ENERGY AND ELECTRICAL ENGINEERING
Objective. The purpose of the study is to develop and study the design of a thermoelectric null-thermostat, characterized by low power consumption, in which high accuracy of temperature stabilization of the reference junctions of differential thermocouples is achieved by placing them directly near the water-ice interface.
Method. The study was carried out on an experimental model of a thermoelectric null-thermostat. To study heat transfer processes, visual observation of the movement of the ice-water interface in the null-thermostat chamber was carried out. Temperature values were recorded at the lower and upper bases of the chamber, as well as at the hot and cold junctions of the thermoelectric module (TEM) using thermocouples.
Result. The dependences of the change in temperature of the upper and lower base of the working chamber, as well as the phase boundary over time, the duration of time for complete ice penetration on the TEM supply current, and the temperature difference, respectively, between the surface of the cold junction of the TEM and the lower base of the working chamber were obtained , the surface of the hot junction of the thermal module and the upper base of the working chamber.
Conclusion. It has been established that the speed of movement of the phase boundary strongly depends on the value of the supply current of the thermoelectric battery, which corresponds to the heat flow at the upper and lower base of the working chamber. As follows from the data presented, the change in temperature of the upper base is more noticeable than the lower one. At a current of 2, 4 and 6 A, the speed of movement of the phase boundary is 0.007 m/h, 0.01 m/h and 0.013 m/h, respectively. In this case, the duration of complete melting of ice, corresponding to the duration of operation of the null thermostat, when the TEM supply current changes from 2 to 7 A, is reduced from 1,91⋅104 s to 1,38⋅104.
Objective. The main purpose of the work is: investigation of the effect of changes in technological parameters on the efficiency of the separation process and determination of optimal technological modes of operation of gas field X CNTS in the separation process.
Method. The problem was solved in the KBC Petro-SIM computer program and the LTS model was built. To conduct the study, a model of the LTS was built in the KBC Petro-SIM computer program.
Result. The results obtained with the help of it showed: with the current composition of the gas with a decrease in temperature for every 2oC, with other technological indicators being equal, the specific condensate yield increases in the range from 15 to 30%, and the lower the temperature, the higher this percentage. When the pressure on the throttle decreases by every 0.4 MPa, the condensate output increases, if the pressure drops below 1.8 MPa, the specific condensate output will begin to decrease, which is explained by the pressure drop below the maximum condensation line of the phase diagram. The change in gas flow within the design values did not affect the operation of low-temperature separation. At any available low temperature and high pressure at the inlet to the ILTS, the most optimal mode will be when the pressure after the throttle is maintained within 1.8 - 1.9 MPa. The maximum specific yield of gas condensate (48.21%) was obtained at a pressure at the inlet to the ILTS of 5.1 MPa, a temperature after the heat exchanger of minus 2oC and a pressure drop at the throttle of 3.05 MPa. As part of the numerical research, the following results were obtained: with an increase in the pressure at the inlet to the ILTC, the change in the specific output of the gas condensate is insignificant, but with this parameter it is possible to create a larger pressure drop on the throttle; with a decrease in the gas temperature at the outlet of the heat exchanger, the specific yield of the gas condensate will increase; with an increase in the pressure drop at the throttle, the specific output of the gas condensate increases until the pressure after the throttle reaches the range of values of 1.8 – 1.9 MPa. In this interval, the maximum specific condensate yield is achieved. With a further increase in the pressure drop on the throttle, the specific output of the gas condensate decreases. This is explained by the phenomenon of retrograde condensation, since the maximum condensation line is in the range of these pressures.
Conclusion. Based on the results of the work, it was found that the developed software module can be used to solve the emerging series of problems. The results of the work show the suitability of the proposed method for practical purposes.
Objective. Mathematical modeling of heat transfer in pipes with turbulators for viscous heat carriers at Reynolds numbers characteristic of laminar and transient flow regimes is carried out by the calculation method. The solution of the heat exchange problem for semicircular cross-section flow turbulators based on multiblock computing technologies based on the solution of the Reynolds equations (closed for the transient mode using the Menter shear stress transfer model) and the energy equation (on multi-scale intersecting structured grids) by the factorized finite-volume method (FCOM) was considered.
