Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search
Vol 50, No 4 (2023)
View or download the full issue PDF (Russian)
https://doi.org/10.21822/2073-6185-2023-50-4

ENERGY AND ELECTRICAL ENGINEERING

6-16 261
Abstract

Objective. A booster compressor station (BCS) is one of the key technological facilities necessary to ensure the effective operation of low-temperature separation technology for natural gas in field gas preparation systems for transportation. Ensuring promising operating modes of booster compressor stations with high efficiency is an urgent task. Method. One of the tools for solving this problem is mathematical modeling of the operating modes of centrifugal compressors (hereinafter - CPC), which are part of gas pumping units (GPU). The basis of the mathematical model is the gas dynamic characteristic (GDC) of the pulp and paper mill. The existing regulatory documentation presents simplified methods for modeling HDC, which are suitable for low-pressure pulp and paper mills with a pressure ratio of up to 1.5 and the number of compression stages of no more than three, but are not suitable for multi-stage high-pressure pulp and paper mills. Result. The results of a comparison of three methods of modeling the hydrodynamic characteristics (method of reduced characteristics, refined method of reduced characteristics, method of two-parameter approximation) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 2.0, intended for equipping a gas pumping unit as part of field booster compressor stations. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. When using the UMPH-2D modeling method, the smallest errors were obtained (no more than 2.0%), which, in turn, indicates its highest accuracy among the considered methods for recalculating the gas flow characteristics of high-pressure and multi-stage compressors.

17-25 225
Abstract

Objective. The purpose of the work is to develop practical recommendations for the design and manufacture of a heat exchanger using heat pipes, which could find widespread use in heating, ventilation and air conditioning systems at facilities for various purposes. Method. The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology, air conditioning and life support systems. Result. The implementation of the practical recommendations studied in the work on the use and design of heat exchangers using heat pipes in ventilation, heating and air conditioning systems will provide significant savings in energy spent on heating and/or cooling the air supplied to the room served by the HVAC system. To reduce heat loss in a building, it is rational to maintain air balance and compensate for the exhaust air with an organized influx of outside air, to heat which the heat of the removed exhaust air is utilized. Conclusion. Compared to a heat exchanger based on a glycol recuperator, a regenerator using heat pipes is less energy-intensive, requires virtually no maintenance, and is also more energy efficient due to the absence of a pumping device that requires electricity in the design. At the same time, the ability to completely separate the supply and exhaust ventilation flows of the regenerator on heat pipes is preserved, which is extremely in demand in medical institutions, due to the need to comply with strict sanitary standards.

26-36 235
Abstract

Objective. The purpose of the study is to determine the prospects for using a membrane refrigeration unit for the production of cold as an alternative to absorption. Method. The study was carried out using a numerical experiment and verification of the results obtained on an experimental bench. Result. An analysis was made of the use of a traditional absorption refrigeration machine and a membrane refrigeration machine from the point of view of energy efficiency and the number of working elements. Presented for comparison are methods for calculating the separation process of the “absorbent-refrigerant” mixture based on reverse osmosis processes and a water-ammonia absorption refrigeration unit. Conclusion. The use of separation processes in membrane apparatuses for the production of cold in mixed refrigeration machines, as an alternative to absorption refrigeration machines, will ensure a more stable process for obtaining refrigerant from the mixture, reduce material costs for the production of a refrigeration unit and increase the energy efficiency of a refrigeration unit operating on mixed components.

INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

37-50 231
Abstract

Objective. The purpose of this article is to research and develop interpolators in the C++ programming language, including linear, quadratic and cubic interpolators, as well as a one-dimensional RBF interpolator. The main tasks are the use of the GSL library, the Lagrange interpolation polynomial, OpenMP, and comparative analysis with the SciPy library. The experiments are aimed at evaluating the effectiveness and applicability of various interpolation methods. Method. The work uses the GSL and Eigen libraries to implement interpolators and optimize computational processes. Linear, quadratic, and cubic interpolators are used to compare performance, and a one-dimensional RBF interpolator is being developed. The Lagrange interpolation method and parallel computing using OpenMP and SIMD are also used to improve efficiency. Result. The results of the research include the successful development and implementation of various interpolation methods in C++. Particular attention is paid to the analysis of the performance and accuracy of each method. Through a comparative analysis with the SciPy library, the authors identify the advantages and disadvantages of various interpolators. The main result is the practical applicability of these methods in the context of specific interpolation problems. Conclusion. The study made it possible to make sure that the implementation of interpolators in the C ++ language has some significant advantages compared to using the SciPy library. In particular, C++ allows for more precise and faster control over calculations, which is especially important in tasks related to numerical interpolation methods. The GSL and Eigen libraries provide powerful tools for optimization and high performance computing, which allows you to achieve high efficiency when implementing interpolation in C ++.

51-58 274
Abstract

Objective. The aim of the study is to implement and evaluate the optimization method based on the Markowitz portfolio theory. Method. The model is built using the Python programming language and the necessary libraries. Also, to solve the problem, the principles of financial theory were used - the calculation of the risk of the purchased asset, portfolio diversification and the principle of optimality. These principles form the basis of financial theory and help you make informed decisions related to investment, financing, and risk management. Result. A model of the program has been compiled, which accepts historical data on changes in the value of shares of different companies as input. After that, the optimal portfolio is calculated and displayed in the terminal of the user-investor. Markowitz portfolio theory helps to determine the optimal portfolio that provides the maximum return for a given level of risk or the minimum risk for a given return. The optimal portfolio is tangent to the risk-free asset curve and is the best choice for the investor, given his preferences. Conclusion. The method of forming an investment portfolio developed by Harry Markowitz, aimed at the optimal choice of assets, proceeds from the required ratio of profitability/risk. The ideas formulated by him form the basis of modern portfolio theory. Portfolio theory Markowitz defines an efficient set, which is all possible portfolios with different combinations of assets that provide the same level of risk. Investors can choose portfolios from this set depending on their personal goals and limitations. The variety of assets in a portfolio helps reduce the overall level of risk and improve the risk-reward ratio.

59-74 189
Abstract

Objective. The paper defines the relevance of the task of increasing the efficiency of software, which in this case is understood as reducing the operating time of the designed software in the process of solving computationally complex problems. Method. As an example of such a task, the implementation of the singular value decomposition by the Jacobi method is used. This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. The paper discusses methods for improving the efficiency of software for target computing architectures using CUDA. Result. The existing analytical models for evaluating the effectiveness of computer programs are described. The influence of various optimizations, such as optimization of data transfers, use of the unified memory system, the number of threads, memory access patterns, and a number of others on the efficiency of the resulting software is considered. The process of optimizing the SVD implementation program is described, the results of computational experiments are presented. Conclusion. As the number of threads increases, performance may increase more than the number of threads. Impact of memory access pattern: When the memory access sequence is optimal, performance improves noticeably. Adjusting the share of memory used for L1 cache and shared memory does not have a significant impact on performance

75-84 299
Abstract

Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area of research is the use of neural network technologies in organizing secure access to information systems. Biometric authentication tools can be classified as highly reliable only if they include cryptographic authentication mechanisms that work together with biometric authentication mechanisms through the conversion of biometric images into a unique cryptographic access code; in this case, a set of biometric identifiers of the user’s identity form his fuzzy image, which is used later during authentication. The purpose of the study is to develop an algorithm for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations. Method. The development of the algorithm is based on the use of fuzzy logic methods and neural networks. Result. The work reveals the features of biometric identification of the user of information systems. An algorithm is proposed for providing secure access to information systems using biometric authentication based on a fuzzy image of the user’s personality and neural network transformations. Conclusions. Based on two-step authentication of the user’s identity, secure access to the information systems of registered users is implemented. A listing of the program code in Python for creating and training a neural network of a bioidentifier classifier is provided. The materials of the article are of practical value for specialists in the field of providing secure access to information systems using artificial intelligence.

