26 results
Search Results
2. Comparison of methods for modeling the gas-dynamic characteristics of high-pressure centrifugal compressors that ensure the operation of field low-temperature separation units using the example of a modification with a pressure ratio of up to 1.9...2.1
- Author
-
M. A. Vorontsov, V. Yu. Glazunov, A. S. Grachev, M. S. Mashtalir, S. A. Pospelov, and A. V. Chernyshev
- Subjects
compressor station ,gas compressor units ,centrifugal compressors ,high-pressure centrifugal compressors ,mathematical modelling of centrifugal compressors ,reduced characteristic method ,refined reduced characteristic method ,low-temperature separation units ,Technology - Abstract
Objective. Currently, for the development of Valanginian and other deeplying (compared to the Cenomanian) deposits, low-temperature separation (LTS) units with turboexpander units (TDA) are used, and the booster compressor station (BCS) is one of the key technological facilities necessary to ensure the efficient operation of promising technologies for gas preparation using the NTS method with TDA turboexpander units for transport. The purpose of the study is to substantiate optimal operating modes, as well as to develop measures for the technological development of a booster compressor station based on the use of methods for modeling the operation of centrifugal compressors, gas pumping units and, directly, the booster compressor station. Method. The following methods were used: the method of reduced characteristics, the refined method of reduced characteristics, and the two-dimensional approximation method. The basis of the mathematical model of the research objects is the gas-dynamic characteristics of centrifugal compressors. Result. The results of a comparison of methods for modeling HDC (reduced characteristics method, refined method of reduced characteristics, two-parameter approximation method) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 1.9...2.1, intended for equipping gas compressor units with a unit power of 16.0 MW as part of field operations. DKS. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. The accuracy of the mathematical model of the GDC PPM as part of the field booster compressor stations that ensure the operation of NTS installations with TDA determines the accuracy of the assessment of energy consumption and the technical condition of the gas pumping units, as well as calculations of future operating modes of gas pumping equipment, which are carried out to solve a number of applied problems, including determining the timing of equipment modernization or reconstruction of the station.
- Published
- 2024
- Full Text
- View/download PDF
3. Detection of «Telegram Rat» virus
- Author
-
A. I. Dubrovina and M. H. Alkordi
- Subjects
«telegram rat» ,cyber threats ,information security ,Technology - Abstract
Objective. The aim of this study is to analyze the «Telegram Rat» virus, emphasizing the importance of awareness to effectively combat cyber threats and ensure security in the digital age.Methods. This paper used an analysis of the characteristics and distribution of «Telegram Rat» viruses. An example of analyzing the technical mechanisms of extortion on the example of «WAGNER GROUP» was given and the steps of virus elimination were formulated.Results. The acuality of the «Telegram Rat» virus problem and ways of its transmission are considered. Practical methods of threat detection and neutralization are stipulated. The method of «Telegram Rat» virus threat detection is based on the analysis of active processes, network activity and file system. It is revealed that the main vulnerability on devices infected with the virus is careless user behavior.Conclusion. The contents of this paper emphasize the importance of vigilance when downloading files and clicking on links. Lack of caution can lead to data loss and information leakage, emphasizing the need for conscious behavior in the digital environment.
- Published
- 2024
- Full Text
- View/download PDF
4. The history of agricultural machinery repair system in Russia
- Author
-
V. I. Chernoivanov
- Subjects
agricultural machinery ,wear ,repair ,technology ,standard technology ,repair and maintenance shops ,Agriculture ,Mechanical engineering and machinery ,TJ1-1570 - Abstract
The paper highlights the imperative for the maintenance and repair of agricultural machinery. (Research purpose) The research aims to undertake a retrospective analysis illuminating the evolution and establishment of the machine repair system. This analysis spans from the production of the inaugural Soviet tractor to the advancement and production of contemporary machinery and equipment. (Materials and methods) The paper analyses publications from different periods focused on the challenges surrounding the establishment of a centralized system for the repair and maintenance of machinery and equipment across all stages of agricultural production development. (Results and discussion). The paper sheds the light on the dynamics of tractor production in the early 1930s, detailing the transition from reliance on imports to the utilization of domestic agricultural machinery in the local market, alongside the phases involved in establishing a domestic repair service system. Furthermore, it explores the evolution of repair workshops at machinery technological stations from 1928 to 1957 and outlines the structuring of a repair depot within the enterprises of the All-Union Association «Soyuzselkhoztekhnika» between 1961 and 1990. Additionally, the paper delves into the analysis of repair strategies, ranging from individualized to in-line approaches. The paper underscores the pivotal role of academic and industrial science in equipping repair enterprises with essential technological documentation, repair equipment, and supplementary materials. It also highlights their contribution to the development of methodological support for maintenance and repair operations at the level of a centralized system. (Conclusions) The paper presents information on the research and design activities undertaken by specialized laboratories and departments within the All-Union Scientific Research Institute of Agricultural Mechanization VIM from 1930 to 1961. It acknowledges the significant contributions of scientists and experts in the domains of machine wear theory and the standardization of repair technologies. Furthermore, the paper emphasizes the critical influence of the State Union Scientific Research Technological Institute for the Repair and Operation of Tractors and Agricultural Machines GOSNITI between 1963 and 2013 on establishing a robust machinery repair and maintenance system. It outlines the potential and future directions for the evolution of a service system for agricultural machinery.
