility of reducing switching currents by increasing the number of thermal circuits. The possibility of reducing the switching voltages in several times is demonstrated. The authors offer to divide powers between consumers (thermal loops or cryogenic elements) in proportion to several first terms of Fibonacci numbers. The typical feature for dividing the system into several power circuits is the increase in reacting power. The authors offer the method to return part of the reacting power in thermal plants by back connection of thermal spiral elements.
Grishentsev A.Y., Korobeinikov A.G., Yuganson A.N. —
Computational optimization of mutual transformations of color spaces based upon the arithmetic fixed-point.
// Cybernetics and programming. – 2017. – ¹ 4.
– P. 84 - 96.
DOI: 10.25136/2644-5522.2017.4.24005
URL: https://en.e-notabene.ru/kp/article_24005.html
Read the article
Abstract: In their article the authors provide their results on systematization of methods for computational optimization of the transformation of color spaces based upon the application of fixed-point arithmetic. The authors formulate the goals and analyze the key problems arising in the situation of computational optimization in the process of color space formation from the standpoint of the speed of operation increase. The principles of transition from a floating point format to a format with a fixed point are stated. The authors also provide an example for the analysis of computational optimization for the mutual transformation of RGB and Y709CbCr. In this article the authros consider the method of computational optimization of the transformation of color spaces based on the application of fixed-point arithmetic. When applying the considered principle of practical implementation, the computation time for an image of 4134x2756 on an Intel Core 2 Duo processor becomes 18 times less. This is a very significant increase in productivity. It is not too difficult to apply this approach to other similar calculations, especially on modern 64-bit and 128-bit processors, when the necessary values fit into a single processor register.
Grishentsev A.Y., Korobeinikov A.G., Dukel'skii K.V. —
Use of the method of numerical estimation for the technical interoperability.
// Cybernetics and programming. – 2017. – ¹ 3.
– P. 23 - 38.
DOI: 10.25136/2644-5522.2017.3.23540
URL: https://en.e-notabene.ru/kp/article_23540.html
Read the article
Abstract: The object of study involves the method for assessing the quality of technical interoperability means in the open information systems in accordance with the model of interoperability under the GOST R 55062-2012. The author proposes a method for calculating the estimated characteristics of technical interoperability based upon the evaluation of detection and transformation of data formats by nodes of an open information system. As an example the article includes practical assessments of technical interoperability based upon the criteria for detecting and converting formats, and some software packages for processing graphic images. It is noted in the article that if there is need to observe the evolution of the interoperability of the information system, it is then necessary to preserve the methodological basis for the formation of the initial parameters. The proposed estimation method is based upon the laws of information theory and it is determined by a formal model allowing to calculate the particular and general information entropy characterizing the technical interoperability as the ability of the information system under investigation to detect data in various formats and the ability of the information system under investigation to produce correct data transformations in various formats. The main result of the research is the developed method of estimating technical interoperability that allows to make a numerical estimation of the properties of technical interoperability allowing for the format detection and transformation. The practical result of the study is that it enables the numerical evaluation of interoperability, allowing one to monitor the dynamics of interoperability of various systems under conditions of interaction with a continuously changing inter-system information space.
Korobeinikov A.G., Kutuzov I.M. —
Obfuscation of concealment calls using InvokeDynamic instructions
// Cybernetics and programming. – 2016. – ¹ 5.
– P. 33 - 37.
DOI: 10.7256/2306-4196.2016.5.18686
URL: https://en.e-notabene.ru/kp/article_18686.html
Read the article
Abstract: The object of the study is technology of hiding method calls. Hidden calls are need to hide: entity dependencies; data processing logic; algorithms. The methods used to complete the task are limited by language technologies and its performance. Method can be called directly and indirectly: via the bootstrap method; from native code (JNI); using Reflection; using JRE 1.7, InvokeDynamic. The examples with source code are given. The authors conclude that the most promising methods among considered is invokedynamic technology. The study present analysis of such methods as the bootstrap method, calling method from through native code, obfuscation calls via Reflection and InvokeDynamic. The article discusses various ways to conceal the method invocation. The characteristic features of obfuscation for most popular ones are reviewed. The most promising among the discussed methods is invokedynamic technology. It allows completely removing method signature from the source code, leaving only the service information for the bootstrap method. With proper implementation of the bootstrap method it is possible to create bytecode, which will be impossible to decompile into valid Java code, Groovy's or Scala.