85-92 255
Abstract

Objective. The purpose of the article is to analyze existing methods and procedures used to assess the level of software security of automated systems, based on a study of scientific literature, international and industry standards of the Russian Federation on information security of automated systems, guidelines and methodological documents of the Federal Service for Technical and Export Control Russia, as well as departmental orders on the protection of information from unauthorized access at informatization facilities of internal affairs bodies. Method. To achieve this goal, the method of system analysis of approaches used in assessing the level of software security in automated systems was used. Result. The results of an analysis of the main approaches to assessing the level of software security in automated systems are presented. The expediency of combining the considered approaches to carry out a quantitative assessment of the level of software security at informatization facilities of internal affairs bodies in real time, taking into account vulnerabilities in the software used, is substantiated. Conclusion. The results obtained can be used to generate indicators of the level of software security in automated systems of internal affairs bodies and to develop methods for their calculation taking into account the time factor.

93-100 262
Abstract

Objective. The purpose of this study is to develop and analyze methods for neutralizing «zero-day» threats in order to increase the level of cybersecurity and protection of information systems. Method. In this article, a behavioral analysis of the threat is used. The characteristic features of the zero-day exploit behavior have been studied. The threat model is based on solving the tasks of timely detection and neutralization of the threat. Result. The actual problem of information systems security - the threat of «zero-day» is considered. The review of existing neutralization methods and discussion of effective new approaches were carried out. It has been revealed that the main vulnerability is outdated threat signatures. Threat detection is based on a study of the behavior of software a comparison with the previous day tracking is possible mainly by analyzing log files taken from an automated workplace. Conclusion. The content of this work emphasizes the importance of developing methods to neutralize «zero-day» threats in order to avoid the centralized spread of vulnerability and infection of a large number of automated workplaces, which can lead to the suspension of production processes within a large enterprise.

101-108 280
Abstract

Objective. In this paper, the main aspects of the operating conditions of the AS are considered, as well as the issues of standardization of the stages of the life cycle of the AS (creation, commissioning, maintenance, etc.) at the state level. In this subject area, the technological features of building an AS based on various technical architectures are briefly considered, since both foreign processors based on x86-64 architectures and processors of domestic development based on the Advanced RISC Machine architecture are currently applicable. The use of various components of the AS requires additional study in terms of ordering the composition and configuration of specific SPI. Since each processor has a multi-level architecture, this fact objectively complicates the possibilities for full security testing and detection of all vulnerabilities. Method. In the course of the work, the threats and vulnerabilities of individual components of the AS from the point of view of intentional and unintentional threats are considered. The information on the main state standards applied to ensure the protection of information in the AS at the present time is summarized. Result. The main features of the operating conditions of the AS are considered and it is determined that the vulnerabilities of the components are due to the imperfection of the procedures for developing and covering testing of hardware and software. It is determined that in order to protect information in the AS, it is necessary to build a multi-level protection system with state accreditation. Conclusion. Proposals are presented for the application of state standardization for the protection of information in the AS, taking into account the current and prospective threat landscape, including taking into account the design features (undeclared capabilities) of the components. Overcoming threats is possible with the creation of a multi-level information protection system with state accreditation.

109-114 229
Abstract

Objective. The purpose of the study is the functionality of designing, building and implementing protection systems taking into account the time factor. Method. The analysis of the functional interaction of the construction of three sequentially interconnected dynamic models and data transfer between them is carried out. Result. A general model of the system of protection and forecasting of possible threats in ensuring the security of information and infrastructure, taking into account the time factor, has been developed and proposed for implementation. Conclusion. The field of information security considered in the article is a necessary component of ensuring the protection of information resources and related systems from various threats. The application of the basics of dynamic modeling of data, processes and structures in terms of time, allows you to assess risks and threats, identify certain significant shortcomings and eliminate them, thereby optimizing costs, increasing the efficiency of ensuring security