- Published
- 2024
- Full Text
- View/download PDF
5. DIGITAL GOVERNANCE: A PATHWAY FOR COMBATING EMERGING PUBLIC SAFETY AND SECURITY CHALLENGES IN XXI CENTURY NIGERIA
- Author
-
Исмаил Мшелиа and А.Г. Кари
- Subjects
e-governance ,digital society ,security ,Nigeriagovernment ,technology ,crime ,Sociology (General) ,HM401-1281 - Abstract
The digital revolution of the XXIst century has not only positively affected all aspects of social life, but has also precipitated broad negative impacts such as cybercrimes which globally resulted in the loss of about $600 billion (0.8 percent of the global GDP) in 2018. As need for a new form of governance to address the disruptive effects of the digital revolution arose, governments across the globe shifted from the 20th century bureaucracy-centred analogue governance model to a 21st century citizen-centred digital model. This paper examined the digital model of governance and its application with specific focus on Nigeria. The paper utilised secondary data from different sources including journal papers, national dailies and reports. Thus, the meaning of digital governance and Nigerian journey in the digital landscape are examined. It is revealed that while Nigeria made a significant progress in its journey to digitalisation with the introduction of National Identification Number (NIN) among other digital initiatives, exclusion and insecurity are twin challenges that continue to inhibit the achievement of their ultimate objectives. It is therefore recommended that a policy framework to guide the efforts aimed at solving the problems should be designed by navigating through e-democracy, e-administration and e-services being the core relationships that characterise e-governance.
- Published
- 2024
- Full Text
- View/download PDF
6. Analysis of methods for modeling operating modes of compressor equipment that ensures the operation of field low-temperature separation units
- Author
-
M. A. Vorontsov, V. Yu. Glazunov, A. S. Grachev, M. S. Mashtalir, S. A. Pospelov, and A. V. Chernyshev
- Subjects
high-pressure centrifugal compressors ,modeling of centrifugal compressors ,reduced characteristics method ,low-temperature separation units ,Technology - Abstract
Objective. A booster compressor station (BCS) is one of the key technological facilities necessary to ensure the effective operation of low-temperature separation technology for natural gas in field gas preparation systems for transportation. Ensuring promising operating modes of booster compressor stations with high efficiency is an urgent task. Method. One of the tools for solving this problem is mathematical modeling of the operating modes of centrifugal compressors (hereinafter - CPC), which are part of gas pumping units (GPU). The basis of the mathematical model is the gas dynamic characteristic (GDC) of the pulp and paper mill. The existing regulatory documentation presents simplified methods for modeling HDC, which are suitable for low-pressure pulp and paper mills with a pressure ratio of up to 1.5 and the number of compression stages of no more than three, but are not suitable for multi-stage high-pressure pulp and paper mills. Result. The results of a comparison of three methods of modeling the hydrodynamic characteristics (method of reduced characteristics, refined method of reduced characteristics, method of two-parameter approximation) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 2.0, intended for equipping a gas pumping unit as part of field booster compressor stations. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. When using the UMPH-2D modeling method, the smallest errors were obtained (no more than 2.0%), which, in turn, indicates its highest accuracy among the considered methods for recalculating the gas flow characteristics of high-pressure and multi-stage compressors.
