Operating systems
Reference:
Pritykin, F.N. (2025). Using computer simulation of the hand movement of an anthropomorphic robot to determine the position of its base relative to objects of manipulation. Software systems and computational methods, 1, 1–12. https://doi.org/10.7256/2454-0714.2025.1.70232
Abstract:
The subject of the study is the use of an intelligent hand movement control system of an anthropomorphic robot when performing operations of placing objects of manipulation in a container of specified dimensions. The object of the study is the process of determining the parameters of the relative position of the base of the hand in relation to the objects of manipulation and the container, in which it is possible to perform motor tasks. The author examines in detail the algorithm for determining the position of the base of the arm of an anthropomorphic robot using the synthesis of movements along the velocity vector when solving the problem of installing manipulating objects specified in the form of rectangular prisms into a container. Special attention is paid in the article to the methodology of determining the center of the coordinate system associated with the base of the robot in a fixed space and calculating the target points to which the center of the output link moves at various positions of previously installed manipulation objects in the container. The essence of the method is to use computer simulation of the movement of an anthropomorphic robot using the synthesis of movements along the velocity vector with an assessment of the relative position of the arm mechanism and restricted areas. Previously installed manipulation objects located inside the container and the side walls of the container itself act as restricted areas. The main conclusions of the presented study are the possibility of using the developed algorithm to test the synthesis of hand movements with given geometric parameters that set the position of an anthropomorphic robot, conveyor and container, in which there is no occurrence of deadlocks. The novelty of the research consists in the development of a method based on an iterative search for the values of the parameters of the mutual position of the base of the arm, conveyor and container at each iteration in case of deadlock situations. The results of calculations of the position of the base of the robot arm and intermediate configurations constructed using computer simulation of movements based on the use of the developed algorithm are presented. The conducted research can be used in the development of information and control complexes of mobile objects, in particular in the development of intelligent control systems for autonomously functioning anthropomorphic robots in organized environments.
Keywords:
objects of manipulation, kinematic chain model, deadlocks, anthropomorphic robots, movement synthesis, computer modeling, geometric modeling, manipulator mechanisms, intelligent control systems, output link
Programming languages
Reference:
Makarov, I.S., Larin, D.V., Vorobeva , E.G., Emelin, D.P., Kartashov, D.A. (2025). The impact of asynchronous and multithreaded query processing models on the performance of server-side web applications. Software systems and computational methods, 1, 13–20. https://doi.org/10.7256/2454-0714.2025.1.73665
Abstract:
The object of the study is server-side web applications and their performance when processing a large number of simultaneous requests. Asynchronous technologies (Node.js, Python Asyncio, Go, Kotlin Coroutines) and multithreaded models (Java Threading, Python Threading). The authors analyze asynchronous event loops, goroutines, coroutines, and classical multithreaded approaches in detail, evaluating their effectiveness in tasks with intensive use of I/O and computing resources. An experiment is underway with API development in three languages (Java, Node.js, Go) and testing using the hey utility. It also explores the features of scalability, performance optimization, caching, error handling, load tests, and implementation features of parallel computing. The purpose of the study is to determine which approaches provide the highest performance in server applications. Research methods include load testing, collection of metrics (response time, bandwidth, and server resource consumption), and analysis of the results. The scientific novelty lies in comparing asynchronous and multithreaded methods in real-world web development scenarios. The main conclusions of the study are recommendations on the use of asynchronous technologies in high-load I/O tasks and multithreading in computationally complex scenarios. The results obtained will help developers optimize the performance of server applications depending on their tasks and workload. Additionally, the study examines aspects of the complexity of debugging asynchronous applications, the impact of thread pools on the performance of multithreaded solutions, as well as scenarios in which asynchronous and multithreaded approaches can complement each other. Special attention is paid to server resource management under scalable loads, which will allow IT specialists to more accurately select tools and technologies for solving specific tasks. In conclusion, possible ways to optimize the operation of server applications are discussed, including the use of new approaches and algorithms, as well as the prospects for the development of asynchronous and multithreaded technologies in the context of highly loaded systems, their impact on the overall application architecture, as well as on increasing fault tolerance and security.
