ENERGY AND ELECTRICAL ENGINEERING
Abstract. Objective. The aim of the study is to develop a methodology for calculating a two-cascade thermoelectric system (TPS) for local hypothermia, as well as a theoretical analysis of its operation.
Method. The model is built on the basis of solving three problems, consisting in determining the parameters of a two-stage thermoelectric module (TEM), thermophysical characteristics of the interface system with a biological object, and heat removal for cooling the hot junctions of the thermomodule.
Results. According to the calculation model, the TES was calculated for local hypothermia of soft tissues in the treatment of their inflammation and infectious formations, developed in the laboratory of semiconductor thermoelectric devices and devices of the Daghestan State Technical University. Graphs of the dependence of the change in the cooling capacity of the TEM, the coefficient of performance, the supply voltage on the temperature difference between the junctions for various values of the supply current, as well as the dependence of the voltage on the TEM on the magnitude of the supply current at various values of the temperature difference between the junctions, the change in temperature by cold junction and TEM power from the supply current. The graphs are calculated at a hot junction temperature of 300 K.
Conclusion. As a result of the calculations, it was found that the TV-2-(127-127)-1.15 TEM selected as a result of the calculation will have the following characteristics: an operating power range of 8-10 W with an average temperature difference between the junctions of 65 K, the supply current is 4 .4-5.8 A with a power consumption of 45-85 W, the coefficient of performance is 0.2-0.5.
INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS
Objective. Automated systems are widely used in production, and an important criterion for their reliability is information security. The aim of the study is to provide a balance between possible losses as a result of the implementation of threats and the cost of protection tools that reduce risks using neuro-fuzzy logic.
Method. The developed model is based on the use of fuzzy logic.
Result. A model of integrated information security risk assessment has been obtained, which can be practically applied for a comprehensive analysis of the effectiveness of organizing a protection system for automated systems operating in various fields of activity. The risk indicators of information security of an automated system, described with the help of linguistic variables, are revealed. Based on these indicators, information security risk assessments were obtained from the state of: software; technical support; information support; organizational and methodological support; the level of training and motivation of employees. The fuzzy production rules of the model are formulated to determine the integrated assessment of the information security of an automated system, providing a full account of all factors that have a significant impact on the level of security of an automated system.
Conclusions. A feature of the proposed approach is the formalization of the assessment process, reducing the level of subjectivity in the formation of risk assessments.
Objective. The purpose of the study is to collect publicly available information to identify the main problems that hinder the effective management of information security risks in the business sector.
Method. The following research methods are used: systematization, description and analysis. The necessary data are formed on the basis of information obtained from the analysis of the regulatory framework and research in the field.
Result. In this paper, the relevance of the issue under consideration was substantiated; the significant effectiveness of the risk-based approach in information security management was noted. The key stages of the information security risk management process were described. Next, the main problems of information security risk management for all stages of the holistic process are identified.
Conclusion. The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research on the topic, as well as for the formation of recommendations for resolving the identified problems.
Objective. The purpose of the study is to identify the dependence of the quality of education in a general educational organization on the educational environment.
Method. To determine the influence of various factors on the quality of education, an artificial neural network was trained, for which statistical data were previously collected on the participants in the educational process in the ANEO “Knowledge House”.
Result. An artificial neural network has been implemented, which makes it possible to identify the dependence of individual elements of the educational environment on the quality of education in a general educational organization. The training of the artificial neural network showed an insignificant error in the assessment on a ten-point scale, which, when converted to a five-point system, was about 0.5 points.
Conclusion. The proposed method makes it possible to qualitatively and quantitatively assess the progress of students using an artificial neural network according to data that correlates with the progress of a student in an educational organization.
Objective. The purpose of the study is to reveal the theoretical and practical aspects of mathematical modeling of the angular displacements of the base machine, which allows a deeper understanding of the principles of its operation and interaction with the environment.
Method. With the help of a mathematical model, the issues of the interaction of the base machine with the road surface and the sprinkler farm were analyzed in three dynamic states of the unit in a plane perpendicular to the working movement of the base machine, the angular characteristics of the base machine turning in the transverse direction when hitting an obstacle at different speeds without taking into account the elastic-deforming ability of the soil.