115-120 234
Abstract

Objective. The aim of the study is to develop an algorithm for identifying the parameters of a homogeneous nested piecewise linear regression model of the first type by the method of least modules. Method. Estimation of its unknown parameters is carried out with the help of reduction to the problem of linear Boolean programming. Its solution should not cause computational difficulties due to a significant number of effective software tools - for example, the well-established and freely available program LPsolve on the Internet. Result. The generated linear programming problem has an acceptable dimension for solving practical modeling problems. Conclusion. The results of solving a numerical example indicate the effectiveness of the method proposed in the work for calculating parameter estimates for a homogeneous nested piecewise linear regression model of the first type by the method of least modules.

121-128 196
Abstract

Objective. Extraction of aquatic biological resources is an important sector of the Russian economy. Along with the achievement of high economic indicators, which are aimed at harvesters, in the foreground, in addition to production, the requirement to preserve populations and maintain the diversity of aquatic biological resources is also highlighted. Achieving the goals set on the basis of the listed requirements is possible by increasing the efficiency of processing information obtained from operational reports collected by departments of territorial administrations. The lack of automation in the processing of spreadsheets and the generation of analytical reports in manual mode makes it difficult to form a clear generalized picture of the state of the industry. Method. In the present study, methods of data mining analysis, analysis of statistical data were used. Result. A data mining model has been developed to study the system of quotas for catching aquatic biological resources, created in the Loginom program. Conclusion. The developed model allows not only to estimate the levels of development of quotas, but also to predict the levels of development using the arimax module, and also shows the possibility of creating a full-fledged information system for accounting for the extraction of aquatic biological resources based on it.

129-138 166
Abstract

Objective. Technologies of vacuum dehydration of solutions in the microwave field are constantly developing in the direction of increasing the energy efficiency of the drying process and reducing the cost of target products. This scientific direction fully applies to vacuum microwave drying of soy suspension in a foamed state. In this regard, the most important task is to improve mathematical modeling, which provides significant assistance in the study of heat and mass transfer processes occurring in vacuum dryers with microwave power supply; in the design of new installations and the development of effective modes of their operation; the development of optimal modes of vacuum drying foamed soy suspension, taking into account thermophysical and electrophysical characteristics. Method. The research is based on computer simulation methods. Result. Using the results of previous studies, a mathematical apparatus was obtained for finding the temperature in a foamy product during vacuum microwave drying. Its difference from existing mathematical models lies in the possibility of using simple methods for analyzing differential equations with fewer unknown variables. A method of numerical and analytical solution of a mathematical model of the process of vacuum microwave drying of foamed suspension is proposed. Experimental verification showed quite satisfactory convergence of the simulation results with an error of 10-12%. Conclusion. The study of numerical methods for solving the formulated problem makes it possible to determine the temperature at any point of the soybean suspension, taking into account the thermophysical and electrical characteristics of the suspension in a wide range of operating parameters.

139-147 189
Abstract

Objective. Currently, there is a problem of developing low-cost and functional SOTC controllers with support for algorithms for controlling the totality of elements of life support systems and subsystems of HMB OOV, for example, access control and management systems (ACS), as well as the possibility of integrating the proposed SOTC solutions into existing HMB facilities. This article proposes circuit engineering and software approaches to the organization of promising STS implemented on the basis of programmable microcontrollers. Method. To achieve this goal, a systematic approach has been applied, and obtaining a quantitative assessment of the probabilistic characteristics of detecting an intruder is based on the use of mathematical modeling methods. Result. A completed circuit design for a special-purpose COTS controller has been developed, capable of solving highly specialized tasks in OOV, and also characterized by an obvious balance of functional characteristics and cost indicators. Conclusion. The developed SOTS based on universal microcontrollers makes it possible to ensure ease of implementation of security complexes and, if necessary, change the composition of the modules used to transform the intended purpose of the OTS device while maintaining the parametric indicators of the quality of the information system, helps to optimize control and automation processes at OOV in conditions of minimizing costs.