Piskova A.V., Korobeinikov A.G. —
Features of applying lattice theory in digital signature schemes
// Cybernetics and programming. – 2016. – ¹ 2.
– P. 8 - 12.
DOI: 10.7256/2306-4196.2016.2.17970
URL: https://en.e-notabene.ru/kp/article_17970.html
Read the article
Abstract: The subject of the study is the scheme of digital signature, which is an important element in building secure systems used in most real-world security protocols. Reliability of existing schemes of electronic digital signature can be severely lowered in case of developments in classical cryptanalyst or progress in the development of quantum computers. A potential alternative approach is to construct the schemes based on the complexity of certain properties of the lattices, which are supposed to be intractable for quantum computers. Due to significant scientific advances in recent years, scheme based on lattice theory already used in practice and is a very viable alternative to number-theoretic cryptography. The study is based on the use of methods of lattice theory. This choice is dictated by the lack of solution of problem of finding the shortest vector or finding the nearest vector in polynomial time. The main conclusion of the paper is that the main area of future development in the schemes of the digital signature on the basis of lattice theory is their optimization and implementation of the Fiat-Shamir model in it. For example, Bliss scheme showed high performance and therefore it can be integrated into portable systems and devices.
Aleksanin S.A., Fedosovskii M.E. —
Development of an automated procedure of digital image improvement using Laplace mask
// Cybernetics and programming. – 2016. – ¹ 1.
– P. 258 - 269.
DOI: 10.7256/2306-4196.2016.1.17851
URL: https://en.e-notabene.ru/kp/article_17851.html
Read the article
Abstract: The study is devoted to automated procedures of selecting method and relevant parameters for digital image improvement. In this article the authors select filtering method known as Laplace mask to improve images. Since the image is represented by a discrete function, the authors use various discrete representations as an approximation of a continuous formula of two-dimensional Laplace operator. Additionally the paper reviews filters (masks) of Laplace high frequency which are frequently used in digital image processing. The research methodology is based on the computational experiments. Software for these experiments is designed using MATLAB system. The novelty of the research is to indicate the direction which will help reduce the time spent on image optimization while increasing the efficiency and reliability of the software for digital image processing. This is confirmed by the results of numerical experiments that were carried out with the use of the developed automated procedures for selecting and setting parameters Laplace masks for digital image processing.
Korobeinikov A.G., Fedosovskii M.E., Aleksanin S.A. —
Development of an automated procedure for solving the problem of reconstructing blurry digital images
// Cybernetics and programming. – 2016. – ¹ 1.
– P. 270 - 291.
DOI: 10.7256/2306-4196.2016.1.17867
URL: https://en.e-notabene.ru/kp/article_17867.html
Read the article
Abstract: The study is devoted to methods allowing solving the problem of reconstructing blurry digital images. The authors give a mathematical formulation of the problem of removing blurring from the image. The article presents the Volterra type I equation integral equation. Based on a set of methods that solve this integral equation, the authors propose an automated procedure for solving the problem of reconstructing blurry digital images. The paper discussed in detail the method of Tikhonov regularization. Numerical experiments for different types of digital images are held. The authors give recommendation for choosing the regularization parameter. The research methodology is based on the methods for solving incorrectly posed problems, such as the task of removing the blurring of the digital image. The novelty of the research lies in the uniform approach to solving the problem of removing the blurring of a digital image. This approach has been applied to various kinds of digital images. The results of the selection of the regularization parameter, obtained using numerical experiments are different for different types of images, as expected.
Aleksanin S.A. —
Development of procedures of the automated choice of methods of the analysis and digital processing of images at the solution of problems of defectoscopy
// Cybernetics and programming. – 2015. – ¹ 4.
– P. 62 - 71.