- Published
- 2024
- Full Text
- View/download PDF
7. Investigation of the Effectiveness of Programs Optimization Methods for Parallel Computing Systems with GPU
- Author
-
A. Yu. Bezruchenko and V. A. Egunov
- Subjects
program efficiency ,efficiency evaluation ,performance ,multithreading ,svd ,cuda ,gpgpu ,nvidia ,unified memory ,Technology - Abstract
Objective. The paper defines the relevance of the task of increasing the efficiency of software, which in this case is understood as reducing the operating time of the designed software in the process of solving computationally complex problems. Method. As an example of such a task, the implementation of the singular value decomposition by the Jacobi method is used. This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. The paper discusses methods for improving the efficiency of software for target computing architectures using CUDA. Result. The existing analytical models for evaluating the effectiveness of computer programs are described. The influence of various optimizations, such as optimization of data transfers, use of the unified memory system, the number of threads, memory access patterns, and a number of others on the efficiency of the resulting software is considered. The process of optimizing the SVD implementation program is described, the results of computational experiments are presented. Conclusion. As the number of threads increases, performance may increase more than the number of threads. Impact of memory access pattern: When the memory access sequence is optimal, performance improves noticeably. Adjusting the share of memory used for L1 cache and shared memory does not have a significant impact on performance
- Published
- 2024
- Full Text
- View/download PDF
8. Detection of phishing portals through machine learning algorithms
- Author
-
E. A. Trushnikov
- Subjects
phishing ,machine learning ,neural networks ,portal analysis ,Technology - Abstract
Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. Method. Systematization of disparate information, analysis of the field, description of available developments are the main methods that were used in the study. The work is divided into three large sub-blocks. The first one analyzes the concept of machine learning, describes the main ways to correctly interpret the information entered, indicates the most popular techniques and databases. In the second part of the work, an analysis of artificial neural networks is carried out. In particular, their subspecies are shown with a description of the implementation features, and a comparison with living neurons is carried out. In the third part, the practical implementation of the two techniques and their comparison are carried out, recommendations are given regarding their use in detecting phishing portals. Result. The paper investigates the methods of analyzing phishing portals. The analysis showed that it is most rational to use a random forest, because it provides quality according to the precession, recall, F1-score, 98% metrics with a significant number of parametric values entered. Conclusions. When implementing various search methodologies for phishing portals, it is necessary to take into account their decrease in efficiency from the entered parameters. To do this, it is important to conduct preliminary tests. However, the test result can be interpreted in different ways. In particular, the effectiveness of the methods can be improved if you limit the number of input parameters, but at the same time rigidly structured according to one search criterion.
- Published
- 2024
- Full Text
- View/download PDF
9. Data caching technologies in modern microprocessors
- Author
-
V. A. Egunov and V. A. Shabalovsky
- Subjects
cache memory ,optimization ,software efficiency ,cache miss ,cache hit ,associativity of cache memory ,Technology - Abstract
Objective. The study presented in the paper is aimed at studying the methods for improving the efficiency of software in modern computing systems with a hierarchical memory structure. Method. The study is based on data caching technologies in microprocessors. Result. The article presents the results of the analysis of various approaches to the development of efficient software taking into account the characteristics of the memory subsystem of the computing system, which made it possible to prove the importance of cache memory in improving the performance and interaction of computer components. Conclusion. Cache memory is a critical element in the architecture of microprocessors, playing a key role in determining the performance of the computing system. Optimizing the use of cache can significantly improve data access time and, as a result, overall system performance. Software developers need to pay special attention to the characteristics of the memory subsystem when designing and implementing solutions.
- Published
- 2024
- Full Text
- View/download PDF
10. Analysis of the main approaches to modeling management processes for special-purpose organizational and technical systems
- Author
-
A. F. Salnikov, K. V. Ivanova, and N. A. Merkulova
- Subjects
spectral resolution ,modeling ,frame filtering ,video stream ,process ,analysis ,Technology - Abstract
Objective. Currently, the task of increasing the spectral solvability of a video stream using modern frame filtering methods is urgent. Various methods of frame filtering are considered and analyzed in the work, and their detailed comparative analysis is carried out. The obtained data contribute to the further development of various materials to increase the spectral resolution of the video stream. Method. A large number of different approaches have been developed in the scientific literature to increase the spectral resolution of a video stream using modern frame filtering methods, and the most basic ones are analyzed in this paper: linear spatial filtering; nonlinear spatial filtering; spatial frequency filtering; filtering using Fourier analysis; filtering based on wavelet analysis. Result. A preliminary systematization of the characteristics of the methods under consideration has been carried out in order to develop new algorithms and implement them to improve image quality, increase detail and clarity of the video stream; various frame filtering methods have been analyzed, contributing to an increase in the spectral resolution of the video stream, and their impact on the quality of video content has been considered; during the analysis, it was found that in order to increase the spectral solvability of the video stream, it is necessary to use a combined filter. The above facts will allow us to further develop methodological recommendations for increasing the spectral solvability of the video stream. Conclusion. The considered approaches to increasing the spectral resolution of a video stream using modern frame filtering methods are preferable when increasing the spectral resolution of images, since they use all the positive aspects of linear, nonlinear and spatial frequency filtering.
