115 results
Search Results
2. Formatting requirements for papers
- Author
-
artiсle Editorial
- Subjects
Technology - Published
- 2023
- Full Text
- View/download PDF
3. Formatting requirements for papers
- Author
-
article Editorial
- Subjects
Technology - Published
- 2022
- Full Text
- View/download PDF
4. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
article Editorial
- Subjects
Technology - Published
- 2021
5. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
article Editorial
- Subjects
Technology - Published
- 2020
6. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
artiсle Editorial
- Subjects
Technology - Published
- 2019
7. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
article Editorial
- Subjects
Technology - Published
- 2019
8. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
article Editorial
- Subjects
Technology - Published
- 2019
9. FORMATTING REQUIREMENTS FOR PAPERS
- Author
-
article Editorial
- Subjects
Technology - Published
- 2019
10. Comparison of methods for modeling the gas-dynamic characteristics of high-pressure centrifugal compressors that ensure the operation of field low-temperature separation units using the example of a modification with a pressure ratio of up to 1.9...2.1
- Author
-
M. A. Vorontsov, V. Yu. Glazunov, A. S. Grachev, M. S. Mashtalir, S. A. Pospelov, and A. V. Chernyshev
- Subjects
compressor station ,gas compressor units ,centrifugal compressors ,high-pressure centrifugal compressors ,mathematical modelling of centrifugal compressors ,reduced characteristic method ,refined reduced characteristic method ,low-temperature separation units ,Technology - Abstract
Objective. Currently, for the development of Valanginian and other deeplying (compared to the Cenomanian) deposits, low-temperature separation (LTS) units with turboexpander units (TDA) are used, and the booster compressor station (BCS) is one of the key technological facilities necessary to ensure the efficient operation of promising technologies for gas preparation using the NTS method with TDA turboexpander units for transport. The purpose of the study is to substantiate optimal operating modes, as well as to develop measures for the technological development of a booster compressor station based on the use of methods for modeling the operation of centrifugal compressors, gas pumping units and, directly, the booster compressor station. Method. The following methods were used: the method of reduced characteristics, the refined method of reduced characteristics, and the two-dimensional approximation method. The basis of the mathematical model of the research objects is the gas-dynamic characteristics of centrifugal compressors. Result. The results of a comparison of methods for modeling HDC (reduced characteristics method, refined method of reduced characteristics, two-parameter approximation method) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 1.9...2.1, intended for equipping gas compressor units with a unit power of 16.0 MW as part of field operations. DKS. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. The accuracy of the mathematical model of the GDC PPM as part of the field booster compressor stations that ensure the operation of NTS installations with TDA determines the accuracy of the assessment of energy consumption and the technical condition of the gas pumping units, as well as calculations of future operating modes of gas pumping equipment, which are carried out to solve a number of applied problems, including determining the timing of equipment modernization or reconstruction of the station.
- Published
- 2024
- Full Text
- View/download PDF
11. Detection of «Telegram Rat» virus
- Author
-
A. I. Dubrovina and M. H. Alkordi
- Subjects
«telegram rat» ,cyber threats ,information security ,Technology - Abstract
Objective. The aim of this study is to analyze the «Telegram Rat» virus, emphasizing the importance of awareness to effectively combat cyber threats and ensure security in the digital age.Methods. This paper used an analysis of the characteristics and distribution of «Telegram Rat» viruses. An example of analyzing the technical mechanisms of extortion on the example of «WAGNER GROUP» was given and the steps of virus elimination were formulated.Results. The acuality of the «Telegram Rat» virus problem and ways of its transmission are considered. Practical methods of threat detection and neutralization are stipulated. The method of «Telegram Rat» virus threat detection is based on the analysis of active processes, network activity and file system. It is revealed that the main vulnerability on devices infected with the virus is careless user behavior.Conclusion. The contents of this paper emphasize the importance of vigilance when downloading files and clicking on links. Lack of caution can lead to data loss and information leakage, emphasizing the need for conscious behavior in the digital environment.
- Published
- 2024
- Full Text
- View/download PDF
12. Analysis of methods for modeling operating modes of compressor equipment that ensures the operation of field low-temperature separation units
- Author
-
M. A. Vorontsov, V. Yu. Glazunov, A. S. Grachev, M. S. Mashtalir, S. A. Pospelov, and A. V. Chernyshev
- Subjects
high-pressure centrifugal compressors ,modeling of centrifugal compressors ,reduced characteristics method ,low-temperature separation units ,Technology - Abstract
Objective. A booster compressor station (BCS) is one of the key technological facilities necessary to ensure the effective operation of low-temperature separation technology for natural gas in field gas preparation systems for transportation. Ensuring promising operating modes of booster compressor stations with high efficiency is an urgent task. Method. One of the tools for solving this problem is mathematical modeling of the operating modes of centrifugal compressors (hereinafter - CPC), which are part of gas pumping units (GPU). The basis of the mathematical model is the gas dynamic characteristic (GDC) of the pulp and paper mill. The existing regulatory documentation presents simplified methods for modeling HDC, which are suitable for low-pressure pulp and paper mills with a pressure ratio of up to 1.5 and the number of compression stages of no more than three, but are not suitable for multi-stage high-pressure pulp and paper mills. Result. The results of a comparison of three methods of modeling the hydrodynamic characteristics (method of reduced characteristics, refined method of reduced characteristics, method of two-parameter approximation) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 2.0, intended for equipping a gas pumping unit as part of field booster compressor stations. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. When using the UMPH-2D modeling method, the smallest errors were obtained (no more than 2.0%), which, in turn, indicates its highest accuracy among the considered methods for recalculating the gas flow characteristics of high-pressure and multi-stage compressors.
- Published
- 2024
- Full Text
- View/download PDF
13. Investigation of the Effectiveness of Programs Optimization Methods for Parallel Computing Systems with GPU
- Author
-
A. Yu. Bezruchenko and V. A. Egunov
- Subjects
program efficiency ,efficiency evaluation ,performance ,multithreading ,svd ,cuda ,gpgpu ,nvidia ,unified memory ,Technology - Abstract
Objective. The paper defines the relevance of the task of increasing the efficiency of software, which in this case is understood as reducing the operating time of the designed software in the process of solving computationally complex problems. Method. As an example of such a task, the implementation of the singular value decomposition by the Jacobi method is used. This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. The paper discusses methods for improving the efficiency of software for target computing architectures using CUDA. Result. The existing analytical models for evaluating the effectiveness of computer programs are described. The influence of various optimizations, such as optimization of data transfers, use of the unified memory system, the number of threads, memory access patterns, and a number of others on the efficiency of the resulting software is considered. The process of optimizing the SVD implementation program is described, the results of computational experiments are presented. Conclusion. As the number of threads increases, performance may increase more than the number of threads. Impact of memory access pattern: When the memory access sequence is optimal, performance improves noticeably. Adjusting the share of memory used for L1 cache and shared memory does not have a significant impact on performance
- Published
- 2024
- Full Text
- View/download PDF
14. Problems of risk management in the field of information security
- Author
-
G. M. Artamonov, V. V. Maslov, and S. A. Reznichenko
- Subjects
information security ,business information security ,isms ,risk-based approach ,management problems ,Technology - Abstract
Objective. The purpose of the study is to collect publicly available information to identify the main problems that hinder the effective management of information security risks in the business sector.Method. The following research methods are used: systematization, description and analysis. The necessary data are formed on the basis of information obtained from the analysis of the regulatory framework and research in the field.Result. In this paper, the relevance of the issue under consideration was substantiated; the significant effectiveness of the risk-based approach in information security management was noted. The key stages of the information security risk management process were described. Next, the main problems of information security risk management for all stages of the holistic process are identified.Conclusion. The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research on the topic, as well as for the formation of recommendations for resolving the identified problems.
