ENERGY AND ELECTRICAL ENGINEERING
Objective. The article discusses energy-saving thermoelectric generators for autonomous power supply of the cooling apparatus of heat-generating electronic components.
Method. Methods of modeling heat exchange processes in the operation of thermoelectric generators based on the Seebeck effect are applied. The heated and cooled zones of the generator are topologically spaced to reduce parasitic conductive transport. The semiconductor branches are manufactured using thin-film technology to reduce parasitic Joule heat emissions. The materials of the junctions and electrodes are selected taking into account the energy of the electrons.
Result. Energy saving of processes has increased in thermoelectric generators by reducing parasitic Joule heat generation, reducing parasitic conductive transfer and additional energy generation from metal electrodes.
Conclusion. The conducted studies allow us to conclude that in order to increase the energy saving of thermoelectric generators for autonomous power supply of the cooling apparatus of the heat-generating electronic components, it is necessary to topologically separate the heated and cooled zones of the generator into different levels in space, and to manufacture semiconductor branches using thin-film technology and additionally cool the generator junctions with ventilation, and additionally recover energy from the heat-generating components on the heated junctions.
Objective. The purpose of the study is to develop the design of a thermoelectric device for transpalpebral hypothermia of the anterior segment of the human eyeball.
Method. The design of a TEU for thermal impact on the anterior segment of the human eyeball is described. The device includes an impact tip mated with one surface to the human eyelid, and the opposite surface to the cold surface of the thermo-electric module. The hot surface is in contact with a housing filled with a working substance having a stable melting point ranging from 303 to 330 K. The device is equipped with an adjustable power source with a control unit.
Result. Ensuring the required mode of thermal exposure, in which the temperature of the anterior segment of the eyeball is at the level of 283-288 K, can be achieved by using in the device a standard TEM type TV-17-1.4-1.15 produced by Kryotherm LLC (St. Petersburg).
Conclusion. The operating power range of the TEU will be within 3-4 W with an average temperature difference between the junctions of 45 K. The supply current is 6-7 A with a power consumption of 13-14 W. The refrigeration coefficient varies from 0.1 to 0.5. The device can be used in the treatment of keratitis, keratoconjunctivitis, dystrophic conditions of the cornea, anterior uveitis and non-obscuring corneal opacities.
Objective. Modern methods of cooling the central processor associated with the development and use of various refrigerants and coolants in various types of personal computers are considered.
Method. A significant scientific and innovative challenge in CPU cooling today is the development of cooling methods that are most efficient for server hardware while reducing energy consumption noticeably. One way to address this challenge is the assembly and use of installations capable of preventing equipment overheating and its disposal due to their functionality.
Result. The main types of cooling devices are presented, their advantages and disadvantages are indicated, operation diagrams of these installations are given, as well as the results of a comparative analysis of their operation. The circuits of the Peltier element and the Seebeck effect are described; efficiency of both conventional air coolers and complex liquid cooling systems.
Conclusion. The choice of CPU cooling method depends on the user's needs and processor specifications. The effectiveness of a cooling system depends on the quality of the components and their compatibility with the specific system. Liquid cooling remains the most effective and promising method for cooling central processors in modern high-performance computers.
INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS
Objective. The goal of the study is to optimize a computer model of a Vivaldi antenna with conductive plates on the same side as the resonator.
Method. The study is based on electrodynamic modeling methods.
Result.The paper presents a computer model of a Vivaldi antenna with conductive plates on one side with a resonator. A comparative analysis of two types of Vivaldi antennas was carried out of the dependence of the beam width and the voltage standing wave ratio on the radius of the current-conducting plate curve in the form of lobes and the values of the opening in two planes θ = 900 (the plane of the antenna's opening) and φ = 00 (the plane perpendicular to the antenna's opening plane) in the frequency range from 3 to 24 GHz. The influence of the shape, size and position of the resonator on the SWR value and the width of the antenna radiation pattern was determined. VSWR values are given for different shapes and sizes of the resonator. The main parameters of the resonator have been identified, which affect the characteristics of the antenna.
Conclusion. Electrodynamic modeling allows us to obtain a Vivaldi antenna with the required radiation pattern width with an improved standing wave ratio.
Objective. The noticeable interest in aircraft such as drones for various purposes puts forward certain requirements for their characteristics. Characteristics can be divided into information technology and consumer characteristics from a financial point of view. At the same time, they have their own units of measurement. In this regard, the task of selecting and ranking drones according to some criterion or numerical metric arises. Considering that this problem is quite relevant, this paper considers a certain heuristic approach to sorting a sample of drones by the key of the proposed metric.
Method. In the heuristic approach, there is a certain variability in determining the attractiveness of a particular drone in the opinion of the person making the decision to purchase or a specific choice from the existing line of drones available for review based on their characteristics.