DOI: 10.7256/2306-4196.2015.4.16331
URL: https://en.e-notabene.ru/kp/article_16331.html
Read the article
Abstract: In the article the author presents developed procedures of automated automated selection of methods of analysis and digital processing of images, used when creating domain-specific subsystems, in particular for defectoscopy. The relevance of the problem is caused by ever-increasing requirements for technical characteristics of modern equipment used in medicine, space exploration, information technology, etc. And this implies the urgency of the task of creating functions of automated selection of methods for digital image processing and analysis in defectoscopy. The described automated procedures for choosing methods for digital image processing and analysis were developed on the basis of modern methods of digital image processing. The main results of the present research of procedures for automated selection of digital image processing solutions for the problems of defectoscopy is that the use of this procedures, depending on qualification, can significantly improve the quality of digital photos. This will lead to better identification of defects, which in turn will allow to withstand all specified technical requirements for manufactured products.
Korobeinikov A.G., Aleksanin S.A. —
Methods of automated image processing in solving problems of magnetic defectoscopy
// Cybernetics and programming. – 2015. – ¹ 4.
– P. 49 - 61.
DOI: 10.7256/2306-4196.2015.4.16320
URL: https://en.e-notabene.ru/kp/article_16320.html
Read the article
Abstract: The subject of study in this paper is developed automated method of selecting of procedures of processing images gathered for the magnetic defectoscopy. The methods based on the analysis of magnetic fields scattering near the defects after the magnetization of these products are used to detect various defects, such as cracks, in the surface layers of steel parts. In areas where there is a discontinuity, the change of the magnetic flux is present. This effect is the basis of almost all existing methods of magnetic defectoscopy. One of the most known methods of magnetic defectoscopy of method is a magnetic powder: the surface of the magnetized part is covered with magnetic powder (dry method) or magnetic slurry (wet method). When using fluorescent powders and suspensions, the images of the studied details show visible defects significantly better. Therefore, it is possible to automate the processing of images. The paper presents an automated procedure for selecting methods of image processing. The authors give an example of processing image of steel parts for detecting defects using the luminous lines that appeared after applying the magnetic slurry. The study uses the methods of the theory of image processing. These are mainly extraction methods for defining boundaries of objects and morphological image processing. The main result of an automated method is the opportunity to obtain expert information on the basis of which it is possible to make a conclusion about the presence of defects in the test product. In the example given in the article authors show that the lines are continuous and have no sharp change of direction. Therefore, the conclusion about the absence of discontinuities (defects) in the product is made. In addition, authors point out that the binary image can be inverted at the request of the researcher.
Korobeinikov A.G., Markina G.L., Aleksanin S.A., Akhapkina I.B., Bezruk N.V., Demina E.A., Yamshchikova N.V. —
Using the MAPLE system of computer algebra in studying the generation of systems of the ordinary differential equations
// Software systems and computational methods. – 2015. – ¹ 2.
– P. 139 - 144.
DOI: 10.7256/2454-0714.2015.2.14946
Read the article
Abstract: Nowadays the teachers while lecturing various courses on the ordinary differential equations often use program systems of symbolical mathematics or computer algebra, for example MAPLE well known for its efficiency. In the process of training in computer modeling, teacher often face a problem of designing a mathematical model of the studied process. Because the fundamental laws of nature are formulated as a rule in a language of the differential equations, there is a need to teach the students to design mathematical models. The authors present a solution of the problem of the automated generation of mathematical models on the using a systems of the ordinary differential equations based on Maple system. The paper presents an example of this solution. The given algorithm of generating systems of ordinary differential equations can be easily modified for a specific task. During the course on ordinary differential equations it is necessary to give students the tasks develop the algorithm by themselves. This allows students to develop a culture of logical thinking, which will properly establish cause and effect of physical processes and phenomena from the formal implementation of interdisciplinary connections and practical orientation of training. All of this will undoubtedly contribute to a better knowledge of the disciplines of applied mathematics and other subject areas.
Korobeinikov A.G., Grishentsev A.Y., Kutuzov I.M., Pirozhnikova O.I., Sokolov K.O., Litvinov D.Y. —
Developing of the mathematical and simulation models for calculation of an estimate of informatization object protection from unauthorized physical access
// Cybernetics and programming. – 2014. – ¹ 5.