Result. The results of the study make it possible to evaluate the technical parameters of the angular displacements of the base machine on the magnitude of the impacts that disturb the unit.
Conclusion. Allows you to correctly choose the basic principles of building an automatic control system for a sprinkler farm and roughly determine the main parameters of the equipment elements of the base machine of a two-console sprinkler unit.
Objective. The purpose of the work is to check the operability of the proposed method for remote monitoring of patients.
Method. To carry out the test, an experiment was set up in which various categories of people of different ages, including those with diseases. During the experiment, the application should record deviations in various indicators obtained from the sensors of the bracelet, and inform about it.
Result. Thus, the experiment showed that the method of remote monitoring of patients proposed by us is fully suitable for monitoring the current condition. Working by this method, the application recorded all anomalies in the indicators obtained from the sensors of the bracelet, and successfully informed about them.
Conclusion. The application of our proposed method is sufficient to determine deviations in health indicators of patients, track the dynamics of their changes and see the overall picture of human health.
Objective. The purpose of the work is devoted to the development and description of the mathematical model of the Chinese character recognition system, taking into account all the features of writing the Chinese language. The Chinese language learning app with character recognition module can help you replace a native speaker or home teacher for self-study. However, the developed software applications are based only on the creation of a neural network and cannot provide recognition, taking into account all the features of the language, which is so important when studying, therefore this topic is still relevant.
Method. The neural network training model is based on the use of artificial neural networks using the backpropagation algorithm.
Result. The article presents a software implementation of a system for teaching Chinese characters, taking into account the peculiarities of writing, the direction of each feature and its exact definition, taking into account the correct sequence and location in the character, as well as controlling the length of the features.
Conclusion. Each of the writing features is an integral part of learning a language, since it can not only completely change the meaning of the written hieroglyph, but also help the learner to memorize the hieroglyph in a structured way, giving him a clear structure and algorithm of actions for writing the hieroglyph. When errors are detected when writing, the system will indicate to the user where exactly and in what area the error was made, what feature of the language he did not take into account, and attention should be paid to it.
Objective. The purpose of the study is to substantiate the design criteria for optimality, taking into account the multi-criteria purpose and functioning of the object.
Method. The study was carried out on the basis of multicriteria optimization methods, the hierarchy analysis method, the convolution method, and heuristic methods.
Result. The paper describes general problems of multicriteria optimization of mechanical systems. The importance of the problem of substantiating the design criteria for optimality, taking into account the multi-criteria purpose and functioning of the object, and introducing quantitatively measurable goals from a variety of alternative options is indicated. It is noted that the choice and formation of a generalized optimality criterion is the most responsible in solving optimization problems. The need to ensure the correctness of the application of one or another convolution method is indicated. Various approaches to the formation of a generalized optimality criterion are analyzed. Their features, advantages and disadvantages are given. The possibility of correcting parametric constraints in problems of improving optimal solutions is pointed out.
Conclusion. When solving multi-criteria problems, it is necessary to pay great attention to both the formulation of the problem and the choice of a system of criteria and the implemented method for solving the problem.
Objective. The purpose of this work is to study the characteristics of an electric drive using a transistor reducer of an induction motor using computer simulation tools.
Method. The study is based on simulation methods.
Result. The values of the angular velocity are determined at fixed values of the moment of resistance for constructing a static mechanical characteristic, as well as the values of the efficiency and power factor with increasing active power on the motor shaft. The values of similar quantities for the electric motor, which is powered by a phase-shifting capacitor, are determined. The dependences of the power factor and efficiency on the active power on the motor shaft are determined.
Conclusion. The data obtained as a result of computer simulation testify to the effectiveness of the proposed transistor reducer.
Objective. The aim of the work is to develop a methodological apparatus, as well as a mathematical model based on the theory of queuing systems designed to assess the level of security of automated systems.