Method. The calculation was carried out on the basis of a theoretical method based on the solution of the Reynolds equations, closed for transient modes using the Menter shear stress transfer model, and the energy equation on multiscale intersecting structured grids (FCOM), by a factorized finite-volume method.
Result. Both local and averaged characteristics of the flow and heat exchange in pipes with turbulators for a viscous coolant for laminar and transient flow modes of the coolant were obtained using the FCOM method in the work, which made it possible to determine for these modes the levels of heat exchange intensification that satisfactorily correlate with the existing experiment.
Conclusion. The calculated relative hydraulic resistance for low turbulators increases quite slightly, and for medium-altitude turbulators reaches 2÷2.5 to the critical Reynolds number, and subsequently it increases up to 3 times; for high turbulators, the relative hydraulic resistance increases up to 4 times even before the transition flow regime is reached, after which it increases up to 4.5 times. The calculated relative isothermal intensified heat exchange under the laminar flow regime of a viscous coolant for relatively high turbulators increases almost 2 times; for relatively medium heights of turbulators — almost one and a half, and for low relative heights, the intensification of heat exchange is insignificant.
Objective. The purpose of the study is a scientific review of the stages of development of refrigeration technology with sorption action on solid sorbents and an assessment of the current state of development of such household equipment in relation to the use of solar energy.
Method. The dynamics of the development of solar energy refrigeration equipment based on sorption thermotransformers, the working vapors of which are solid sorbents and ozone-safe refrigerants, are analyzed. The beginning of development comes from the creation of periodic installations operating from the thermal energy of traditional energy carriers: hot water, burning of hydrocarbon or organic fuels, electric energy, and cooling with water and air and ends with modern refrigeration units operating from the energy of solar radiation and the daily temperature difference of the environment.
Result. The peculiarities of making technical decisions underlying the design of the main devices of solar energy refrigeration units are noted. Circuit designs and operating principles of installations and their devices used to improve operating efficiency are described. The main trends in research conducted by scientists to improve the operation of solar energy thermal transformers of cyclic action are considered.
Conclusion. This article may be useful to young scientists, engineers and designers for the design and development of innovative autonomous thermal transmitters and refrigeration units for cooling and short-term storage of products and medicines, obtaining food ice, air conditioning, operating independently from solar energy. Such installations are easy to manufacture and operate.
INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS
Objective. An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the possibility of combining them.
Method. The method for assessing and comparing biometric authentication methods and solutions is based on practical experience and regulatory and technical documentation on the use of biometric data for information security purposes. It is necessary to complicate the possibility of unauthorized access to information. At the same time, improving the system should not worsen the comfort of a legitimate user when trying to access. The remaining tasks are to reduce entry time and simplify the system.
Result. An assessment of biometric authentication methods and solutions was carried out and a solution was proposed for the development of biometric authentication systems to protect against unauthorized access, the key criteria in which were the complexity of hacking, user comfort, login time and simplification of the system.
Conclusion. The optimal solution in the development of biometric authentication systems would be to use multi-factor authentication using dynamic parameters of the access subject. A modern biometric authentication system should be installed taking into account the level of security required at the time.
Objective. The objective of the research is to develop a methodology for the security of an automated control system of critical information infrastructure from DDoS attacks. The methodology allows the decision-maker to obtain an assessment of the risk of exposure of the computer network (CN) to DDoS attacks and take necessary actions to reduce the risk of this threat.
Method. To achieve the stated objective of the research, simulation modeling based on the Monte Carlo method was used, implemented within the framework of a specialized software environment, as well as a method for calculating integral risk.
Result. A methodology was proposed for assessing the security of an automated control system for critical information infrastructure from DDoS attacks, taking into account the importance of individual nodes of its CN.
Conclusion. Thus, the developed methodology is useful when conducting an information security audit to assess the integral risk of impact implementation of a DDoS attack on a CN and is designed to help an organization achieve global information security goals, as well as to justify the amount of the insurance premium paid when insuring cyber risks.