- Published
- 2024
- Full Text
- View/download PDF
11. Quality of tracking methods with object reidentification
- Author
-
N. A. Maltceva, A. A. Polozov, N. V. Papulovskaya, and S. L. Goldshtein
- Subjects
analysis ,datasets ,fps indicators ,reidentification ,tracking ,Technology - Abstract
Objective. This paper presents a study of object tracking algorithms for analyzing sports competitions with a minimum permissible number of frames per second without critical loss of quality of operational systems. The purpose of the study is to determine the optimal tracking method and reidentification model with an increase in the time interval between frames. Method. The study used the Re-Identification MSMT17, Market1501, DukeMTMCreID datasets; specialized neural networks OsNet, ResNet and MobileNet. Tracking algorithms BotSort, Bytetrack, OcSort, DeepOcSort, StrongSort. The NOTA and IDF1 quality metrics were used. Result. The metrics of the experiments are generally quite low, which is due to the nonlinearity of athletes' movement, unlike pedestrians' movement, and a large number of changes in their posture. Conclusion. Depending on the degree of information compression, the optimal tracking methods when using pre-trained reidentification models are ByteTrack and OcSort.
- Published
- 2024
- Full Text
- View/download PDF
12. Optimization of seismic insulation parameters of frame buildings using adaptive methods
- Author
-
H. R. Zainulabidova
- Subjects
frame buildings ,frame ,flexible connections ,disconnecting connections ,periods of oscillation ,seismic effects ,Technology - Abstract
Objective. The purpose of the work is to calculate frame buildings with flexible connections and with flexible and switch-off connections, to make recommendations for the use of seismic insulation methods depending on the characteristics of seismic events. Method. Development of an algorithm for calculating frame buildings of a frame structural system with seismic protection in buildings with flexible connections and with flexible and switchable connections Result. A method for calculating frame buildings of a frame structural system with seismic insulation in the form of flexible connections and flexible and switchable connections has been developed. A computer calculation program for seismically insulated and nonseismically insulated frame buildings in the Delphi 5.0 programming environment in the Object Pascal language using the Runge-Kutta numerical method of the 4th order for solving differential equations has been compiled Conclusion. It is determined that the construction of frame buildings with the seismic insulation methods considered in this paper, namely with flexible connections and with flexible connections and disconnecting connections, is not impractical for territories where long-period fluctuations are possible, due to the fact that excessively high deformations occur.
- Published
- 2024
- Full Text
- View/download PDF
13. Development of a technological solution aimed at improving the consumer properties of a new fish culinary product enriched with chondroitin sulfate of thorny skate
- Author
-
Shchetinsky V. V., Shokina Yu. V., and Nikiforov-Nikishin A. L.
- Subjects
thorny skate ,chondroitin sulfate ,fish culinary product ,enriched product ,formulation ,technology ,скат звездчатый ,хондроитинсульфат ,рыбное кулинарное изделие ,обогащенный продукт ,рецептура ,технология ,General Works - Abstract
The paper presents the results of developing a fish culinary product (thorny skate meat mixed with Atlantic cod meat, baked with potatoes and mushrooms in a cream sauce) enriched with chondroitin sulfate contained in the meat and cartilage of the wings of thorny skate. Atlantic cod, more familiar to the Russian consumer and successfully complementing the skate's meat with amino acid composition, has been chosen as an additional fish raw material. Thorny skate belongs to the underutilized fishing facilities of the Northern Basin. The meat of its wings contains up to 1.5 % urea, which worsens its organoleptic properties. To solve this problem, it was previously proposed to use short-term preliminary heat treatment (PHT) of skate's wings by blanching them in water at a temperature from 93 to 96 °C for 1–3 minutes, which guarantees a fourfold decrease in the mass fraction of urea in the meat, relative to the initial content, below the organoleptic perception of the consumer. PHT also facilitates the cutting of the skate's meat. The formulation and technology of a combined fish culinary product is proposed, packaged and completely ready for consumer's use. To prolong the shelf life up to 120 days, it is proposed to subject the product to shock freezing with subsequent storage at a temperature no higher than minus 18 °C. To solve the problem of delamination of cream sauce during storage and to improve the consumer properties of the product, an experimentally based technological solution is proposed – the introduction of oat flour in the composition of the sauce formulation as a thickener and structure-forming agent in an amount of 3.5 % per total mass of sauce.
- Published
- 2024
- Full Text
- View/download PDF
14. Development and optimization of a bot in Telegram for effective task management in the enterprise
- Author
-
V. A. Vaskin, S. D. Shibaikin, and V. V. Nikulin
- Subjects
databases ,bot ,application ,design ,optimization ,management ,Technology - Abstract
Objective. The purpose of the research is to develop and implement a Telegram bot for effective task management using the functionality of the Telegram API. Method. The study is based on database design techniques. Result.The paper describes the process of developing and optimizing a Telegram bot for effective task management. As part of the research, an application was developed, implemented in Python using the Telegram API and using the PostgreSQL DBMS to store data as part of the workflow. The system is designed to optimize the workflow, manage tasks in the system and delegate them to users. A database has been designed, where the structure and relationships between data are defined, ensuring efficient storage and access to information, taking into account the needs of the application. Conclusion.The phased implementation of functionality, from task management, user notification systems, to data processing and analysis, allows us to obtain a fully functional system with a wide range of capabilities. To clarify the functions and capabilities of the bot, a demonstration of the application was carried out, reflecting the functionality of the system.