Method. The theory of queuing systems is considered as a mathematical apparatus. In particular, the problem of eliminating vulnerabilities was considered as a multi-channel CFR with an unlimited queue. The flow of detected vulnerabilities of the automated system was considered as an incoming flow of applications. The system, due to the possibility of detecting many vulnerabilities in a short time, has a queue of vulnerabilities. Information security specialists responsible for eliminating vulnerabilities in this system are considered as service channels. Despite the possibility of mutual assistance between specialists, this paper considers a situation where each employee is tasked with eliminating a specific vulnerability. The outgoing flow of applications is the flow of eliminated vulnerabilities of the automated system.
Result. A methodological and mathematical apparatus for assessing the level of security of automated systems based on their vulnerabilities and the process of eliminating vulnerabilities has been developed. The theory of queuing systems was used as a basis. The assessment of security levels is given depending on the probability of a queue of unresolved vulnerabilities.
Conclusion. The developed methodology can be used to assess the level of security of automated systems. And also allows you to assess the sufficiency of resources spent on eliminating vulnerabilities of a specific automated system.
Objective. The article proposes ways to modify genetic algorithms used to automate the process of scheduling.
Method. The methods of evolutionary calculations, the theory of schedules, genetic algorithms, the developed software product are used in the work.
Result. It is established that the construction of the initial GA population for solving the problem is an extremely important criterion for the convergence of the result. It has been established that the two-stage mutation also allows individuals to be adjusted in the right direction, thereby reducing the time required to perform GA work.
Conclusion. Studies show that the developed methods of GA modification can greatly affect the performance of software in the automated scheduling of educational institutions, a scheme of GA operation has been developed, methods of GA modification have been presented and tested.
Objective. The purpose of the article is to study the performance indicators of software aimed at improving the level of security at objects of particular importance. To date, the issue of improving the hardware and software components of the security system at a particularly important facility, taking into account its specifics and ensuring anti-terrorist measures, is quite urgent. There is an urgent task of evaluating the software of the physical protection system (SFZ) of an object of particular importance, while one of the main questions is which quality indicators to take into account and which methods to use when obtaining objective data, taking into account the specifics of the object of research and the need to increase anti-terrorist measures. In this article, it is proposed to analyze the performance indicators of computer systems software on objects of special importance.
Method. To achieve this goal, such methods as system analysis, computational and expert statistical are used.
Result. The paper presents an alternative approach to the analysis of the parameters of the effectiveness of software in relation to the components of the integrated complex (IC) SFZ, which consists in the transition from quantitative to qualitative assessments, the use of expert knowledge and statistical processing of information received from them. The proposed approach makes it possible to use a single measurement scale, as well as simplify the procedure for measuring the values of individual performance indicators of the software of the subsystems of the IC SFZ during operation at an object of particular importance.
Conclusion. The results obtained can be used for a comprehensive assessment of the operation of software at facilities of particular importance, as well as to increase its security level.
Objective. Currently, fraud is one of the most pressing problems in modern society. The number of victims of scammers using social engineering methods is growing day by day. Because fraud is a type of crime that is very difficult to prove. The aim of the study is to find a method to counteract pretexting as an increase in the information security of the population.
Method. This article uses the following methods: description, analysis, deduction.
Result. The analysis of the description of social engineering methods made it possible to classify them according to the way they influence a person. Also, this analysis led to the conclusion that the most effective method to protect against the threats of social engineering, in particular, from pretexting, is the introduction of technical methods of protection.
Conclusion. The conclusions made in this work can serve as a basis for further research in this direction, as well as the basis for the development and implementation of technical methods for protecting against pretexting threats.
Objective. The purpose of the study is to analyze the possibility of using AI technologies to solve problems related to the selection of employees in project teams, based on production indicators and HR metrics of personnel.
Method. Based on the fact that in the field of AI, methods mean algorithms by which tasks are solved, the following number of methods related to AI theory were identified: neural networks, fuzzy logic, expert systems, evolutionary modeling, Machine Learning.
Result. An example of the use of AI is given in a situation where it is necessary to recruit personnel for a project based on the length of service and the degree of workload (where a scale with values from “highly loaded” to “not loaded” is used for workload). For the described example, an explanation is given that reveals the use of AI technologies (such as question-and-answer systems) in order to form HR metrics and production indicators. Additionally, the process of applying the objective function to obtain a numerical coefficient based on individual metrics or a combination of them is described in order to make a decision corresponding to its value based on the resulting indicator of the function.