Keywords:
Go goroutines, Python Asyncio, load testing, Node.js, server-side web applications, efficiency, Java Threading, multithreading, asynchrony, performance of server applications
Quality aspects and improving the margin of reliability of software systems
Reference:
Zolotukhina, D. (2025). Comparative analysis of indexing strategies in PostgreSQL under various load scenarios. Software systems and computational methods, 1, 21–31. https://doi.org/10.7256/2454-0714.2025.1.73138
Abstract:
The subject of the study is the effectiveness of various indexing strategies implemented in PostgreSQL and their impact on the performance of SELECT, UPDATE and INSERT operations in conditions of different data scales. The object of the study are the B-Tree, GIN and BRIN indexes used to optimize the operation of databases. The author examines in detail such aspects of the topic as the time characteristics of operations, the size of indexes and their resource intensity. Special attention is paid to the impact of data volume on the performance of indexes and their suitability for working with various types of data, including JSONB. The research is aimed at systematizing knowledge about the use of indexes to improve the efficiency of highly loaded systems, which require optimization of access operations, updating and inserting data, as well as analysis of resource consumption. The leading research method is an empirical approach, which includes the development of a test database with orders, customers, and products tables. Experiments were conducted for SELECT, UPDATE, and INSERT operations on small, medium, and large amounts of data. The metrics of query execution time and index size obtained using PostgreSQL tools were used for the analysis. The novelty of the research lies in conducting a comprehensive performance analysis of the B-Tree, GIN, and BRIN indexes in PostgreSQL when performing typical operations on various amounts of data. The main conclusions of the conducted research are recommendations on the choice of indexes depending on the types of queries and their execution conditions. B-Tree indexes have proven their versatility, demonstrating high performance for SELECT and UPDATE operations. GIN indexes have shown advantages for working with JSONB data, but their use is limited by high resource intensity. BRIN indexes have proven to be effective for large amounts of data, especially for SELECT operations, due to their compactness and low overhead. A special contribution of the author to the research of the topic is the creation of recommendations for database developers, which makes it possible to improve application performance by choosing an optimal indexing strategy.
Keywords:
data management, high-load systems, JSONB data, relational databases, PostgreSQL performance, query optimization, GIN indexes, B-Tree indexes, BRIN indexes, indexing strategies
Quality aspects and improving the margin of reliability of software systems
Reference:
Makarov, K.S., Fatkin, R.I. (2025). Screenshot testing as a multi-aspect type of automated dynamic verification for web applications. Software systems and computational methods, 1, 32–54. https://doi.org/10.7256/2454-0714.2025.1.73535
Abstract:
The subject of this study is multi-aspect screenshot testing as a modern method of automated dynamic verification of web applications, combining functional testing and user interface (UI) validation. Contemporary testing methods face challenges such as high labor intensity, false positives, and low scalability, especially in complex projects. The main objective of the research is to develop and implement a method that improves defect detection accuracy, reduces testing time, and lowers test case development costs. The study explores image comparison algorithms, dynamic element filtering techniques, and automated UI analysis approaches to enhance efficiency and standardization in the web application verification process. Unlike functional and UI testing conducted separately, the proposed method enables simultaneous analysis of multiple aspects of the interface and functionality, minimizing labor costs and increasing testing reliability. The approach employs automated comparison of reference and test screenshots at the pixel, structural element, and content levels using Python, Selenium, PIL, and Pytest-xdist for parallel test execution, effectively addressing the challenges of web application verification. Some researchers in the field of testing agree that the testing process lacks standardization and clear evaluation criteria. The proposed method ensures the achievement of verification objectives even under evolving strategies and approaches to system performance assessment by creating a flexible and precise validation system that integrates various testing types into a unified structure, making it suitable for modern software development challenges. The experimental section demonstrates the advantages of multi-aspect screenshot testing over other methods, including reduced testing time, improved defect detection accuracy, and enhanced analysis of test reports. This approach can be adapted to various testing scenarios and is particularly beneficial for high-load projects requiring regular regression testing.
Keywords:
testing criteria, testing optimization, UI testing, Selenium and PIL, Python in testing, dynamic verification web applications, multi-aspect screenshot testing, automated testing, screenshot testing, verification tasks
Systems analysis , search, analysis and information filtering
Reference:
Sergeev , D.A., Rodionov, D.G., Polyakov , P.A., Golikov , G.I., Starchenkova , O.D., Dmitriev , N.D., Konnikov , E.A. (2025). Intelligent Monitoring and Route Adaptation System for Drones based on Neural Network Risk Analysis. Software systems and computational methods, 1, 55–70. https://doi.org/10.7256/2454-0714.2025.1.73255
Abstract:
The study examines an intelligent monitoring and route adaptation system for unmanned aerial vehicles (Drones) based on neural network risk analysis. The research considers autonomous navigation algorithms that enable environmental analysis and real-time trajectory correction in response to potential threats. The possibilities of applying computer vision, neural network algorithms, data preprocessing methods, object detection, semantic segmentation, trajectory planning algorithms, predictive control, and adaptive route optimization are assessed for identifying obstacles, moving objects, and restricted flight zones. The role of intelligent control systems for drones is analyzed, along with their impact on enhancing autonomy, resilience, and operational efficiency in dynamically changing environments. The proposed solutions are aimed at risk mitigation associated with emergency situations through the implementation of adaptive flight control strategies. The study employs methods of systems analysis, computer vision, and machine learning, including convolutional neural networks, image preprocessing algorithms, data filtering and segmentation, as well as sensor data analysis. The effectiveness assessment is carried out through trajectory modeling, testing of threat identification algorithms, and analysis of UAV route stability parameters. The scientific novelty lies in the development of an integrated system for intelligent UAV route correction based on neural network object classification methods and adaptive trajectory planning algorithms. Mechanisms for predictive risk analysis have been developed, ensuring automatic route adjustment upon detecting obstacles, adverse weather conditions, and restricted-access zones. The proposed control architecture integrates computer vision technologies, data stream analysis, and automated decision-making while using dynamic routing methods, real-time flight correction algorithms, and collision avoidance strategies. This approach enhances the level of UAV autonomy. The developed intelligent navigation algorithms can be implemented in modern autonomous UAV control systems, enabling adaptation to dynamic conditions and increasing the efficiency of task execution across various domains, including defense and industrial applications.