– P. 14 - 25.
DOI: 10.7256/2306-4196.2014.5.12889
URL: https://en.e-notabene.ru/kp/article_12889.html
Read the article
Abstract: Methods and techniques allowing to calculate quantitative estimates of level of protection from unauthorized physical intrusion for different informatization objects using various means and protection systems are currently being intensively developed. Generally the quantitative evaluation of protection is represented by a set of probability characteristics, the predominant of which is some integral indicator. Therefore, developing mathematical and simulation models for calculating an estimate of informatization object protection from unauthorized physical access is an urgent task. This model then is used as a part of a complex system of information security. To solve this problem the article presented uses methods of information protection, graph theory and probability theory. The results shown in the article were calculated using Maple system of computer algebra. Scientific novelty of the work is: – in creating a mathematical model for calculation the probability of detecting of unauthorized physical access to information by an alarm system;
– in bulding of a simulation model for evaluation of level of protection of informatization object from unauthorized physical access;
– in developing of a technique of evaluation of full protection from unauthorized physical access for object of informatization
Labkovskaya R.Y., Kozlov A.S., Pirozhnikova O.I., Korobeinikov A.G. —
Modeling the dynamics of reed sensors of control systems
// Cybernetics and programming. – 2014. – ¹ 5.
– P. 70 - 77.
DOI: 10.7256/2306-4196.2014.5.13309
URL: https://en.e-notabene.ru/kp/article_13309.html
Read the article
Abstract: The article is devoted to developing of methods and algorithms of finding eigen values for analyzing dynamics and stability of reed sensors. Matrix-topological method, PC-oriented, uses a model with lumped parameters to describe the oscillatory processes of microsensors beam elements and reeds contact cores. Replacement of the system with distributed parameters with the equivalent model with lumped parameters is achieved by using the Rayleigh method. This method leads to considering a system with a higher hardness than original, thereby obtaining a higher frequency compared with the actual. The authors developed a matrix-topological model for frequency analysis of geometrically-complex and multilink reed sensors based on the switching to the system with lumped parameters using following methods: electromechanical analogies, method Rayleigh-Ritz method and graph theory. On the example of one of the three constructs of reeds oscillatory systems the authors compare theoretical results of calculation of reed sensors eigen frequencies, gathered using matrix-topological method with corresponding experimentally obtained values with piezoelectric and optical methods of the reed sensors frequency spectra analysis. The correctness of the frequency analysis was achieved using Fourier frequency filters.
Korobeinikov A.G., Pirozhnikova O.I. —
// Software systems and computational methods. – 2014. – ¹ 2.
– P. 160 - 165.
DOI: 10.7256/2454-0714.2014.2.12504
Read the article
Korobeinikov A.G., Ismagilov V.S., Kopytenko Y.A., Ptitsyna N.G. —
// Software systems and computational methods. – 2013. – ¹ 4.
– P. 384 - 396.
DOI: 10.7256/2454-0714.2013.4.10806
Read the article
Korobeinikov A.G., Grishentsev A.Y., Svyatkina M.N. —
Using intelligent agents for magnetic measurements for railway infrastructure monitoring
// Cybernetics and programming. – 2013. – ¹ 3.
– P. 9 - 20.
DOI: 10.7256/2306-4196.2013.3.8737
URL: https://en.e-notabene.ru/kp/article_8737.html
Read the article
Abstract: The paper proposes the use of the intelligent hybrid meta-agent for solving a problem of intellectualization management and information systems in rail transport. In order to ensure the safety and risk management for harmful natural and man-made situation in rail transport the authors propose to use intelligent software for management and informational support. The article reviews general structure of intelligent environment as hybrid cognitive agent consisting of four main parts. The main obstacles to the creation of intelligent monitoring systems are: lack of finance support, absence of knowledge base on pre-threshold facilities, nonexistence of specialized software and hardware. Modern sensor networks combined in multi-agent system where each individual sensor is a single agent, with its local knowledge base possess the necessary characteristics. Multi-agent system formed by multiple interacting intelligent agents can be used to solve these problems that are difficult or impossible to solve with a single agent. The article shows variants of construction of logical models of interaction between the sensors using the apparatus of multi-valued logic and bilattices.