148-157 429
Abstract

Objective. Development of practical recommendations for creating an effective information security incident response system. Method. The article includes an analysis of existing methods and tools for detecting and analyzing information security incidents, as well as a study of the consequences of such incidents and their impact on the work of a company or organization. Result. Development of a set of practical recommendations aimed at creating an effective information security incident response system. During the analysis of existing methods and tools for the detection and analysis of information security incidents, the most effective and adapted approaches were identified. These methods include both technical means of detection and rapid incident response processes. The recommendations were created taking into account the characteristics of companies and organizations of various industries and are also intended for use by persons who do not have deep knowledge in the field of information security. The recommendations include clear step-by-step instructions, resources and tips that will allow companies to easily implement the proposed measures in their practice. Conclusion. The development of an effective information security incident response system is critically important for companies and organizations, as they face an increasing number of cyber-attacks and threats to information security. Creating an effective information security incident response system is an integral part of a successful business strategy. The developed practical recommendations have the potential to significantly reduce the risks and damage associated with information security, even for companies and organizations without prior experience in this field. These recommendations focus not only on technical aspects, but also on organizational measures to ensure timely detection, analysis and response to incidents.

158-165 223
Abstract

Objective. Most researchers convert point cloud data into ordinary three-dimensional voxel grids or image collections, which makes the data unnecessarily voluminous and causes problems when processing them. The purpose of the study is to analyze the architecture of the PointNet neural network. Method. A unified approach has been applied to solving various 3D recognition problems, ranging from object classification, detail segmentation to semantic scene analysis. Result. A comparative analysis of the classification of 2d and 3d objects was carried out, the layers and functions through which classification occurs were studied in detail. A type of neural network is considered that directly uses point clouds, which takes into account the invariance of permutations of points in the input data. The network is determined to provide a unified architecture for applications ranging from object classification, part segmentation, and scene semantics. For semantic segmentation, the input data can be either a single object from the part area segmentation or a small part of the 3D scene. A neural network that is widely used for raster image editing, graphic design, and digital art is a deep point cloud architecture called PointNet. Conclusion. A new deep point cloud architecture, PointNet, is introduced. For object classification task, the input point cloud is directly selected from the shape or pre-segmented from the scene point cloud. To obtain a virtual model of the real world, neural network solutions are used, based on the assumption that there is an RGB point cloud obtained by an RGB-D camera from one or several angles.

BUILDING AND ARCHITECTURE

166-174 233
Abstract

Objective. The study aims to investigate the complex interaction between radiant heating and airflow in industrial environments.The aim is to understand the dynamics of temperature, with particular attention to optimizing energy efficiency and comfort in industrial premises heated by a dual-zone dark gas radiant heater. Method. Using Computational Fluid Dynamics (CFD) and Ansis simulation software, the study developed a model that represents typical industrial conditions. This method included the determination and verification of temperature gradients and air velocity parameters, as well as careful mapping of the complexities of the industrial heating process. Result. The analysis provides detailed graphical representations of temperature and air velocity at individual points, revealing the effect of radiant heating on airflow patterns. Particular attention has been paid to how the temperature profiles interact with a dual-zone heating system, revealing important data that helps understand thermal dynamics in industrial environments. Conclusion. The findings demonstrate the potential for significant progress in energy savings and improved worker comfort in industrial environments using radiant heating. The integrated research approach fills a critical gap in existing research, highlighting the need and potential for further exploration of sustainable heating technologies in challenging industrial environments.

175-183 214
Abstract

Objective. The purpose of the work is to study the experience of using bituminous rocks from various deposits for the preparation of hot asphalt concrete or extracting bitumen from rocks from the point of view of geonics. Method. The following research methods are used: systematization, description and analysis. The necessary data is formed on the basis of information obtained from the analysis of domestic and foreign articles related to the topic of natural bitumen and practical experience in extracting bitumen from tar sand for the preparation of hot asphalt concrete mixture using bituminous rocks without the use of petroleum bitumen from various fields. Result. Various works on the preparation of hot asphalt concrete and bitumen from bituminous rocks are considered. The results obtained showed that the use of bituminous rocks for the preparation of hot asphalt concrete and bitumen based on them is possible, and the properties of the resulting material comply with current quality standards. Conclusion. The dependence of the properties and chemical composition of the material on the deposit in which it was mined has been established.