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. The main task is to analyze malware to assess threats and timely detection and take action.
Method. For analysis, you should use an isolated environment with a customized environment and software.
Result. This paper describes the process of creating an isolated stand for malware analysis and conducted a practical analysis of the malware.bin file taken from the cyberdefenders.org educational resource. Network interfaces are configured to prevent impact to the network that connects the two virtual machines. As a result of the analysis of the techniques and features used in this malware, it was revealed that it belongs to the Dridex family of banking Trojans. To obtain information from this family, you can use the AppGate Lab Dridex Toolkit.
Conclusion. Based on the analysis performed using static and dynamic methods, detection rules can be developed for further identification of malware.
Objective. The aim of the work is to assess the possibility of applying the theory of “gray systems” to build a methodology for predicting the number of identified vulnerabilities in conditions of uncertainty of influencing factors and lack of initial data, including a comparative analysis of the results of this prediction obtained using traditional and improved models of the theory of “gray systems”, as well as machine learning models.
Method. The paper describes a technique for constructing a “gray model” for predicting the number of identified vulnerabilities based on the theory of “gray systems”. The initial data for forecasting is information obtained from the CVE (Common Vulnerabilities and Exposures) vulnerability database. In the course of the study, the results of forecasting obtained using the developed “gray model” and the linear regression model implemented on the basis of the scikit-learn library and the Python programming language are analyzed.
Result. The use of a linear regression model and models based on the theory of “gray systems” to predict the number of identified vulnerabilities allows you to get close forecast values. According to data obtained from the CVE vulnerability database, information on 7,015 identified vulnerabilities was published for the 1st quarter of 2023. The forecast obtained on the basis of the traditional model of the theory of “gray systems” turned out to be the closest to the published value. It should be noted that the forecast of the “gray model” is based only on the values of the initial data and does not depend on the circumstances arising in the field of information security, which is a limitation in the use of the proposed methodology.
Conclusion. The results of the study indicate the possibility of applying the theory of “gray systems” for short-term forecasting of the number of detected vulnerabilities. The application of the developed methodology makes it possible to carry out the specified forecasting with a limited number of initial data.
Objective. The aim of the study is to develop an effective express method for the formation of a representative expert coalition based on the analysis of correlations between expert opinions.
Method. It is proposed to use an extended correlation matrix, which takes into account not only the strength of the correlation between the experts’ ratings, but also the average value of the ratings for the entire set of highly qualified specialists. This matrix will take into account the diversity of opinions and preferences of highly qualified specialists, as well as provide a high degree of representativeness in making collective decisions.
Result. Verification of the obtained results was carried out on the example of polls of police officers in relation to violators of security systems. A significant number of various calculations determines the implementation of the developed numerical method using a computer. This express method is a useful tool for the rapid and efficient formation of representative expert coalitions and decision-making based on the opinions of a large number of highly qualified specialists.
Conclusion. The proposed method can be applied in various scientific and technical fields, such as expert systems, multi-criteria decision making, risk assessment, and other situations where it is necessary to combine the opinions of a large number of experts.
Objective. The purpose of the study is to develop a technique for obtaining an analytical solution to the thermal conductivity problem for a 2-layer plate under boundary conditions of the 1st kind.
Method. The research method is based on the integral method. In this case, an additional function (DF), additional boundary conditions (ABC) and local coordinate systems are introduced. The DF describes the temperature over time at one of the points of the twolayer system. Its use reduces the partial differential equation to an ordinary equation. DKUs allow you to perform equations on boundaries.
Result. It is shown that satisfying the equations on the boundaries leads to their fulfillment inside the domain. Note that additional boundary conditions are satisfied for any other method of obtaining analytical solutions. The only difference is that they are not accepted as conditions subject to separate consideration. An additional function is also a quantity that is determined by any other method of obtaining a solution. The only difference is that it is not singled out for separate consideration.
Conclusion. It can be stated that the introduction of an additional function and additional boundary conditions does not distort the original formulation of the problem and is only a means to significantly simplify the process of obtaining an approximate analytical solution and the final expression for it.