Korobeinikov A.G., Kutuzov I.M. —
Obfuscation algorithm
// Cybernetics and programming. – 2013. – ¹ 3.
– P. 1 - 8.
DOI: 10.7256/2306-4196.2013.3.9356
URL: https://en.e-notabene.ru/kp/article_9356.html
Read the article
Abstract: The paper deals with the algorithm of Chenxi Wang’s, shows are the main disadvantages of this algorithm. The authors suggest the ways of modification to improve it. The algorithm of Chenxi Wang's is one of the most famous. The input data for the algorithm is the usual procedure, written in high level language. The authors describe the three stages of obfuscation of any such procedure. In the classic version of Chenxi Wang's the algorithm has poor stability. The authors suggest ways to improve stability of the algorithm, present modified version of the algorithm and reviews results of its implementation. The authors compare the source code and the resulting code and conclude that it is almost impossible to establish their functional identity and the logic of the program code is very difficult to understand using obfuscated source. Sometimes this can be done using the examples run of the resulting source code. This implies that after eliminating the shortcomings the algorithm is quite effective.
Korobeinikov A.G., Ismagilov V.S., Kopytenko Y.A., Petrishchev M.S. —
// Software systems and computational methods. – 2013. – ¹ 3.
– P. 11 - 11.
DOI: 10.7256/2454-0714.2013.3.10381
Read the article
Korobeinikov A.G., Ismagilov V.S., Kopytenko Y.A., Petrishchev M.S. —
The study of the geoelectric structure of the crust on the basis of the analysis of the phase velocities of ultra geomagnetic variations
// Cybernetics and programming. – 2013. – ¹ 2.
– P. 36 - 43.
DOI: 10.7256/2306-4196.2013.2.8736
URL: https://en.e-notabene.ru/kp/article_8736.html
Read the article
Abstract: This article presents the results of experimental studies of the geoelectric structure of the crust held in Karelia. For research the authors established 5 highly ternary magnetovariational stations GI-MTS-1 separated by 5-10 km apart. The frequency of data recording was 50 Hz. To analyze the changes in apparent resistivity with depth at all 5 locations the authors perofmed processing of input data by two methods - magnetotelluric and phase-gradient sensing. To determine the apparent resistivity in each of the magnetic stations authors determined the apparent magnetotelluric resistivity of the earth's crust and changes in the system of resistivity with depth. Preliminary processing results revealed a number of conductive layers in the earth's crust at depths of 2-3 and 15-20 km, probably related to the shungite-bearing horizons. Comparison of methods for the interpretation of magnetotelluric and phase gradient sensing has shown their good match.
Korobeinikov A.G., Leiman A.V., Blinov S.Y., Kuvshinov S.S. —
// Software systems and computational methods. – 2013. – ¹ 1.
DOI: 10.7256/2454-0714.2013.1.7162
Read the article
Korobeinikov A.G., Ismagilov V.S., Kopytenko Y.A., Ptitsyna N.G. —
// Software systems and computational methods. – 2012. – ¹ 12.
DOI: 10.7256/2454-0714.2012.12.6979
Read the article
Korobeinikov A.G., Leiman A.V., Blinov S.Y., Kuvshinov S.S. —
// Software systems and computational methods. – 2012. – ¹ 11.
DOI: 10.7256/2454-0714.2012.11.6761
Read the article
Korobeinikov A.G., Grishentsev A.Y. —
The increase in the rate of convergence of finite difference method based on the use of middleware solutions
// Cybernetics and programming. – 2012. – ¹ 2.
– P. 38 - 46.