Conclusion. Within the framework of the conducted research, the historical patterns that led the field of personnel management to transformation and which made the use of AI technologies relevant in this area were considered. Continuous development and implementation of intelligent tools in the practice of project management facilitates HR processes and increases the efficiency of employee management. The use of AI technologies considered in the study will help to successfully monitor the state of both the project and the project team, which will have a positive impact on the productivity and profit of the enterprise.
Objective. In this paper, the process of developing an ontological model of knowledge of state control bodies in the field of quotas for the extraction of aquatic biological resources is considered. The need to develop this model arose due to the insufficient level of automation of knowledge extraction from data collected and processed manually from eighteen territorial departments of the Federal Agency for Fisheries. Insufficient speed of collecting and processing data on the current level of industrial production of aquatic biological resources may cause incorrect planning during the subsequent distribution of catch quotas, which may lead to a decrease in biological diversity in the reservoirs of the Russian Federation with the subsequent loss of types of aquatic biological resources.
Method. The study used methods of analysis of theoretical and regulatory documentation, analysis of statistical data, as well as secondary data analysis.
Result. An object ontological model of knowledge of state control bodies in the field of quotas for the extraction of aquatic biological resources has been developed.
Conclusion. The developed ontological model makes it possible to accelerate the extraction of knowledge from aggregated data on the level of distribution and development of quotas for catching aquatic biological resources, and also serves as the basis for creating a full-fledged information system for accounting for the extraction of aquatic biological resources and monitoring their population.
Objective. The purpose of the work is to increase the efficiency of the functioning of agents of a cyber-physical system in the presence of agents with incorrect or malicious behavior. The goal is achieved by establishing a trusted interaction between agents and quick detection of malicious impact.
Method. Trusted interaction is carried out using distributed ledger technology and agent confidence indicators. The novelty of the proposed solution lies in the fact that information about the actions of agents is stored and aggregated using smart contracts at specified time intervals. Each agent keeps a local copy of the agent interaction chain. If several agents interact with each other, then they exchange information stored in their copies of the ledger.
Result. To test the proposed method, we implemented it in C++. For the experiments, the scenario of collective perception by agents of a decentralized cyber-physical environment in a specialized simulation program Contiki Cooja was used.
Conclusion. The method implemented using the solutions proposed in this work showed higher efficiency than the method based on the dynamic calculation of the confidence index. The proposed solutions can be applied not only in cyber-physical systems, but also in any other systems with decentralized control.
Objective. The purpose of the study is an analytical review of the legislation for the formation of a system of requirements for ensuring and controlling information security at critical information infrastructure facilities in cooperation between the Russian Federation and the People’s Republic of China.
Method. Reviewed using various benchmarking methods - historical, socio-cultural, legal to find similarities and differences in the approaches of partner countries on the issue of Critical Information Infrastructure.
Result. Proposals have been made to improve Russian legislation regarding the management of information security at critical information infrastructure facilities.
Conclusion. The direction of this study is very relevant and requires further development of organizational and technical measures to implement the requirements of legal documents on the protection of information at special-purpose informatization objects.
Objective. The aim of the study is to formulate a mathematical model of the process of vacuum microwave drying to determine the temperature fields in foamed suspensions. With the obvious advantages of microwave drying in a vacuum, the possibility of overheating of the dried material is not excluded, which affects its quality. Therefore, the limitation on the temperature of the material during drying must be taken into account in the simulation.
Method. The study is based on the methods of simulation computer modeling.
Result. The formulation of the modeling problem for determining the temperature fields in foamed suspensions in a wide range of regime parameters is proposed.
Conclusion. Increasing the accuracy of simulation results by improving the mathematical description is the basis of modern research in the field of technology and equipment for vacuum microwave drying.