- Published
- 2023
- Full Text
- View/download PDF
15. On models of ground vibrations in strong earthquakes
- Author
-
H. R. Zainulabidova, U. Dz. Toturbieva, and A. M. Jamaludinov
- Subjects
earthquakes ,impact model ,approximation ,envelope ,frequency ,duration of earthquakes ,seismic properties ,Technology - Abstract
Objective. The purpose of these studies is to determine, on the basis of the developed models describing seismic impacts, the most acceptable for acceptance from the point of view of the accuracy of the description of the seismic oscillation both in the shape of the envelope and in duration and frequency characteristics.Method. The use of empirical models in describing soil fluctuations as a random process has been considered in a number of papers. This paper presents the main simplifying assumptions used in this approach. The validity of empirical models and some difficulties encountered in modeling the oscillation process are investigated.Result. A methodology for assessing the reliability of the proposed impact models is proposed. The proposed method takes into account the soil - geological characteristics, as well as spectral data of instrumental recordings of known earthquakes.Conclusion. The seismic impact model, as well as the approximating modeling function, should be determined by the degree of responsibility of the building.
- Published
- 2023
- Full Text
- View/download PDF
16. Threats to information security of state corporations of the Russian Federation
- Author
-
I. A. Loskutov and S. A. Reznichenko
- Subjects
information security ,is ,state corporations ,threats ,computer attacks ,Technology - Abstract
Objectives. Structuring of publicly available information to identify the distinctive features inherent in state corporations of the Russian Federation and to describe the threats arising as a result of their continuous operation.Method. The following methods of scientific cognition are used: systematization, description, analysis, deduction. The characteristics of state corporations are formed on the basis of data obtained both from the regulatory framework and by means of analysis of modern research in the field. In the future, the systematization of knowledge about the threats of state corporations is carried out, the most common classifications are considered, the increasing activity of intruders regarding critical information infrastructure objects is noted, and possible consequences for the state corporation after a successful computer attack on them are noted.Result. In this paper, a study was conducted on a little–covered area in the scientific literature - the protection of Russian state corporations. A comprehensive analysis made it possible to characterize the object of research in detail, thereby specifying the significant aspects of its functioning. Next, the most significant threats of Russian state corporations were shown, the importance of ensuring information security was noted and 15 factor influences of a successful cyberattack were shown.Conclusions. The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research in the direction, as well as the formation of principles of protection against the mentioned threats.
- Published
- 2022
- Full Text
- View/download PDF
17. Detection of phishing portals through machine learning algorithms
- Author
-
E. A. Trushnikov
- Subjects
phishing ,machine learning ,neural networks ,portal analysis ,Technology - Abstract
Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. Method. Systematization of disparate information, analysis of the field, description of available developments are the main methods that were used in the study. The work is divided into three large sub-blocks. The first one analyzes the concept of machine learning, describes the main ways to correctly interpret the information entered, indicates the most popular techniques and databases. In the second part of the work, an analysis of artificial neural networks is carried out. In particular, their subspecies are shown with a description of the implementation features, and a comparison with living neurons is carried out. In the third part, the practical implementation of the two techniques and their comparison are carried out, recommendations are given regarding their use in detecting phishing portals. Result. The paper investigates the methods of analyzing phishing portals. The analysis showed that it is most rational to use a random forest, because it provides quality according to the precession, recall, F1-score, 98% metrics with a significant number of parametric values entered. Conclusions. When implementing various search methodologies for phishing portals, it is necessary to take into account their decrease in efficiency from the entered parameters. To do this, it is important to conduct preliminary tests. However, the test result can be interpreted in different ways. In particular, the effectiveness of the methods can be improved if you limit the number of input parameters, but at the same time rigidly structured according to one search criterion.
- Published
- 2024
- Full Text
- View/download PDF
18. Data caching technologies in modern microprocessors
- Author
-
V. A. Egunov and V. A. Shabalovsky
- Subjects
cache memory ,optimization ,software efficiency ,cache miss ,cache hit ,associativity of cache memory ,Technology - Abstract
Objective. The study presented in the paper is aimed at studying the methods for improving the efficiency of software in modern computing systems with a hierarchical memory structure. Method. The study is based on data caching technologies in microprocessors. Result. The article presents the results of the analysis of various approaches to the development of efficient software taking into account the characteristics of the memory subsystem of the computing system, which made it possible to prove the importance of cache memory in improving the performance and interaction of computer components. Conclusion. Cache memory is a critical element in the architecture of microprocessors, playing a key role in determining the performance of the computing system. Optimizing the use of cache can significantly improve data access time and, as a result, overall system performance. Software developers need to pay special attention to the characteristics of the memory subsystem when designing and implementing solutions.
- Published
- 2024
- Full Text
- View/download PDF
19. Analysis of the main approaches to modeling management processes for special-purpose organizational and technical systems
- Author
-
A. F. Salnikov, K. V. Ivanova, and N. A. Merkulova
- Subjects
spectral resolution ,modeling ,frame filtering ,video stream ,process ,analysis ,Technology - Abstract
Objective. Currently, the task of increasing the spectral solvability of a video stream using modern frame filtering methods is urgent. Various methods of frame filtering are considered and analyzed in the work, and their detailed comparative analysis is carried out. The obtained data contribute to the further development of various materials to increase the spectral resolution of the video stream. Method. A large number of different approaches have been developed in the scientific literature to increase the spectral resolution of a video stream using modern frame filtering methods, and the most basic ones are analyzed in this paper: linear spatial filtering; nonlinear spatial filtering; spatial frequency filtering; filtering using Fourier analysis; filtering based on wavelet analysis. Result. A preliminary systematization of the characteristics of the methods under consideration has been carried out in order to develop new algorithms and implement them to improve image quality, increase detail and clarity of the video stream; various frame filtering methods have been analyzed, contributing to an increase in the spectral resolution of the video stream, and their impact on the quality of video content has been considered; during the analysis, it was found that in order to increase the spectral solvability of the video stream, it is necessary to use a combined filter. The above facts will allow us to further develop methodological recommendations for increasing the spectral solvability of the video stream. Conclusion. The considered approaches to increasing the spectral resolution of a video stream using modern frame filtering methods are preferable when increasing the spectral resolution of images, since they use all the positive aspects of linear, nonlinear and spatial frequency filtering.