- Published
- 2024
- Full Text
- View/download PDF
15. DEVELOPMENT AND RESEARCH OF SOFTWARE SOLUTION FOR BUSINESS PROCESS MODEL CORRECTNESS ANALYSIS USING MACHINE LEARNING
- Author
-
Andrii Kopp, Dmytro Orlovskyi, and Uliya Litvinova
- Subjects
business process modeling ,model quality ,complexity measures ,machine learning ,logistic regression ,software solution ,Technology - Abstract
Poorly designed business process models are a source of errors and the subsequent costs associated with these errors, such as monetary costs, lost time, or even some harmful impact on people or the environment if the erroneous business process models are associated with critical industries. The BPM (Business Process Management) lifecycle usually consists of designing, implementing, monitoring, and controlling the business process execution, but it lacks continuous quality control of the created BPMN (Business Process Model and Notation) models. Thus, this paper considers the problem of business process models classification based on their correctness, which solution will ensure quality control of the designed business process models. Thus, this study aims to improve the quality of business process models by developing a software solution for business process models classification based on their correctness. The subject of the study is the process of business process models classification based on their correctness, which uses quality measures and thresholds, usually, complexity measures. The subject of the study is a software solution for business process models classification based on their correctness. Therefore, in this study, the algorithm to solve the problem of BPMN models classification using logistic regression, interface complexity, and modularity measures is proposed, the software requirements are determined, the software development tools are selected, the software for business process models classification based on their correctness is designed, the corresponding software components are developed, the use of a software solution for solving the problem of business process models classification based on their correctness is demonstrated, the obtained results are analyzed and discussed. The developed software indicates high performance of BPMN models classification based on their correctness, achieving high accuracy (99.14 %), precision (99.88 %), recall (99.23 %), and F-score (99.56 %), highlighting the high performance of modeling errors detection.
- Published
- 2024
- Full Text
- View/download PDF
16. RESEARCH ON ERROR PROBABILITY ASSESSMENT IN USER PERSONAL DATA PROCESSING IN GDPR-COMPLIANT BUSINESS PROCESS MODELS
- Author
-
Andrii Kopp, Dmytro Orlovskyi, Oleksii Kizilov, and Olha Halatova
- Subjects
business process gdpr compliance ,personal data leakage prevention ,bpmn business process model analysis ,business process model error probability analysis ,personal data protection in business processes ,Technology - Abstract
The only right strategy for businesses and government organizations in Ukraine and other countries that may face aggression is to recognize themselves as a potential target for cyberattacks by the aggressor (both by its government agencies and related cybercriminal groups) and take appropriate measures in accordance with the European Union’s General Data Protection Regulation (GDPR). The main purpose of the GDPR is to regulate the rights to personal data protection and to protect EU citizens from data leaks and breaches of confidentiality, which is especially important in today’s digital world, where the processing and exchange of personal data are integral parts of almost every business process. Therefore, the GDPR encourages organizations to transform their day-to-day business processes that are involved in managing, storing, and sharing customers’ personal data during execution. Thus, business process models created in accordance with the GDPR regulations must be of high quality, just like any other business process models, and the probability of errors in them must be minimal. This is especially important with regard to the observance of human rights to personal data protection, since low-quality models can become sources of errors, which, in turn, can lead to a breach of confidentiality and data leakage of business process participants. This paper analyzes recent research and publications, proposes a method for analyzing business process models that ensure compliance with the GDPR regulations, and tests its performance based on the analysis of BPMN models of business processes for obtaining consent to data processing and withdrawal of consent to user data processing. As a result, the probability of errors in the considered business process models was obtained, which suggests the possibility of confidentiality violations and data leaks of the participants of the considered business processes associated with these errors, and appropriate recommendations were made.