Objective. Structuring of publicly available information regarding the protection of the upper hemisphere of CII objects.
Method. The following methods of scientific cognition are used: systematization, description, analysis, deduction. The article consists of three sections. First, an analysis of the current state of the issue of the need for protection from UAVs is carried out. Accounting is not only military infrastructure, but also civil. In addition, for analysis, the separation of drone attacks is carried out in order to physically destroy the CII object / its part or attack the technical component. In the second part of the work, the analysis of the regulatory framework of Russia and the EU countries is carried out. The greatest emphasis is placed on domestic legislation and the identification of problem areas in relation to the research topic. In the third part of the work, a draft of proposals for the protection of CII objects from threats emanating from UAVs is presented. To do this, the analysis of drone varieties is carried out, the requirements for the system of protection and search for intruders are determined.
Result. The article investigates the problems of protecting CII objects from drone attacks. A constant increase in UAV attacks on civilian and military infrastructure was noted, problems of the regulatory framework of Russia in the direction were identified, a proposal for the protection of the upper hemisphere was developed.
Conclusions. The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research in the direction and for the development of relevant regulatory documents.
Objective. Today, significant and in many ways sensational results are being achieved in the field of artificial intelligence systems, and the ChatGPT bot, which is based on the GPT-3 neural network, is called a real revolution in the world of technology.
The aim of the study is to analyze and evaluate the application features, advantages and limitations, as well as development factors and reasons for the extraordinary popularity of the neural network dialogue system ChatGPT.
Method. A review of domestic and foreign sources, systematization of data, analysis of the architecture and mechanism of action of the neural network was carried out. Result. Functions, opportunities, scopes and risks of using ChatGPT are summarized and evaluated.
Conclusions. The main function of ChatGPT – text generation based on given input data – allows to effectively solve a wide range of tasks that have not been automated before, and the quality of the solution is comparable to human work. However, it is important to avoid the risks associated with the possibility of abuse and receiving incorrect and malicious responses from artificial intelligence. This requires control measures, the development and introduction of standards and norms.
Objective. The purpose of the research is to develop and train a neural network model based on convolutional neural networks for effective recognition of road signs in images.
Method. Deep learning methods were used, namely convolutional neural networks, which allow you to automatically extract image characteristics and train on a large data set. The research methodology included the following steps: collecting and preparing a variety of road sign data, creating and training a neural network model based on convolutional layers, applying data augmentation methods to improve model performance, and evaluating the model’s effectiveness on a test data set.
Result. A neural network model is developed that can classify various types of road signs based on input images with high accuracy. The model was trained on diverse and high-quality data, allowing it to generalize and recognize road signs in different lighting conditions and camera angles. The use of data augmentation techniques significantly increased the model’s performance and improved its generalization ability.
Conclusion. The study highlights the importance of using diverse and high-quality data to train a model and applying data augmentation techniques to improve its performance. The study confirms the effectiveness of using neural networks, especially convolutional neural networks, for the task of recognizing road signs in images.
Objective. The problem of designing controllers that implement a given programmed movement of a controlled object and the problem of determining the movement of a dynamic system are two main problems in classical control theory. This article discusses the solution of direct and inverse optimal stabilization problems. The state vector is assumed to be completely available for measurement.
Method. Based on the optimality ratio linking the weight coefficients of the quadratic quality functional and the optimal gain matrix, which closes the control object, it is proposed to use a numerical method for determining the functional matrices. Mathematical models of autonomous fully controlled objects were used for the study, the formation of which was carried out randomly, in particular, according to the normal distribution law.
Result. The initial stage of the solution is associated with modal synthesis, the result of which is a proportional regulator that provides stabilization of the control object by the location of the poles of the synthesized system. The next step is to determine the weighting coefficients of the functional by numerically solving the optimality ratio. The final stage is the solution of the direct optimal stabilization problem, which is based on the Lagrange variational problem. As a result, the optimal regulator is calculated, which, when switched on in a closed system instead of a modal one, reduces the duration of the transient process.
Conclusion. The proposed approach of the authors allows minimizing to a certain extent the transients of the adjusted control system.