- Published
- 2024
- Full Text
- View/download PDF
20. Quality of tracking methods with object reidentification
- Author
-
N. A. Maltceva, A. A. Polozov, N. V. Papulovskaya, and S. L. Goldshtein
- Subjects
analysis ,datasets ,fps indicators ,reidentification ,tracking ,Technology - Abstract
Objective. This paper presents a study of object tracking algorithms for analyzing sports competitions with a minimum permissible number of frames per second without critical loss of quality of operational systems. The purpose of the study is to determine the optimal tracking method and reidentification model with an increase in the time interval between frames. Method. The study used the Re-Identification MSMT17, Market1501, DukeMTMCreID datasets; specialized neural networks OsNet, ResNet and MobileNet. Tracking algorithms BotSort, Bytetrack, OcSort, DeepOcSort, StrongSort. The NOTA and IDF1 quality metrics were used. Result. The metrics of the experiments are generally quite low, which is due to the nonlinearity of athletes' movement, unlike pedestrians' movement, and a large number of changes in their posture. Conclusion. Depending on the degree of information compression, the optimal tracking methods when using pre-trained reidentification models are ByteTrack and OcSort.
- Published
- 2024
- Full Text
- View/download PDF
21. Optimization of seismic insulation parameters of frame buildings using adaptive methods
- Author
-
H. R. Zainulabidova
- Subjects
frame buildings ,frame ,flexible connections ,disconnecting connections ,periods of oscillation ,seismic effects ,Technology - Abstract
Objective. The purpose of the work is to calculate frame buildings with flexible connections and with flexible and switch-off connections, to make recommendations for the use of seismic insulation methods depending on the characteristics of seismic events. Method. Development of an algorithm for calculating frame buildings of a frame structural system with seismic protection in buildings with flexible connections and with flexible and switchable connections Result. A method for calculating frame buildings of a frame structural system with seismic insulation in the form of flexible connections and flexible and switchable connections has been developed. A computer calculation program for seismically insulated and nonseismically insulated frame buildings in the Delphi 5.0 programming environment in the Object Pascal language using the Runge-Kutta numerical method of the 4th order for solving differential equations has been compiled Conclusion. It is determined that the construction of frame buildings with the seismic insulation methods considered in this paper, namely with flexible connections and with flexible connections and disconnecting connections, is not impractical for territories where long-period fluctuations are possible, due to the fact that excessively high deformations occur.
- Published
- 2024
- Full Text
- View/download PDF
22. Algorithm of fire detection for multi-sensor system
- Author
-
R. A. Bagutdinov and M. F. Stepanov
- Subjects
image processing ,fire detection ,image segmentation ,multi-agent multisensor system ,Technology - Abstract
Objective. The paper proposes a fire detection algorithm for a multisensor system. Due to the difficult conditions in the field, for the first time, watch rescue operations are difficult and often endanger the lives of rescuers. The main scientific goal is for the system to work autonomously on certain segments of the monitoring process, while the three agents, to varying degrees, must interact with each other based on communication and decision-making algorithms.Method. There are many algorithms for image processing, but algorithms that use several sources of information are not sufficiently developed and described. The focus is on fire detection algorithms. The algorithm was developed using NI Vision Assistant, a software tool for rapid prototyping and testing of imaging applications.Result. In addition to the software implementation in C, which NI Vision Assistant generates by default, the paper presents a Python implementation of the algorithm.Conclusion. The results of the work can be used to develop multisensor systems for monitoring hard-to-reach areas.
- Published
- 2021
- Full Text
- View/download PDF
23. Mathematical modelling of ultrasonic treatment of asphaltene deposits
- Author
-
R. A. Khuramshina and V. V. Sokolova
- Subjects
mathematical modeling ,ultrasound ,ultrasonic installation ,oil ,asphalt-resinous paraffin deposits ,pumping equipment ,well ,reservoir ,oil pipeline ,secondary raw materials ,Technology - Abstract
Objective. The removal of asphaltene deposits at oil and gas facilities is one of the urgent and important problems and requires significant material and labor costs. It is possible to reduce costs by creating and implementing effective technical means, which requires an in-depth study of the processes of organic matter deposition at oil and gas facilities and their use as a secondary raw material. Methods. This paper discusses modern views on the state of the problem of asphaltene deposits in oil shipping and storage equipment and possible ways to solve it. The paper provides an overview of various ways to clean shipping and storage objects from asphaltene deposits: chemical (adding additives, solvents), thermal (heating by special devices or injection of superheated steam during exploitation), mechanical (using scrapers and pistons), and refers, among other things, to scientific works on the use of ultrasound to accelerate the removal of deposits. Results. The paper considers methods for removing deposits, as well as using the positive effect of the removed layer as a secondary energy source. A procedure for model calculation of the use of ultrasonic equipment to remove deposits has been developed. As a result, the deposit melting front velocity was determined depending on the duration of exposure. Conclusion. Taking into account the positive world experience, the level of development of the ultrasonic method for removing asphaltene deposits in the oil and gas industry and the use of asphaltene deposits as a secondary raw material, this area needs further development. The widespread implementation of equipment and, from the standpoint of rational use of natural resources, the use of deposits as a secondary raw material will increase cost efficiency and equipment efficiency, and reduce environmental impact.
- Published
- 2021
- Full Text
- View/download PDF
24. Methods for assessing the efficiency of access control subsystems at informatization facilities of internal affairs bodies and aspects of their improvement
- Author
-
A. V. Batskikh, V. V. Konobeevskikh, and S. V. Efimov
- Subjects
automated system ,information security system ,access control subsystem ,unauthorized access ,efficiency indicator ,efficiency quantification ,Technology - Abstract
Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation on information security of automated systems, guidelines and orders of the Federal Service for Technical and Expert Control of Russia, as well as departmental orders, instructions and regulations on information security at informatization facilities of internal affairs bodies. The analysis results in identifying the advantages and disadvantages of the specified methodology, as well as the possibilities of its use when conducting a quantitative assessment of the efficiency of access control subsystems of information security systems at the informatization facilities of internal affairs bodies. Methods. To achieve this goal, the method for system analysis of approaches used to assess the efficiency of information security tools and systems has been applied. Results. The paper presents results of analysing the main approaches used to assess the efficiency of tools and systems for information security of automated systems. The paper determines the relationship between the efficiency indicator of access control subsystems of information security systems and the main disadvantage of their use in protected automated systems of internal affairs bodies. The paper substantiates main directions of improving the existing methodology, proposes methods and indicators for quantifying the efficiency of access control subsystems (including those modified on the basis of using new information and communication technologies) of information security systems in protected automated systems of internal affairs bodies. Conclusion. The results obtained can be used to quantify the security level of existing automated systems and those being developed at informatization facilities of internal affairs bodies.