- Published
- 2024
- Full Text
- View/download PDF
17. The effect of cultivation technologies on weed infestation and productivity of peas
- Author
-
A. N. Morozov, D. V. Dubovik, E. V. Dubovik, and A. V. Shumakov
- Subjects
peas ,technology ,weed infestation ,yield structure ,yield ,productivity ,Agriculture (General) ,S1-972 - Abstract
The current paper has presented the study results obtained in 2020–2023, in the stationary field trial of the FSBSI “KurskFARC”. The purpose of the study was to identify and evaluate the impact of technologies with different levels of soil tillage minimization on weed infestation, the formation of yield structure elements and pea productivity in the conditions of the CBR. There have been studied four pea cultivation technologies, such as traditional (plowing at 20–22 cm, main application of N15P40K40 + top dressing with N34); differentiated (chiseling by 20–22 cm + disking by 8–10 cm, main application N15P40K40 + top dressing with N34); minimal (discing up to 8 cm, main application N15P40K40 + top dressing with N34); direct sowing (no-tillage, main application N5P14K14 + pre-sowing N10P26K26 + top dressing with N34). There has been established the advantage of traditional technology in reducing weed infestation, and direct sowing in the formation of yield structure elements, indicators of grain quality and pea productivity. The traditional pea cultivation technology reduced the total number of weeds by 1.9–2.0 times and their dry weight by 1.2–1.8 times during the period critical for the growth and development of the crop, and by 2.1–2.5 and 1.3–2.0 times before harvesting. The highest indicators of plant density for harvesting, the mean number of grains per plant and unit area, and protein percentage in grain were identified with direct sowing, which made it possible to obtain the maximum pea productivity (2.31 t/ha) and protein yield with the harvest (460.6 kg/ha). The use of traditional, differentiated, and minimal technologies contributed to a reduction of plant density before harvesting by 5.4–9.3 %, the mean number of grains per 1 m2 by 4.2–22.6 % and per plant by 0.6–18. 6 %, protein percentage in grain by 0.25–0.90 %, which led to a productivity decrease by 4.3–10.8 %, protein yield per hectare by 5.3–12.6 %.
- Published
- 2024
- Full Text
- View/download PDF
18. Introduction of Salicornia europaea L into in vitro culture
- Author
-
M. F. Koryazhkina, N. A. Dmitrieva, Е. V. Trizno, A. B. Sediki, A. M. Utesheva, and E. S. Skorobogatova
- Subjects
salicornia ,halophyte ,salt tolerance ,germination ,gibberellic acid ,cold stratification ,microclonal propagation ,in vitro culture ,callus culture ,phytohormones ,murashige and skoog ,explant ,Technology - Abstract
The goal of the research was to develop a technology for introducing Salicornia europaea L.into in vitro culture. Methods of cultivating meristems and callus cultures were studied. To cultivate meristems, the tip of the apical bud were used as an explant. Fragments of stems and leaves were used toobtain callus tissue. To study the influence of various factors on germination, seeds were soaked in sterile tap water and in solutions of gibberellin, cytokinin, auxin and NaCl, and were also subjected to cold stratification (independently and with subsequent placement in Knop’s agarized medium). Salicornia seeds were sterilized with various antiseptics: 70% alcohol, 10% aqueous solution of sodium hypochlorite («Belizna»), amoxicillinand 3% hydrogen peroxide. The ability of the culture to form callus was studied in MS medium. As a result, it was determined that the highest germination of seeds was observed in Knop medium after treating theseeds with a suspension of green algae of the Scenedesmus genus, as well as after preliminary cold stratification, and slightly less after treating the seeds with a solution of NaCl and gibberellic acid. The most effective method of seed sterilization turned out to be treatment with alcohol followed by treatment with sodium hypochlorite. A comparative analysis of seed germination in filter paper in Petri dishes, Knop agar medium, Murashige and Skoog (hormone-free) was carried out. The ability of S. europaea L. to form callusin MS medium with phytohormones was assessed. Conclusion. To improve germination, it is recommended to subject the seeds to cold stratification. To obtain aseptic explants quickly, it is recommended to germinate the seeds in the Knop nutrient medium, having previously sterilized them with alcohol, then with sodiumhypochlorite, followed by washing with distilled water. The most suitable type of microclonal propagationfor S. europaea L. is the production of callus tissue followed by induction of organogenesis or embryogenesis.
- Published
- 2024
- Full Text
- View/download PDF
19. Investigation of the dependencies of the Vivaldi antenna with a resonator in the electrodynamic modeling software complex
- Author
-
T. G. Aslanov and S. A. Ibragimov
- Subjects
vivaldi antenna ,curve radius ,conductive plates ,strips ,mathematical model ,resonator ,radiation pattern ,voltage standing wave ratio ,Technology - Abstract
Objective. The goal of the study is to optimize a computer model of a Vivaldi antenna with conductive plates on the same side as the resonator.Method. The study is based on electrodynamic modeling methods.Result.The paper presents a computer model of a Vivaldi antenna with conductive plates on one side with a resonator. A comparative analysis of two types of Vivaldi antennas was carried out of the dependence of the beam width and the voltage standing wave ratio on the radius of the current-conducting plate curve in the form of lobes and the values of the opening in two planes θ = 900 (the plane of the antenna's opening) and φ = 00 (the plane perpendicular to the antenna's opening plane) in the frequency range from 3 to 24 GHz. The influence of the shape, size and position of the resonator on the SWR value and the width of the antenna radiation pattern was determined. VSWR values are given for different shapes and sizes of the resonator. The main parameters of the resonator have been identified, which affect the characteristics of the antenna.Conclusion. Electrodynamic modeling allows us to obtain a Vivaldi antenna with the required radiation pattern width with an improved standing wave ratio.