DOI: 10.7256/2306-4196.2012.2.13864
URL: https://en.e-notabene.ru/kp/article_13864.html
Read the article
Abstract: To study the characteristics of the process of functioning of any system of mathematical methods, including the engine, should be carried out formalization of the process, ie. a mathematical model. By mathematical modeling we mean the process of establishing compliance with this real object of a mathematical object (mathematical model), and the study of the mathematical model, which allows to obtain characteristics of this real object. A type of a mathematical model depends both on the nature of the real object and tasks of the research and the required reliability and accuracy of the solution of this problem. Any mathematical model, like any other, describes the real object only with a certain degree of approximation to reality. This paper presents a method for calculating interim solution in n-dimensional problem with boundary conditions, contributing to the acceleration of the convergence process of a finite difference method. In the practical implementation of this method the number of iterations to achieve a given residual was reduced to 10 - 100 times, due to the search of the intermediate solutions. Thus, this method can be used to significantly improve the efficiency of a finite difference method.
Korobeinikov A.G., Gatchin Y.A., Dukel'skii K.V., Ter-Nersesyants E.V. —
Compatibility of borosilicate and fluorosilicate glass layers in the manufacture of optical fiber
// Cybernetics and programming. – 2012. – ¹ 2.
– P. 47 - 54.
DOI: 10.7256/2306-4196.2012.2.13865
URL: https://en.e-notabene.ru/kp/article_13865.html
Read the article
Abstract: Domestic manufacturers of optical fibers are facing the problem of acquisition of raw materials and reagents abroad, which becomes more and more acute - the price is rising, and customs procedures do not contribute to the revival of domestic production of optical fibers made of quartz glass. Consumption of fibers in Russia exceeds the 3.5 million km per year, while the consumption of 1 million km per year is a "critical point" after which is economically feasible to produce the optical fibers at its own factories. This situation has forced to go back to the establishment of the optical fiber production in Russia. Hence the importance of the finding a ways to manufacture quartz optical fiber with a minimum range of reagents used is hight. The solution of this problem is possible only on the basis of substantial modernization and simplification of technological process of manufacturing the optical fiber, so that on the basis of a limited number of domestic materials and reagents to produce fibers that are not inferior counterparts of leading foreign manufacturers of quality, but differ with advantageous cost.
Milushkov V.I., Gatchin Y.A. —
Using a binary search to optimize the query to retrieve data
// Cybernetics and programming. – 2012. – ¹ 2.
– P. 1 - 9.
DOI: 10.7256/2306-4196.2012.2.13867
URL: https://en.e-notabene.ru/kp/article_13867.html
Read the article
Abstract: With the increasing popularity of DBMS its use inevitably begins to demand more and more resources. The first time is possible (and, of course, necessary) to lower the load through optimization of algorithms and / or architecture of the application. However, what if anything that can be optimized is already optimized, and the application still cannot cope with the load? In this article the methods and ways to use binary search to optimize the query to retrieve data are reviewed. Authors giv an overview of php + MySQL and solved the problem of the transfering the queue from fields without indexes to tables with primary keys, which significantly speeds up the query and the database itself. Proposed solution greatly accelerates the search for the desired item by reducing the search range but at the same time sacrificing some accuracy computations. For statistical reasons it is not critical if a few elements of millions will not be taken into account. Otherwise, it is necessary to make and complete epsilon zero search only after reaching the last level of the tree.
Korobeinikov A.G., Kutuzov I.M., Kolesnikov P.Y. —
Analysis methods of obfuscation
// Cybernetics and programming. – 2012. – ¹ 1.
– P. 31 - 37.
DOI: 10.7256/2306-4196.2012.1.13858
URL: https://en.e-notabene.ru/kp/article_13858.html
Read the article
Abstract: Modern computer technology makes it a variety of tasks relevant to the field of information security. For example, for the protection of copyright in the images methods of steganography are used. To solve the problem of proving authorship (or vice versa) code obfuscation techniques are used. Obfuscation (from Lat. Obfuscare - obscure, obfuscate, and English. Obfuscate - make non-obvious, confusing, confusing) or obfuscated code - is the process of bringing the source code or executable program code to the form, that keeps its functionality, but complicates the analysis, understanding algorithms and modification during decompilation. Currently, there are special programs called obfuscators that performes obfuscation to solve the task in different ways. The article discusses the techniques of obfuscation from the most basic to sophisticated polymorphic generators obfuscators performing the mathematical transformation of the code, as well as the relationship of obfuscation and efficiency of program code execution and reduce the size of the program. The authors describe further development of obfuscation techniques.