- Published
- 2021
- Full Text
- View/download PDF
25. Assessing thermal properties of enclosing structures of construction facilities by analysis of thermograms
- Author
-
D. F. Karpov and M. V. Pavlov
- Subjects
thermal properties ,enclosing structure ,capital and completed construction facilities ,engineering systems ,thermal control ,thermal imaging ,thermogram ,thermal image ,qualitative and quantitative analysis ,Technology - Abstract
Objective. One of the most effective ways to assess thermal protection of construction facilities of various applications is thermal control. Methods. According to the national standard “Method for thermal imaging quality control of thermal insulation of enclosing structures” in force on the Russian Federation territory, the results of thermal imaging monitoring of capital and completed construction facilities are divided into qualitative and quantitative depending on set goals and objectives. Qualitative assessment involves computer processing and visual interpretation of thermograms using specialized software. Quantitative analysis of thermograms involves determining and numerically comparing parameters of reference areas and characteristics of defects detected in an object being under thermal control. Results. The paper describes particular characteristics and results of qualitative and quantitative analysis of thermograms (thermal images) obtained via thermography of fragments of external enclosing structures of a completed construction facility—an apartment building. The paper analyses existing methods of a quantitative assessment of thermograms described in regulatory documents and methodological recommendations, and presents specific examples of their application. Conclusion. Thermal imaging diagnostics makes it possible to qualitatively and quantitatively assess the level of thermal protection of the outer shell of an object under control by “decoding” thermograms and comparing calculated parameters with standard indicators.
- Published
- 2021
- Full Text
- View/download PDF
26. Development and optimization of a bot in Telegram for effective task management in the enterprise
- Author
-
V. A. Vaskin, S. D. Shibaikin, and V. V. Nikulin
- Subjects
databases ,bot ,application ,design ,optimization ,management ,Technology - Abstract
Objective. The purpose of the research is to develop and implement a Telegram bot for effective task management using the functionality of the Telegram API. Method. The study is based on database design techniques. Result.The paper describes the process of developing and optimizing a Telegram bot for effective task management. As part of the research, an application was developed, implemented in Python using the Telegram API and using the PostgreSQL DBMS to store data as part of the workflow. The system is designed to optimize the workflow, manage tasks in the system and delegate them to users. A database has been designed, where the structure and relationships between data are defined, ensuring efficient storage and access to information, taking into account the needs of the application. Conclusion.The phased implementation of functionality, from task management, user notification systems, to data processing and analysis, allows us to obtain a fully functional system with a wide range of capabilities. To clarify the functions and capabilities of the bot, a demonstration of the application was carried out, reflecting the functionality of the system.
- Published
- 2024
- Full Text
- View/download PDF
27. Equilibrium internal fractures in elastic bodies supported by thin flexible coatings
- Author
-
B. V. Sobol, E. V. Rashidova, P. V. Vasiliev, and A. I. Novikova
- Subjects
fracture ,infinite flexible wedge ,elastic ring ,thin coating ,trigonometric series ,integral mellin transform ,discontinuous solutions method ,stress intensity ratio ,influence factor ,collocation method ,Technology - Abstract
Objective. In this paper, the authors study problems of a plane strain of elastic bodies containing internal rectilinear fractures. In each case, the margins of the considered areas are supported by thin flexible coatings. The first part of the paper is devoted to the problem of an infinite elastic wedge, the faces of which are free from the outside and reinforced with a thin flexible material, and the bisector contains a rectilinear fracture with regular forces applied to the margins, and to the study of the stress concentration at the fracture vertices. In the second part of the paper, the authors consider the problem of an equilibrium radial internal fracture in the cross-section of a round pipe. The inner surface of the pipe experiences hydrostatic pressure; the outer surface is reinforced with a thin flexible coating. The purpose of the study in each of the presented tasks is to determine the values of the influence factor. Methods. Both problems are united by a single approach, in which the presence of a coating is modeled mathematically, using special marginal conditions obtained based on an asymptotic analysis of the exact solution for a strip or ring flexible coating of small relative thickness. In the first issue, the singular integral equation is derived using the Mellin transform, which allows proceeding to the solution of a system of ordinary differential equations and obtaining a singular integral equation relative to the derivative of the discontinuity function of the first kind with a Cauchy kernel. In the second issue, discontinuous solutions are constructed using the Fourier series, resulting in a singular integral equation of a similar structure. Previously, similar ideas were successfully implemented by the authors in the study of the problem of the equilibrium state of a strip with a coating weakened by an internal transverse fracture under arbitrary conditions on the lower edge of the strip. Conclusion. Singular integral equations for the considered problems are obtained. The collocation method is used to construct solutions of singular integral equations for various combinations of geometric and physical characteristics of issues. In all the considered cases, the values of the influence factor were calculated. The analysis of changes in the influence factor depending on various combinations of geometric parameters and mechanical characteristics of problems is carried out. It is noted that with increasing rigidity of the coating and increasing its thickness, the values of the influence factor decrease; the increase in the value of the influence factor is provided by approaching the fracture to the body margin and increasing its relative length.
- Published
- 2020
- Full Text
- View/download PDF
28. Investigation of the dependencies of the Vivaldi antenna with a resonator in the electrodynamic modeling software complex
- Author
-
T. G. Aslanov and S. A. Ibragimov
- Subjects
vivaldi antenna ,curve radius ,conductive plates ,strips ,mathematical model ,resonator ,radiation pattern ,voltage standing wave ratio ,Technology - Abstract
Objective. The goal of the study is to optimize a computer model of a Vivaldi antenna with conductive plates on the same side as the resonator.Method. The study is based on electrodynamic modeling methods.Result.The paper presents a computer model of a Vivaldi antenna with conductive plates on one side with a resonator. A comparative analysis of two types of Vivaldi antennas was carried out of the dependence of the beam width and the voltage standing wave ratio on the radius of the current-conducting plate curve in the form of lobes and the values of the opening in two planes θ = 900 (the plane of the antenna's opening) and φ = 00 (the plane perpendicular to the antenna's opening plane) in the frequency range from 3 to 24 GHz. The influence of the shape, size and position of the resonator on the SWR value and the width of the antenna radiation pattern was determined. VSWR values are given for different shapes and sizes of the resonator. The main parameters of the resonator have been identified, which affect the characteristics of the antenna.Conclusion. Electrodynamic modeling allows us to obtain a Vivaldi antenna with the required radiation pattern width with an improved standing wave ratio.
- Published
- 2024
- Full Text
- View/download PDF
29. Heuristic decision making selection of drone models according to specified characteristics
- Author
-
V. V. Afonin and V. V. Nikulin
- Subjects
drone models ,reduced values of characteristics ,ranking ,average values of given characteristics ,matrix of characteristics ,numerical metrics ,Technology - Abstract
Objective. The noticeable interest in aircraft such as drones for various purposes puts forward certain requirements for their characteristics. Characteristics can be divided into information technology and consumer characteristics from a financial point of view. At the same time, they have their own units of measurement. In this regard, the task of selecting and ranking drones according to some criterion or numerical metric arises. Considering that this problem is quite relevant, this paper considers a certain heuristic approach to sorting a sample of drones by the key of the proposed metric.Method. In the heuristic approach, there is a certain variability in determining the attractiveness of a particular drone in the opinion of the person making the decision to purchase or a specific choice from the existing line of drones available for review based on their characteristics.Result. It is proposed to identify several groups in the existing characteristics, heterogeneous in their properties, both obvious and intuitively created: “good”, “very good”, “less attractive”, “least attractive”. Assuming that several models of drones with the same characteristics are being considered, divided into the specified groups, numerical coefficients are introduced to form a metric by which a given line or selection of drones will be ranked according to the calculated metrics.Conclusion. The proposed heuristic algorithm is based on the transition to the reduced values of numerical characteristics relative to the maximum of each group of characteristics with the calculation of the arithmetic mean of the given values. Depending on the type of specified groups, the coefficients entered into consideration are added or subtracted from the difference between the current characteristic and its average or the difference between the average and the current characteristic. On this basis, metrics are calculated by which the given sample of drone models is ranked.