184-190 176
Abstract

Objective. When constructing the resolving relations of the theory of shells, the validity of the basic assumptions about the material of the structure under consideration is assumed, which is considered homogeneous, isotropic and viscoelastic, i.e. obeying the Maxwell-Gurevich law. The subject to study is a polymer cylindrical shell, rigidly clamped at the base and subject to internal hydrostatic pressure. Method. The problem is reduced to an inhomogeneous differential equation of the fourth degree with respect to the displacement of the middle surface w along the z axis. Since the closed form representation of the solution to this equation is extremely difficult, the search for it is presented numerically, in particular, using the grid method. The creep strain components ε*x, ε*θ, γ*were determined as a linear approximation of the velocity by the Runge-Kutta method. Result. In the process of calculating the shell using moment theory, it was found that as a result of shell creep, tangential stresses increased by more than 12 percent. Conclusion. The proposed technique makes it possible to simulate changes in the mechanical properties of the shell (for example, indirect heterogeneity) caused by the influence of physical fields.

191-196 200
Abstract

Objective. The purpose of the study is to determine the stability of a straight rod of variable cross-section under combined axial loading. Method. The longitudinal bending of the rod is described by the classical theory using Bernoulli’s hypothesis, and the critical forces are determined from the Euler problem with appropriate assumptions. Result. An algorithm for a numerical method for solving the problem of determining the eigenvalues of the differential equation for longitudinal bending of a rod is proposed. External loads are considered “dead”. The functions of changing the variable cross-sectional area, variable stiffness and distributed load are considered given. The curved axis of the rod after bifurcation is described using a linear ordinary differential equation. Conclusion. The implementation of the numerical method was carried out by the finite difference method using numerical methods and modern computer software.

197-202 193
Abstract

Objective. The purpose of the research is to develop earthquake-resistant building composites Method. The study is based on experimental dynamic testing of fine-grained concrete. Existing approaches to ensuring seismic safety of buildings and structures are analytically summarized. Result. Domestic and foreign experience in designing fine-grained concrete compositions for earthquake-resistant construction is presented. Compositions of fine-grained concrete of various classes were obtained using raw materials of natural and man-made origin. Recipes were proposed and their construction, technical and dynamic properties were studied. Conclusion. The strength of fine-grained concrete increases with decreasing loading time, and at a loading time of approximately 0.01 sec or a loading rate of about 5000-7000 MPa sec, this excess is about 30% compared to the statistical strength of concrete. This allows us to recommend fine-grained concrete for structures experiencing dynamic impact.

203-209 219
Abstract

Objective. Currently, engineering waterproofing systems with polymer waterproofing membranes are widely used at various construction structures. At the same time, the usage of polymer membranes implies the operation of break welds, the strength of which should be no less than the strength of the waterproofing material itself. The purpose of the study is to evaluate the water resistance of single seams (without test channels, welded by manual or automatic equipment) for LOGICBASE™ / ECOBASE™ grade V-SL polymer membranes at a pressure of 1 MPa. Method. Testing of waterproofing seams for water resistance is carried out according to the requirements of GOST EN 1928-2011, method B. The GESTER model GT-C26B hydrostatic pressure testing device is used as a test installation. LEISTER welding equipment of Varimat V2 (automatic equipment) and Triac AT (manual/hand equipment) models was used for welding samples. The width of the weld was at least 30 mm. Result. At a hydrostatic head pressure of 1 MPa, within 24 hours from the start of the test, there were no traces of water penetration in the samples, which indicates that the seams are completely waterproof. Conclusion. Single seams of LOGICBASE™/ECOBASE™ engineered waterproofing PVC membranes are completely sealed at 1 MPa water pressure.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)