BUILDING AND ARCHITECTURE
Objective. Solving the issues of reliability, durability and efficiency of buildings and structures is inextricably linked with the behavior of soils in their foundations. In order to establish a more realistic behavior of soils, the paper considers the determination of their stressstrain state, taking into account new factors, including physical influences, in particular, humidity.
Method. Representing the structure of the soil in the form of a model composed of two elastic and one viscous elements, and assuming that the properties of the elastic elements do not change with changes in humidity, mathematical modeling of moisture stresses in the soil half-space was performed. The expediency of this model is explained by the fact that the transition to overly complicated material structure schemes introduces few significant corrections into the deformation laws and leads to serious calculation difficulties.
Result. Replacing true time with conditional time leads to a significant simplification of the solution of the equation, since it reduces one part of it to a differential linear operator with constant coefficients. In this case, the opposite part can usually be considered as a given function of conditional time. The maximum value of stresses was obtained at full soil moisture, very low moisture intensity and very intensive moisture.
Conclusion. By setting the appropriate moisture intensity, you can get the maximum stress that does not exceed the specified allowable value.
Objective. The aim of the study is to study the operation of multi-span beams with point masses under the simultaneous action of vector kinematic and force loads. Taking into account the influence of elastic-damping supports.
Method. The study is based on the solution of the boundary value problem and modeling.
Result. Free transverse vibrations of multi–span beams of constant cross-section (within each j-th span Aj, and Gj) are investigated taking into account elastic-damping discrete supports. Free and forced harmonic vibrations of the beam from vector kinematic and force perturbations are considered. Examples of solutions for various conditions of fixing a three-span beam at different point masses are given.
Conclusion. The author’s development can be adapted to the fluctuations of the continuo-discrete rods. This algorithm allows you to determine the natural frequencies and forms of free oscillations. It is also possible to calculate multi-span rods for the simultaneous action of vector kinematic and dynamic loads.
Objective. The rational use of fuel and energy resources is one of the urgent problems. One of the promising ways to solve this problem is the use of environmentally friendly energy-saving air source heat pumps based on the use of non-traditional energy sources. The use of such innovative energy-saving technologies requires not only modern architectural and planning, design and engineering solutions, but also sound methodological recommendations for as-sessing their energy efficiency and feasibility. The article presents a methodology for calculating the consumed electrical energy and heat generation, as well as the seasonal indicator of energy efficiency in the operation of an air source heat pump.
Method. The technique takes into account, as input data, experimental data from tests of high-voltage heat pumps in terms of heat output depending on the change in the temperature of the source of low-grade heat and the temperature regime of the coolant.
Result. The need to develop a methodology is due to the shortcomings in the regulatory documents of the methodological basis for optimizing energy costs and heat generation by heat pumps. The accuracy of calculating the operating costs that will occur during the heating period of the air source heat pump (AHP) depends on the correct accounting of the required heat load of a low-rise building and the consumption of electricity to ensure it.
Conclusion. This technique can be applied not only to calculate the annual operating costs of using a heat pump and determine the structure of energy consumption (thermal and electrical), but also to optimize the energy parameters of HHP with an assessment of the energy efficiency of different options for their configurations.
Objective. In this paper, buildings of various shapes that have high seismic resistance are considered. Such seismic resistance is provided by the rational shape and outlines of the building itself. Here, the influence of the torsion of the building in the plan is minimized, thereby eliminating large stresses at the ends of the designed building. At the same time, the translational movement of the building in the plan is preserved.
Method. By optimizing the shape and shape of buildings for various purposes, high efficiency of the structure is ensured under seismic effects. By comparing the shape and outlines of various buildings, the best variant of their layout is selected.
Result. Structural schemes of buildings and structures with high resistance to seismic effects are given. A comparative analysis and recommendation for the design of earthquake-resistant buildings are given. Structural schemes for buildings and structures of various outlines have been developed: round, square, rectangular; constructive schemes of volumetric seismic-resistant structures, pyramidal, conical of various shapes, have been drawn up. Recommendations for the design of earthquake-resistant buildings and structures with optimal geometric shapes are made.
Conclusion.The design schemes proposed in the article can be used in the design of earthquake-resistant buildings and structures for various purposes.
ISSN 2542-095X (Online)