- Published
- 2024
- Full Text
- View/download PDF
30. Analysis of the main approaches to modeling management processes for special-purpose organizational and technical systems
- Author
-
A. V. Melnikov, A. A. Karavaev, and A. O. Zheleznyakov
- Subjects
basic approaches ,modeling ,decision making ,management ,process ,analysis ,Technology - Abstract
Objective. In this paper, the main approaches to modeling the management processes of organizational and technical systems for special purposes are reviewed and analyzed, and their detailed comparative analysis is carried out. This circumstance will allow us to further develop methodological recommendations to improve the efficiency and validity of management decisions.Method. This work uses: formal models, structural models of objects, models under conditions of complete certainty, models under conditions of risk using a decision tree, models under conditions of uncertainty, mathematical programming models, quality models, efficiency models.Result. In the course of reviewing and analyzing the main approaches to modeling management processes for special-purpose organizational and technical systems, the following tasks were solved: a preliminary systematization of the available data on the features of the development of management decision-making models was carried out; a comparative analysis of these models was carried out, during which it was established that most of the developed models can only be applicable in certain subject areas, which significantly limits their universality; have a labor-intensive procedure for processing source data; turn out to be insufficiently adaptive to rapidly changing conditions.Conclusion. The considered approaches to modeling management processes for specialpurpose organizational and technical systems are a powerful tool for making informed and effective management decisions; they allow you to take into account many factors, conduct scenario analysis and optimize solutions, as well as use computers for more accurate and complex calculations.
- Published
- 2024
- Full Text
- View/download PDF
31. About the Assessment of Group aspects of the Human factor influence on Safety of Technical systems
- Author
-
D. I. Lobach
- Subjects
safety level ,human factor ,safeometrics ,prognosis ,safety culture ,gauss distribution ,professionalism ,management ,modeling ,Technology - Abstract
Objective. The purpose of theoretical research is the need to formulate and describe additional approaches and topical issues and tasks when conducting an expert assessment of group (collective) aspects of the human factor's influence on the safety of technical systems.Method. The paper considers the methodology of assessment based on the use of the Gauss distribution for the statistical description of cases of the influence of the human factor on safety, shows the relationship between individual and group aspects.Result. Examples are given and explanations are given for the application of a quantitative assessment of the influence of the human factor on the safety of technical systems, taking into account the consideration of safety culture, different levels of professionalism of employees, organizational measures taken, the possibilities of the method and its potential tasks are formulated.Conclusion. The use of statistical distributions to describe the impact of the human factor on safety makes it possible to combine and describe the relationship between individual and group aspects of the phenomenon. This allows the expert to carry out quantitative assessments, modeling and make predictions on the level of safety culture in the organization and the effectiveness of production management or technical systems.
- Published
- 2024
- Full Text
- View/download PDF
32. Research on the effectiveness of data compression methods in relational and NoSQL DBMS
- Author
-
V. A. Egunov, V. S. Surin, P. S. Stupnitskiy, and R. D. Akhmetova
- Subjects
database management systems ,dbms ,relational dbms ,nosql ,data compression ,zlib. ,lz4 ,deflate ,Technology - Abstract
Objective. The research presented in the paper is aimed at studying the effectiveness of modern DBMSs.Method. Along with traditional relational solutions, NoSQL-based DBMSs are becoming increasingly popular. This is primarily due to the ability of such systems to store and process huge volumes of data. At the same time, to work effectively with this data, it is necessary to ensure its compression. Compression allows you to reduce the amount of stored data and provide quick access to it.Result. A comparative analysis of data compression in the MySQL and OpenSe DBMS was performed.Conclusion. Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.
- Published
- 2024
- Full Text
- View/download PDF
33. On certain aspects of standardization and operating conditions of automated systems
- Author
-
A. O. Efimov, I. I. Livshits, M. O. Meshcheryakov, E. A. Rogozin, and V. R. Romanova
- Subjects
automated system ,information protection ,information security tool ,threat ,vulnerability ,Technology - Abstract
Objective. In this paper, the main aspects of the operating conditions of the AS are considered, as well as the issues of standardization of the stages of the life cycle of the AS (creation, commissioning, maintenance, etc.) at the state level. In this subject area, the technological features of building an AS based on various technical architectures are briefly considered, since both foreign processors based on x86-64 architectures and processors of domestic development based on the Advanced RISC Machine architecture are currently applicable. The use of various components of the AS requires additional study in terms of ordering the composition and configuration of specific SPI. Since each processor has a multi-level architecture, this fact objectively complicates the possibilities for full security testing and detection of all vulnerabilities. Method. In the course of the work, the threats and vulnerabilities of individual components of the AS from the point of view of intentional and unintentional threats are considered. The information on the main state standards applied to ensure the protection of information in the AS at the present time is summarized. Result. The main features of the operating conditions of the AS are considered and it is determined that the vulnerabilities of the components are due to the imperfection of the procedures for developing and covering testing of hardware and software. It is determined that in order to protect information in the AS, it is necessary to build a multi-level protection system with state accreditation. Conclusion. Proposals are presented for the application of state standardization for the protection of information in the AS, taking into account the current and prospective threat landscape, including taking into account the design features (undeclared capabilities) of the components. Overcoming threats is possible with the creation of a multi-level information protection system with state accreditation.
- Published
- 2024
- Full Text
- View/download PDF
34. Practical Malware Analysis
- Author
-
D. A. Elizarov and A. V. Katkov
- Subjects
cyberattacks ,malware ,incident investigation ,analysis ,information security ,Technology - Abstract
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. The main task is to analyze malware to assess threats and timely detection and take action.Method. For analysis, you should use an isolated environment with a customized environment and software.Result. This paper describes the process of creating an isolated stand for malware analysis and conducted a practical analysis of the malware.bin file taken from the cyberdefenders.org educational resource. Network interfaces are configured to prevent impact to the network that connects the two virtual machines. As a result of the analysis of the techniques and features used in this malware, it was revealed that it belongs to the Dridex family of banking Trojans. To obtain information from this family, you can use the AppGate Lab Dridex Toolkit.Conclusion. Based on the analysis performed using static and dynamic methods, detection rules can be developed for further identification of malware.