- Published
- 2024
- Full Text
- View/download PDF
20. Heuristic decision making selection of drone models according to specified characteristics
- Author
-
V. V. Afonin and V. V. Nikulin
- Subjects
drone models ,reduced values of characteristics ,ranking ,average values of given characteristics ,matrix of characteristics ,numerical metrics ,Technology - Abstract
Objective. The noticeable interest in aircraft such as drones for various purposes puts forward certain requirements for their characteristics. Characteristics can be divided into information technology and consumer characteristics from a financial point of view. At the same time, they have their own units of measurement. In this regard, the task of selecting and ranking drones according to some criterion or numerical metric arises. Considering that this problem is quite relevant, this paper considers a certain heuristic approach to sorting a sample of drones by the key of the proposed metric.Method. In the heuristic approach, there is a certain variability in determining the attractiveness of a particular drone in the opinion of the person making the decision to purchase or a specific choice from the existing line of drones available for review based on their characteristics.Result. It is proposed to identify several groups in the existing characteristics, heterogeneous in their properties, both obvious and intuitively created: “good”, “very good”, “less attractive”, “least attractive”. Assuming that several models of drones with the same characteristics are being considered, divided into the specified groups, numerical coefficients are introduced to form a metric by which a given line or selection of drones will be ranked according to the calculated metrics.Conclusion. The proposed heuristic algorithm is based on the transition to the reduced values of numerical characteristics relative to the maximum of each group of characteristics with the calculation of the arithmetic mean of the given values. Depending on the type of specified groups, the coefficients entered into consideration are added or subtracted from the difference between the current characteristic and its average or the difference between the average and the current characteristic. On this basis, metrics are calculated by which the given sample of drone models is ranked.
- Published
- 2024
- Full Text
- View/download PDF
21. About the Assessment of Group aspects of the Human factor influence on Safety of Technical systems
- Author
-
D. I. Lobach
- Subjects
safety level ,human factor ,safeometrics ,prognosis ,safety culture ,gauss distribution ,professionalism ,management ,modeling ,Technology - Abstract
Objective. The purpose of theoretical research is the need to formulate and describe additional approaches and topical issues and tasks when conducting an expert assessment of group (collective) aspects of the human factor's influence on the safety of technical systems.Method. The paper considers the methodology of assessment based on the use of the Gauss distribution for the statistical description of cases of the influence of the human factor on safety, shows the relationship between individual and group aspects.Result. Examples are given and explanations are given for the application of a quantitative assessment of the influence of the human factor on the safety of technical systems, taking into account the consideration of safety culture, different levels of professionalism of employees, organizational measures taken, the possibilities of the method and its potential tasks are formulated.Conclusion. The use of statistical distributions to describe the impact of the human factor on safety makes it possible to combine and describe the relationship between individual and group aspects of the phenomenon. This allows the expert to carry out quantitative assessments, modeling and make predictions on the level of safety culture in the organization and the effectiveness of production management or technical systems.
- Published
- 2024
- Full Text
- View/download PDF
22. Research on the effectiveness of data compression methods in relational and NoSQL DBMS
- Author
-
V. A. Egunov, V. S. Surin, P. S. Stupnitskiy, and R. D. Akhmetova
- Subjects
database management systems ,dbms ,relational dbms ,nosql ,data compression ,zlib. ,lz4 ,deflate ,Technology - Abstract
Objective. The research presented in the paper is aimed at studying the effectiveness of modern DBMSs.Method. Along with traditional relational solutions, NoSQL-based DBMSs are becoming increasingly popular. This is primarily due to the ability of such systems to store and process huge volumes of data. At the same time, to work effectively with this data, it is necessary to ensure its compression. Compression allows you to reduce the amount of stored data and provide quick access to it.Result. A comparative analysis of data compression in the MySQL and OpenSe DBMS was performed.Conclusion. Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.