Objective. The article discusses issues related to the process of developing client Web applications for IT projects, which are based on the principles of decentralized network technology - blockchain. The authors explore practical ways to implement the user authorization process and its interaction with the blockchain network through a client application.
Method. The MetaMask browser extension was chosen as a research tool, which allows you to develop, test and run your own software modules.
Result. In the course of the study, the analysis of MetaMask tools was carried out, the processes associated with the start of work were considered both from the point of view of the developer and from the point of view of the wallet user. Understanding the organization of these processes will allow users to form the necessary knowledge in the development of client applications built on blockchain.
Conclusion. The program code templates developed by the authors can be used as standard ones in the development of client applications in the decentralized Ethereum network. The advantage of the proposed solutions lies in the use of simple software structures that allow the formation of basic principles.
Objective. Monitoring and determining the state of crops in agricultural production requires the use and improvement of neural network methods of artificial intelligence.
The aim of the study is to create a mathematical model of the learning process of the DeepLabV3 neural network for intelligent analysis and segmentation of agricultural fields.
Method. Based on the newly formed RGB database of images of agricultural fields, marked up into four classes, a neural network of the DeepLabV3 architecture was developed and trained. Approximations of the learning curve by the modified Johnson function are obtained by the methods of least squares and least modules.
Result. A statistical assessment of the quality of training and approximation of neural networks to the DeepLabV3 architecture in combination with ResNet 50 was carried out. The constructed DNN family based on DeepLabV3 with ResNet50 showed the efficiency of recognition and sufficient speed in determining the state of crops.
Conclusions. Approximation of the neural network learning diagram to the DeepLabV3 architecture, using a modified Johnson function, allows us to estimate the value of the “saturation” of the simulated dependence and predict the maximum value of the neural network metric without taking into account its possible retraining.
Objective. The purpose of the research is to develop an innovative automated program associated with a completely new irrigation regime based on a closed water supply system.
Method. Methods of modeling, formalized description, optimal design and control of technological processes and production were used.
Result. An automated control system in greenhouse farming based on Arduino controllers and ONI PLR Studio software for its operation are presented. The scientific novelty of the work lies in the creation of appropriate modes of the climate control system in greenhouses. The ONI PLR Studio program is written in FBD language. It solves important problems of controlling the cultivation of agricultural products, breeding new plant varieties, and controlling the technological process using certain signals. User input is limited to software adjustments and direct setting of controller parameters. The adjustment can be carried out remotely through a computer connected to the controller. The automatic operating mode is provided by sensors and a controller with electronic control circuits, which ensure that the actuators operate in the required mode.
Conclusion. An automated control system (ACS) allows you to control air and soil temperature, soil and air humidity, soil nutrition, disinfection, air pressure, lighting, the presence of carbon dioxide in the greenhouse, and climate control.
Objective. The aim of the study is to develop methods for data compression in relation to monitoring systems.
Method. The studies were carried out mainly experimentally, by processing data generated by the information-measuring system of the Altai State Technical University in the process of meteorological observations, temperature control and control of the consumption of such energy resources as hot and cold water, heat supply. However, when it was proposed to change their structure and presentation form to compact the stored data, the degree of compression was found theoretically.
Result. The results of studies conducted with the participation of the author of the publication in the field of data processing, transmission and storage are presented. Methods for streaming data compression “on the fly” as it arrives, both lossy and lossless, as well as methods based on optimizing the structure of databases designed to store information collected during monitoring, are considered. The main attention is paid to the consideration of data compression created in the process of temperature monitoring, since it is the control and monitoring of temperature processes that is most common in various technical process control systems, heat metering systems both on the consumer side (housing and communal services) and on the side of the heat supply organization.
Conclusion. In the vast majority of cases, lossless compression allows you to compress the information received from the monitoring system by more than 10 times, and lossy compression is much stronger, and without losing the pragmatic value of the stored information.
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.
Method. The research was carried out based on the method of analyzing possible threats to the security of operating systems, as well as the requirements of the GOST R ISO/IEC 15408 standard.