- Published
- 2023
- Full Text
- View/download PDF
35. Protection of the upper hemisphere of a critical information infrastructure facility
- Author
-
I. A. Loskutov and V. A. Repenko
- Subjects
upper hemisphere security ,cues ,threats ,drones ,uav ,Technology - Abstract
Objective. Structuring of publicly available information regarding the protection of the upper hemisphere of CII objects.Method. The following methods of scientific cognition are used: systematization, description, analysis, deduction. The article consists of three sections. First, an analysis of the current state of the issue of the need for protection from UAVs is carried out. Accounting is not only military infrastructure, but also civil. In addition, for analysis, the separation of drone attacks is carried out in order to physically destroy the CII object / its part or attack the technical component. In the second part of the work, the analysis of the regulatory framework of Russia and the EU countries is carried out. The greatest emphasis is placed on domestic legislation and the identification of problem areas in relation to the research topic. In the third part of the work, a draft of proposals for the protection of CII objects from threats emanating from UAVs is presented. To do this, the analysis of drone varieties is carried out, the requirements for the system of protection and search for intruders are determined.Result. The article investigates the problems of protecting CII objects from drone attacks. A constant increase in UAV attacks on civilian and military infrastructure was noted, problems of the regulatory framework of Russia in the direction were identified, a proposal for the protection of the upper hemisphere was developed.Conclusions. The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research in the direction and for the development of relevant regulatory documents.
- Published
- 2023
- Full Text
- View/download PDF
36. Forecasting the number of identified information security vulnerabilities based on the theory of 'Gray Systems'
- Author
-
A. O. Efimov, S. A. Mishin, and E. A. Rogozin
- Subjects
information security ,protection of information ,gray systems ,number of vulnerabilities ,vulnerability ,forecasting ,Technology - Abstract
Objective. The aim of the work is to assess the possibility of applying the theory of “gray systems” to build a methodology for predicting the number of identified vulnerabilities in conditions of uncertainty of influencing factors and lack of initial data, including a comparative analysis of the results of this prediction obtained using traditional and improved models of the theory of “gray systems”, as well as machine learning models.Method. The paper describes a technique for constructing a “gray model” for predicting the number of identified vulnerabilities based on the theory of “gray systems”. The initial data for forecasting is information obtained from the CVE (Common Vulnerabilities and Exposures) vulnerability database. In the course of the study, the results of forecasting obtained using the developed “gray model” and the linear regression model implemented on the basis of the scikit-learn library and the Python programming language are analyzed.Result. The use of a linear regression model and models based on the theory of “gray systems” to predict the number of identified vulnerabilities allows you to get close forecast values. According to data obtained from the CVE vulnerability database, information on 7,015 identified vulnerabilities was published for the 1st quarter of 2023. The forecast obtained on the basis of the traditional model of the theory of “gray systems” turned out to be the closest to the published value. It should be noted that the forecast of the “gray model” is based only on the values of the initial data and does not depend on the circumstances arising in the field of information security, which is a limitation in the use of the proposed methodology.Conclusion. The results of the study indicate the possibility of applying the theory of “gray systems” for short-term forecasting of the number of detected vulnerabilities. The application of the developed methodology makes it possible to carry out the specified forecasting with a limited number of initial data.
- Published
- 2023
- Full Text
- View/download PDF
37. REGULATION OF THE RELATIONSHIP BETWEEN ADDITIVE REDUCTION AND METRICS METHODS
- Author
-
E. M. Aristova
- Subjects
perfect solution ,additive reduction ,metric ,target programming method ,set of criteria ,Technology - Abstract
Objectives. The aim of the work is to determine the relationship between generalised criterion and target programming methods.Methods. The paper considers the aggregation operation that underlies many decision-making procedures used in input-output models, in neural network technologies and in the study of multi-purpose systems. The use of certain metrics within the framework of target programming can lead to solutions that are not Pareto-optimal. Therefore, in targeted programming, a significant place is given to finding the conditions under which the use of one or another metric obviously leads to Pareto-optimal solutions. The necessary (Carlin's theorem) and sufficient conditions of Pareto-optimality are known to perform the additive reduction. For a generalised criterion on the basis of order operators of weighted aggregation, two theorems proven by the author (the theorem on the inclusion of the set of Pareto-optimal solutions into a set of effective solutions and the Pareto optimality theorem for the solution obtained) are presented.Results. The proof of the Pareto optimality theorem of the solution is given, maximising the generalised criterion obtained on the basis of the order operations of weighted aggregation, which justifies the use of operations of this type for solving the problems of vector optimisation or multicriteria choice. The theorem on the existence of an additive reduction for a metric is true only in the particular case and is based on Carlin's theorem, according to which a subset of Pareto-set points maximises some additive reduction.Conclusion. In the paper a relationship between the additive reduction and metrics methods is established. An assertion concerning the relationship between the parameters of the distance function in the target programming method and the weighting coefficients of the additive reduction is formulated and proved, which ensures the equivalence of the optimal Pareto solutions.
- Published
- 2017
- Full Text
- View/download PDF
38. Analysis of performance indicators of computer systems software on objects of special importance
- Author
-
V. V. Konobeevskikh and A. O. Efimov
- Subjects
effectiveness ,software of computing complexes ,expert-statistical method ,quality metric ,complex quality indicator ,Technology - Abstract
Objective. The purpose of the article is to study the performance indicators of software aimed at improving the level of security at objects of particular importance. To date, the issue of improving the hardware and software components of the security system at a particularly important facility, taking into account its specifics and ensuring anti-terrorist measures, is quite urgent. There is an urgent task of evaluating the software of the physical protection system (SFZ) of an object of particular importance, while one of the main questions is which quality indicators to take into account and which methods to use when obtaining objective data, taking into account the specifics of the object of research and the need to increase anti-terrorist measures. In this article, it is proposed to analyze the performance indicators of computer systems software on objects of special importance.Method. To achieve this goal, such methods as system analysis, computational and expert statistical are used.Result. The paper presents an alternative approach to the analysis of the parameters of the effectiveness of software in relation to the components of the integrated complex (IC) SFZ, which consists in the transition from quantitative to qualitative assessments, the use of expert knowledge and statistical processing of information received from them. The proposed approach makes it possible to use a single measurement scale, as well as simplify the procedure for measuring the values of individual performance indicators of the software of the subsystems of the IC SFZ during operation at an object of particular importance.Conclusion. The results obtained can be used for a comprehensive assessment of the operation of software at facilities of particular importance, as well as to increase its security level.
- Published
- 2023
- Full Text
- View/download PDF
39. Assessment of the level of security (safety of functioning) of automated systems based on their vulnerabilities, formalized using the theory of queuing systems
- Author
-
A. O. Efimov and E. A. Rogozin
- Subjects
automated system ,information security ,queuing system ,security assessment ,vulnerability ,Technology - Abstract
Objective. The aim of the work is to develop a methodological apparatus, as well as a mathematical model based on the theory of queuing systems designed to assess the level of security of automated systems.Method. The theory of queuing systems is considered as a mathematical apparatus. In particular, the problem of eliminating vulnerabilities was considered as a multi-channel CFR with an unlimited queue. The flow of detected vulnerabilities of the automated system was considered as an incoming flow of applications. The system, due to the possibility of detecting many vulnerabilities in a short time, has a queue of vulnerabilities. Information security specialists responsible for eliminating vulnerabilities in this system are considered as service channels. Despite the possibility of mutual assistance between specialists, this paper considers a situation where each employee is tasked with eliminating a specific vulnerability. The outgoing flow of applications is the flow of eliminated vulnerabilities of the automated system.Result. A methodological and mathematical apparatus for assessing the level of security of automated systems based on their vulnerabilities and the process of eliminating vulnerabilities has been developed. The theory of queuing systems was used as a basis. The assessment of security levels is given depending on the probability of a queue of unresolved vulnerabilities.Conclusion. The developed methodology can be used to assess the level of security of automated systems. And also allows you to assess the sufficiency of resources spent on eliminating vulnerabilities of a specific automated system.