- Published
- 2024
- Full Text
- View/download PDF
23. Assessment of organization’s innovation activity in view of digital transformations
- Author
-
Liudmila V. Prudnikava and Tatsiana V. Zhyhanava
- Subjects
innovation activity ,digital transformation ,digital maturity ,creation of innovation activity ,creation of innovation ,commercialization of innovation ,effectiveness of innovation activity ,system of indicators for evaluating innovation activity ,Technology ,Industry ,HD2321-4730.9 - Abstract
The relevance of the research topic stems from the necessity methodological tools for evaluating the innovative activity of an organization, taking into account digital transformations that have a direct impact on the level of costs, time and intensity of innovative transformations in an organization under contemporary business conditions. The goal of this study was to systematize and comparatively analyze of methodological approaches to the assessment of innovation and digital transformations in an organization. It also aimed at the development of methodological tools for assessing the innovation activity of an organization, taking into account the relationship between innovation and digitalization. To achieve this goal, general scientific methods of theoretical knowledge were used, including statistical and logical analysis and synthesis, comparison, deduction and generalization, technologies of structural and graphical modeling. The paper substantiates the need to evaluate the innovative activity of an organization, taking into account the level of digital transformation. The systematization of methodological approaches to the assessment of innovative activities of the organization has been carried out, and a conclusion has been made regarding the accessibility and objectivity of the information base and the indicator system proposed by the authors. The interrelation of digital transformations of the organization with its innovative activity is characterized. The systematization of models for evaluating digital transformations of an organization has been carried out, leading to the conclusion that the authors do not pay sufficient attention to the issues of interpenetration of innovations and digital transformations. Based on the results of the study, a methodological toolkit for evaluating the innovation activity of an organization, considering digital transformations, was developed. This toolkit is based on the stages of the organization's innovative activity and the relationship between innovation and digital transformations.
- Published
- 2024
- Full Text
- View/download PDF
24. КІТАПХАНАЛАРДАҒЫ ЖАСАНДЫ ИНТЕЛЛЕКТ: ТАРИХИ-САЛЫСТЫРМАЛЫ ТАЛДАУ ТӘЖІРИБЕСІ
- Author
-
Сабденова, Г. Е. and Қосмырза, Ж. Т.
- Abstract
Copyright of Journal of History / Habaršy Tarihi Seriâsy is the property of Al-Farabi Kazakh National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Studying the conceptual model of the controller in a software-defined network
- Author
-
V.A. Volkov, I.A. Filippov, K.I. Nikishin, and E.I. Gurin
- Subjects
controller ,sdn ,sdn architecture ,anylogic ,network automation ,Technology - Abstract
Background. The central element in a software-defined network (SDN) is a controller that plays a key role in the management and control of network devices. There was a need to research and develop a conceptual model of the SDN controller as the most important part of the network. The purpose of the study is to develop a conceptual model of SDN controller in the AnyLogic program to evaluate the efficiency of data transmission. Materials and methods. This paper examined the performance, resource management efficiency and security of the simulation model. The physical components of the network such as device resource, switching and control nodes are briefly described. An algorithm for traffic distribution, resource management, and control and security functions is developed. The operation of the circuit with the SDN controller is debugged, data is measured, and network performance shortcomings are found. The solution to these shortcomings is to increase the network throughput by increasing the capacity of network equipment. Various tests and evaluation of the performance, efficiency, and stability of SDN controllers and their impact on the network infrastructure were carried out. Results. Setup, configuration of SDN controller network was done. Network with different bandwidths were investigated. Delays and overflows with a set number of incoming packets were identified. Due to the software-defined network with separate control, control and fast configuration of components is possible, it was shown in the experiments. Conclusions. The conceptual model of the SDN controller circuit was considered. But on its basis the positive and negative sides of the scheme with SDN controller have been revealed, and the solution for increasing the network capacity has been revealed.
- Published
- 2024
- Full Text
- View/download PDF
26. On certain aspects of standardization and operating conditions of automated systems
- Author
-
A. O. Efimov, I. I. Livshits, M. O. Meshcheryakov, E. A. Rogozin, and V. R. Romanova
- Subjects
automated system ,information protection ,information security tool ,threat ,vulnerability ,Technology - Abstract
Objective. In this paper, the main aspects of the operating conditions of the AS are considered, as well as the issues of standardization of the stages of the life cycle of the AS (creation, commissioning, maintenance, etc.) at the state level. In this subject area, the technological features of building an AS based on various technical architectures are briefly considered, since both foreign processors based on x86-64 architectures and processors of domestic development based on the Advanced RISC Machine architecture are currently applicable. The use of various components of the AS requires additional study in terms of ordering the composition and configuration of specific SPI. Since each processor has a multi-level architecture, this fact objectively complicates the possibilities for full security testing and detection of all vulnerabilities. Method. In the course of the work, the threats and vulnerabilities of individual components of the AS from the point of view of intentional and unintentional threats are considered. The information on the main state standards applied to ensure the protection of information in the AS at the present time is summarized. Result. The main features of the operating conditions of the AS are considered and it is determined that the vulnerabilities of the components are due to the imperfection of the procedures for developing and covering testing of hardware and software. It is determined that in order to protect information in the AS, it is necessary to build a multi-level protection system with state accreditation. Conclusion. Proposals are presented for the application of state standardization for the protection of information in the AS, taking into account the current and prospective threat landscape, including taking into account the design features (undeclared capabilities) of the components. Overcoming threats is possible with the creation of a multi-level information protection system with state accreditation.
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.