Result. The result of the automated system for calculating the security indicator of the analyzed OS is one of the specified criteria for indicators of the degree of security of the OS. By comparing the obtained indicator, the corresponding result is output.
Conclusion. The authors provide a generalized algorithmization of the processes necessary for developing software for assessing the security of the AIS OS of the Russian Federation ATS.
BUILDING AND ARCHITECTURE
Objective. The purpose of the study is to find prospects for the development of domestic large-scale isothermal LNG storage facilities to meet the required volume of export supplies from the Russian Federation.
Method. During the study, modern methods of design, analysis of materials and structures were used.
Result. Types of sections and joints of elements are presented. The general construction design and construction of an external reinforced concrete tank is described, taking into account the corresponding connections to the foundation and internal tank, internal tank, secondary bottom, vapor barrier, thermal protection system, domed roof, suspended ceiling, as well as the thermal insulation system of the tank. To ensure higher performance characteristics of the structure, a concrete strength class is recommended for the base slab and roofing slab and walls, as well as thermal insulation material. Requirements for the designs and materials of protective fences for large-capacity isothermal LNG storage facilities have been determined.
Conclusion. The systemic relationship between all components of special building structures, building and thermal insulation materials has been determined.
Objective. The purpose of the study is to experimentally measure the surface energy of solids during their grinding.
Method. The study is based on the use of methods for determining the surface tension of solids. At least 20-25% of all electricity produced in the world is spent on grinding materials in industry. When the resulting particles are reduced to tens of nanometers, the contribution of surface energy (st) to the grinding work becomes so large that it is difficult not to take it into account. Measuring the surface tension of liquids has long been proven. But measuring (st) of solids causes great difficulties. Currently, more than twenty methods for determining (st) are known.
Result. Based on the phenomenon of spontaneous bending of thin thread-like structures, a method for determining (st) has been developed. Examples are given in which (st) at the phase interface plays an important role in obtaining samples with a microstructure using the method of severe plastic deformation (SPD). To obtain fine metal powders, one of the variants of the SPD method has been proposed. A method has been found for the physical activation of aluminum granules, which increases the reaction rate of the metal in an aqueous environment by about a thousand times. This is necessary for the development of an anaerobic power plant capable of operating at great depths.
Conclusion. The new technology makes it possible to obtain high-purity, non-oxidized metal powders without toxic waste and emissions and with energy costs lower than in all known methods.
Objective. The task has been set to develop materials and technologies for repair, restoration and restoration of cultural heritage objects (CHOs) - historical and cultural monuments of CHOs that meet the requirements.
Method. The work uses modern methods of physical and mechanical testing of materials and structures, including destructive and non-destructive quality control methods, as well as a modern mathematical apparatus for generalizing and processing experimental and statistical data.
Result. Due to the fact that the South of Russia is rich in cultural heritage, and a significant number of historical and cultural monuments have been destroyed as a result of natural and man-made impacts, special attention is paid to the scientific substantiation and development of technological and technical solutions aimed at improving the efficiency of their repair, restoration and restoration.
Conclusion. The work has developed methodological and methodological foundations for organizing work, a scale for assessing damage and destruction of historical and cultural monuments, and repair and restoration compositions based on air and hydraulic lime binders that meet the repair and restoration requirements.
Objective. This article is a continuation of the topic raised in the article “Systems with optimal geometric shapes”, published in the previous issue of this journal. The purpose of the study is to develop design diagrams and explanations for them, outline the principles of their operation, design features that provide the necessary seismic resistance.
Method. To ensure adaptability, various design techniques are used: switching connections, switching connections, switching connections, buildings and structures consisting of various structural blocks having different frequencies of natural oscillations. Thus, the blocks of the building dampen each other during vibrations, thereby providing the necessary seismic resistance during earthquakes.
Result. Structural systems with adaptive properties that impart high seismic resistance to buildings and structures are presented.
Conclusion. The design techniques outlined in the article ensure high seismic resistance of buildings and structures, which can be used in the practice of designing and constructing earthquake-resistant systems.
ISSN 2542-095X (Online)