- Published
- 2023
- Full Text
- View/download PDF
40. Systems with optimal geometric shapes
- Author
-
A. K. Yusupov, H. M. Musеlеmov, and R. I. Vishtalov
- Subjects
seismic resistance and seismic protection ,optimal forms of buildings ,three-dimensional structures ,structural schemes ,seismic waves ,Technology - Abstract
Objective. In this paper, buildings of various shapes that have high seismic resistance are considered. Such seismic resistance is provided by the rational shape and outlines of the building itself. Here, the influence of the torsion of the building in the plan is minimized, thereby eliminating large stresses at the ends of the designed building. At the same time, the translational movement of the building in the plan is preserved.Method. By optimizing the shape and shape of buildings for various purposes, high efficiency of the structure is ensured under seismic effects. By comparing the shape and outlines of various buildings, the best variant of their layout is selected.Result. Structural schemes of buildings and structures with high resistance to seismic effects are given. A comparative analysis and recommendation for the design of earthquake-resistant buildings are given. Structural schemes for buildings and structures of various outlines have been developed: round, square, rectangular; constructive schemes of volumetric seismic-resistant structures, pyramidal, conical of various shapes, have been drawn up. Recommendations for the design of earthquake-resistant buildings and structures with optimal geometric shapes are made.Conclusion.The design schemes proposed in the article can be used in the design of earthquake-resistant buildings and structures for various purposes.
- Published
- 2023
- Full Text
- View/download PDF
41. Some issues of multi-criteria optimization of parameters of complex systems
- Author
-
R. V. Guseynov, M. R. Guseynova, and K. A. Alieva
- Subjects
multi-criteria optimization ,optimality criteria ,pareto-optimal solutions ,criteria convolution ,multi-vector optimization ,Technology - Abstract
Objective. The purpose of the study is to substantiate the design criteria for optimality, taking into account the multi-criteria purpose and functioning of the object.Method. The study was carried out on the basis of multicriteria optimization methods, the hierarchy analysis method, the convolution method, and heuristic methods.Result. The paper describes general problems of multicriteria optimization of mechanical systems. The importance of the problem of substantiating the design criteria for optimality, taking into account the multi-criteria purpose and functioning of the object, and introducing quantitatively measurable goals from a variety of alternative options is indicated. It is noted that the choice and formation of a generalized optimality criterion is the most responsible in solving optimization problems. The need to ensure the correctness of the application of one or another convolution method is indicated. Various approaches to the formation of a generalized optimality criterion are analyzed. Their features, advantages and disadvantages are given. The possibility of correcting parametric constraints in problems of improving optimal solutions is pointed out.Conclusion. When solving multi-criteria problems, it is necessary to pay great attention to both the formulation of the problem and the choice of a system of criteria and the implemented method for solving the problem.
- Published
- 2023
- Full Text
- View/download PDF
42. Modeling of humidity stresses in a soil half-space
- Author
-
E. K. Agakhanov, C. A. Agakhanov, and G. E. Agakhanov
- Subjects
mathematical modeling ,ground half-space ,soil moisture ,moisture swelling of the soil ,forced humidity deformations ,moisture stress ,Technology - Abstract
Objective. Solving the issues of reliability, durability and efficiency of buildings and structures is inextricably linked with the behavior of soils in their foundations. In order to establish a more realistic behavior of soils, the paper considers the determination of their stressstrain state, taking into account new factors, including physical influences, in particular, humidity.Method. Representing the structure of the soil in the form of a model composed of two elastic and one viscous elements, and assuming that the properties of the elastic elements do not change with changes in humidity, mathematical modeling of moisture stresses in the soil half-space was performed. The expediency of this model is explained by the fact that the transition to overly complicated material structure schemes introduces few significant corrections into the deformation laws and leads to serious calculation difficulties.Result. Replacing true time with conditional time leads to a significant simplification of the solution of the equation, since it reduces one part of it to a differential linear operator with constant coefficients. In this case, the opposite part can usually be considered as a given function of conditional time. The maximum value of stresses was obtained at full soil moisture, very low moisture intensity and very intensive moisture.Conclusion. By setting the appropriate moisture intensity, you can get the maximum stress that does not exceed the specified allowable value.
- Published
- 2023
- Full Text
- View/download PDF
43. Ontological model of knowledge as the basis for automation of the process of distribution of quotas for the extraction of aquatic biological resources and control over the level of their development
- Author
-
A. V. Oleynikova and A. A. Oleynikov
- Subjects
object ontological model ,aquatic biological resources ,information system ,quotas ,Technology - Abstract
Objective. In this paper, the process of developing an ontological model of knowledge of state control bodies in the field of quotas for the extraction of aquatic biological resources is considered. The need to develop this model arose due to the insufficient level of automation of knowledge extraction from data collected and processed manually from eighteen territorial departments of the Federal Agency for Fisheries. Insufficient speed of collecting and processing data on the current level of industrial production of aquatic biological resources may cause incorrect planning during the subsequent distribution of catch quotas, which may lead to a decrease in biological diversity in the reservoirs of the Russian Federation with the subsequent loss of types of aquatic biological resources.Method. The study used methods of analysis of theoretical and regulatory documentation, analysis of statistical data, as well as secondary data analysis.Result. An object ontological model of knowledge of state control bodies in the field of quotas for the extraction of aquatic biological resources has been developed.Conclusion. The developed ontological model makes it possible to accelerate the extraction of knowledge from aggregated data on the level of distribution and development of quotas for catching aquatic biological resources, and also serves as the basis for creating a full-fledged information system for accounting for the extraction of aquatic biological resources and monitoring their population.
- Published
- 2023
- Full Text
- View/download PDF
44. INFORMATION SUPPORT FOR INNOVATION PROCESSES IN THE RUSSIAN AGRO-INDUSTRIAL COMPLEX
- Author
-
M. Y. Kadomtseva
- Subjects
agro-industrial complex ,information support ,innovation process ,information and advisory service ,Technology - Abstract
It is argued in the paper that an important institution capable of providing information support for innovation processes in the Russian agro-industrial complex can be the agricultural advisory institution. The paper presents recommendations on integrating this system into the mechanism of efficient government management of the domestic agro-industrial complex’s innovative development.
- Published
- 2016
- Full Text
- View/download PDF
45. FOAM CONCRETE ON THE BASIS FILLERS FROM RECYCLED MATERIALS
- Author
-
S-A. Y. Murtazaev, M. S. Saydumov, M. R. Hadgiev, and V. H. Hadisov
- Subjects
waste dismantling of buildings and structures ,concrete scrap ,recycling of waste ,secondary placeholder ,cellular concrete ,aerated concrete ,foam concrete ,comparative studies ,properties of foam concrete ,economic effect ,Technology - Abstract
The paper is devoted to the actual problem recycling crushing screenings brick battle and workmanship bricks using it as a fine aggregate in cellular foam concrete products.The paper presents the analysis of the environmental situation of the region and the results of a study of waste crushing brick fight to improve the utilization of the product technology in cellular-concrete products. A comparative study of traditional cellular gas concretes and foam concretes and concretes based on recycled sand.