Keywords:
Unmanned Aerial Vehicles, Route Optimization, Threat Prevention, Autonomous Navigation, Deep Learning, Computer Vision, Neural Network Analysis, Intelligent Control, Decision-Making System, Adaptive Algorithms
Systems analysis , search, analysis and information filtering
Reference:
Savelieva, Y.O., Il'in, A.V., Luk'yanov, A.A., Milihina, K.M. (2025). Development of an Application for Design Automation in KOMPAS-3D: Quality Control Table for Base Metal. Software systems and computational methods, 1, 71–91. https://doi.org/10.7256/2454-0714.2025.1.73073
Abstract:
The complexity of compiling quality control tables for base metal TB1 in order to design nuclear power products arises from the necessity to take into account a plenty of requirements from various sources (which may overlap or complement each other): for example, standards such as industry standards (IS/OST), building codes (BC/SNiP), technical specifications, customer requirements, internal rules for their completion, and other regulatory documents. Incorrectly prepared documents submitted to an authorized quality control organization (an entity authorized to conduct conformity assessment in the form of acceptance testing of products intended for use in components of nuclear energy facilities in the Russian Federation) result in financial and time losses for the developer, as well as difficulties in further product acceptance. This paper discloses the development process of a user application (library) that enables the automatic generation and construction of a quality control table for base metal TB1 on the basis of a drawing document in KOMPAS-3D. The application code (library) for KOMPAS-3D CAD is developed using Delphi, and it implements automated generation of tables TB1 necessary in designing equipment for the nuclear energy sector. One of the key characteristics of a modern engineering simulation system is the ability to integrate automation, for instance, by using subsystems to expand the software package's capabilities, such as user applications (custom programming libraries). This paper formulates the main requirements for the functionality of the user application (library) for KOMPAS-3D. The application code enables reading data from an assembly file opened in KOMPAS-3D, creating a new drawing document, generating a table according to TB1 requirements, and filling it with data from the assembly document.
Keywords:
design library creation tools, Delphi, design automation, software library, custom library, TB1, KOMPAS-3D, application, base metal, quality control table
Computer graphics, image processing and pattern recognition
Reference:
Pletneva, A.O., Yanchus, V.E. (2025). Development of a methodology for testing a mobile application based on eye-tracking technology. Software systems and computational methods, 1, 92–105. https://doi.org/10.7256/2454-0714.2025.1.69889
Abstract:
A mobile phone is used every day for various tasks, for example, for mobile communication, for communicating on social networks, for obtaining information from the Internet, as well as for mobile applications. A smartphone is a small device that contains a lot of information that needs to be processed and analyzed in order for the user to achieve the goal. From a design point of view, to evaluate a mobile application, this work identified 4 factors influencing the perception of information in a mobile application: color scheme, compositional solution, font and the number of letters in control words. An experiment was developed that was carried out using eye-tracking technology in a special software module. It includes 72 stimuli and 1 set task that participants in the experiment must solve. The experiment demonstrated that its participants solved the problem fastest in blue-orange and white-black color combinations of stimulus material, and also the fastest in solving problems with large elements of the compositional solution. An interesting observation is that long words were perceived by the subjects faster than short ones. This study showed that the developed methodology can be used for testing mobile applications. The testing was successful, recommendations were identified that can help in developing a mobile application: light and dark themes in which different fonts will be displayed: light theme – sans-serif font, dark theme – serif font; mobile application elements in black and white and blue and orange color combinations; long words in mobile application elements and large square tiles located on the screens of the mobile application. The technique showed results that require additional, more in-depth research.
Keywords:
Color solution, Peripheral vision, Central vision, Saccade, Fixations, Eye-tracking technology, Compositional solution, Mobile application, Font, Control words