- Published
- 2016
- Full Text
- View/download PDF
46. To the issue of optimising the performance of a scroll compressor as part of a CO2 booster refrigerating machine in order to increase its efficiency
- Author
-
V. A. Pronin, A. V. Kovanov, V. A. Tsvetkov, E. N. Mikhailova, and P. A. Belov
- Subjects
scroll compressor ,leaks ,booster chiller ,transcritical cycle ,co2 ,Technology - Abstract
Objective. With the decreasing use of refrigerants with a high global warming potential, increasing the efficiency of refrigeration machines using natural working fluids is a very urgent task. The CO2 booster refrigerant cycle may be optimal for the fields of commercial refrigeration, climate engineering and heat pumps, but needs to be adapted to regions with hot climates. The purpose of the study is also to systematize possible ways to improve the spiral technology, as a guarantee of increasing the efficiency of booster refrigeration machines.Method. Such solutions have already been tested by increasing the transcritical cycle efficiency through the use of an ejector and parallel compression. However, the use of a scroll compressor in the transcritical cycle may be a good alternative to these methods. This solution, a little bit improves technical and economic indexes of the refrigerating machine, in the most part reducing capital and operational costs. When considering the prospect of improving the efficiency of a booster system with scroll compressor, it is necessary to address the issue of compressor performance optimisation. An issue of this kind can be referred to improving the efficiency of the booster system, at the expense of the internal characteristics of the refrigeration machine.Result. Thus, in this paper, a conceptual approach is considered to solve this problem based on a system analysis of the interconnection of the compressor as the main energy-intensive element of a refrigeration machine.Conclusion. Development of conceptual model, allows to identify influence of various factors on scroll compressor operation and to build adequate mathematical model, to choose or develop necessary calculation methods.
- Published
- 2023
- Full Text
- View/download PDF
47. Investigation of liquid fuel combustion processes in an electrostatic fieldе
- Author
-
R. V. Mukanov, Yu. A. Alyautdinova, and S. P. Strelkov
- Subjects
boiler plants ,diesel fuel ,high-potential electrostatic field ,electrode system ,high-voltage power supply ,Technology - Abstract
Objective. The article presents the results of experimental studies on the effect of a high-potential electrostatic field on the combustion of liquid fuel. Method. Experimental studies were carried out on the developed laboratory installation, which makes it possible to ensure the combustion of liquid fuel in a high-potential electrostatic field with the possibility of changing the polarity. The change in the polarity of the applied voltage to the electrode system of the experimental setup led to an increase in the fuel burning rate in the first case, and to its attenuation in the second.Result. In this paper, studies have been carried out proving the effect of an electrostatic field on the burning rate and reducing the content of harmful components (soot and carbon monoxide) in fuel combustion purges. Based on the values of the fuel burning rate obtained as a result of the experiments, graphic dependences were constructed on the applied voltage, on which the areas of linear and non-linear changes in the combustion parameters were identified.Conclusion. The results of the research carried out can be used to create new highly efficient burners for liquid fuel boilers. The effect of reducing the burning rate can be used to create fire safety devices that block the spread of flame during a fire.
- Published
- 2023
- Full Text
- View/download PDF
48. Calculation of the security level coefficient of the automated system of the internal affairs bodies based on the information security of the information security system with updates of virus and threat signatures
- Author
-
A. O. Yefimov, I. G. Drovnikova, E. A. Rogozin, V. R. Romanova, and E. V. Fil
- Subjects
security assessment ,automated system ,information security ,information security tool ,information threat ,Technology - Abstract
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise. To solve the problem, it is necessary to determine the vulnerabilities, as well as to designate the coefficients that determine the state of the automated system.Method. Computer facilities are a set of software and hardware components (including information security tools) of data processing systems that can function independently or as part of other systems. Methods for analyzing the process of the impact of computer threats at the stage of loading the operating system are applied.Result. A technique is proposed for calculating the security factor of automated systems in a secure design, depending on the availability of the necessary security policies and the timely updating of virus and threat signature databases. The vulnerabilities in the process of starting the operating system are summarized, conclusions are drawn on the calculation of the security level coefficient of the automated ATS system based on the information security of the information security system with updates of virus and threat signatures.Conclusion. The developed methodology makes it possible to assess the security of automated systems, taking into account the situation of information security in the field.
- Published
- 2023
- Full Text
- View/download PDF
49. Controlled impacts for structure formation and properties of cement concretes
- Author
-
Yu. G. Ivaschenko and R. T. Mameshov
- Subjects
structure of a composite material ,portland cement ,constituent components ,structure-forming factors ,properties ,Technology - Abstract
Objective. The paper considers controlled effects on changes in the properties of components and the control effect of technological methods and techniques for obtaining composite building materials with a set of specified properties.Method. Methods of mechano-physical, physicochemical, nanotechnological influence were applied.Result. The system-structural approaches are systematized and generalized by control actions at the stage of structure formation, technological stages, formation of the optimal structure and properties of cement concrete. The physicochemical principles and mechanisms of structure formation are given, based on establishing the role of controlling the mechano-physical, physico-chemical, nanotechnological methods of influencing the cement-water system. The possibility of controlling structural transformations in binder systems, including through the use of technological influences, has been revealed.Conclusion. The implementation of the impacts on the components of cement concretes will ensure the targeted design of the structures of modern building materials.
- Published
- 2022
- Full Text
- View/download PDF
50. Calorimetric stand for research of processes in the refrigeration unit
- Author
-
Yu. V. Kudrov, L. V. Sumzina, A. V. Maksimov, and S. L. Filimonov
- Subjects
refrigeration unit ,calorimetric stand ,energy efficiency ,cooling capacity ,heat exchanger ,two-chamber refrigerator ,steam separator ,Technology - Abstract
Objective. The aim of the work is to develop a calorimetric stand that allows simulating the operation of an energy-efficient two-evaporator refrigeration unit of a household refrigerator or freezer.Method. In the course of the work, a calorimetric setup is described that allows conducting experimental studies to determine the cooling capacity and energy efficiency of a modernized refrigeration unit of a household refrigerator.Result. Currently, new resource-saving circuit solutions for household refrigeration equipment have been developed. The developed solutions make it possible to increase the efficiency of the refrigeration unit, as well as to reduce its energy consumption. Theoretical calculations confirming these indicators have been carried out. To confirm the calculated values, automated experimental studies are required to determine the parameters of the refrigeration unit. The paper proposes a description of an automated calorimetric stand that allows simulating the operation of an energy-efficient dual-evaporator refrigeration unit of a household refrigerator or freezer.Conclusion. The designed calorimetric stand will allow carrying out complex experimental studies to determine the cooling capacity of the modernized refrigeration unit when operating on various refrigerants. The experimental setup also makes it possible to measure the temperature and pressure during the operation of the refrigeration unit, as well as to determine the influence of various factors on its characteristics.
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.