Result. It is proposed to identify several groups in the existing characteristics, heterogeneous in their properties, both obvious and intuitively created: “good”, “very good”, “less attractive”, “least attractive”. Assuming that several models of drones with the same characteristics are being considered, divided into the specified groups, numerical coefficients are introduced to form a metric by which a given line or selection of drones will be ranked according to the calculated metrics.
Conclusion. The proposed heuristic algorithm is based on the transition to the reduced values of numerical characteristics relative to the maximum of each group of characteristics with the calculation of the arithmetic mean of the given values. Depending on the type of specified groups, the coefficients entered into consideration are added or subtracted from the difference between the current characteristic and its average or the difference between the average and the current characteristic. On this basis, metrics are calculated by which the given sample of drone models is ranked.
Objective. The main arguments that position the problem of assessing the connectivity of the bipolar graph in relation to the conditions of destructive impact of external threats (threats) as relevant for assessing the vitality of information systems (IS) are discussed operating under conditions of information security threats.
Method. The following are presented: formulation of the problem of assessing connectivity for conditions of exposure to threats; a brief overview of existing methods for structural modeling of bipolar structures; results of the analysis of the applicability of existing methods for assessing the stability of functioning (stability) of bipolar structures in relation to conditions of exposure to threats. The initial conditions are accepted: the stability of the information system as a whole depends deterministically on the stability of its structural elements and the network structure itself; the problem of assessing the connectivity of a two-pole structure is basic for assessing the connectivity of the corresponding multi-pole structures; the stability analysis of the impacted object is carried out using minimax criteria, and the result is presented in the form of the minimum value of the stability function and the moment in time of the occurrence of this event.
Result. Limiting factors that prevent the use of existing methods to solve the problem have been identified. The main limiting factor is that existing methods are based on probabilistic stationary models that require representative statistics. The second, no less important limiting factor is that the situation characterizing the impact of threats is very dynamic (not stationary), the events themselves are very rare, and the assessment period is comparable to the period of response to threats, which does not allow obtaining effective assessments of sustainability. It is proposed to: generalize existing methods for conditions of non-stationary functioning process, for which, when assessing, take into account changes in the probabilistic characteristics of nodal elements over time; as an indicator characterizing connectivity, use the minimum value of the stability function determined during the period of exposure to threats. The price to pay for ensuring the sustainability of the functioning of the affected object under the influence of threats is the need to ensure structural redundancy.
Conclusion. The results of the study can be used by persons who simulate both the object of impact and the processes of its functioning, to make a decision on ensuring the continuity of production processes under the conditions of the impact of threats.
Objective. The purpose of the work is to apply mathematical modeling methods to solve problems of ensuring road safety on highways.
Method. Quantitative methods for analyzing road safety problems (BDD) are based on probability theory, mathematical statistics, information theory, multifactor analysis, reliability theory, modeling, programming and other mathematical methods.
Result. The main trends in the study of road safety problems are considered. It is indicated that the mathematical dependences of the influence of a limited number of factors are unsuitable for a satisfactory description of the “driver-vehicle-road-environment” (VADS) system as a whole. Paying attention to the uncertainty of objects, properties and connections of the VADS system, the need to use a systematic approach in solving these problems is justified. The need to take into account regional conditions in road safety is discussed. Mathematical models recommended for solving problems of ensuring road safety are presented.
Conclusion. Generalization, systematization of the vast empirical material of road accidents accumulated as a result of specific studies taking into account economic, social and demographic conditions and the development of theoretical concepts based on system representations are the most important conditions for solving the problems of ensuring road safety.
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.
Method. A systematic approach method was used to consider the essence of the problem of assessing the security of software of automated systems of internal affairs bodies and the criticality of its vulnerabilities.
Result. The results of an analysis of theoretical aspects of the study of vulnerabilities in software of automated systems are presented. The components of typical software used in the automated workstation of a user of a modern automated system of internal affairs bodies were analyzed for the presence of known vulnerabilities presented in the US National Vulnerability Database and the Data Bank of Information Security Threats of the Federal Service for Technical and Export Control of Russia, obtaining basic estimates for standard Common Vulnerability Scoring System versions 3.0 and 3.1.
Conclusion. Carry out timely updates of the software used based on the selection of its optimal version in terms of security level. The main directions of activity for conducting a quantitative assessment of the level of software security in automated systems of internal affairs bodies are outlined, taking into account its vulnerabilities in real time.
Objective. The aim of this study is to analyze the «Telegram Rat» virus, emphasizing the importance of awareness to effectively combat cyber threats and ensure security in the digital age.
Methods. This paper used an analysis of the characteristics and distribution of «Telegram Rat» viruses. An example of analyzing the technical mechanisms of extortion on the example of «WAGNER GROUP» was given and the steps of virus elimination were formulated.
Results. The acuality of the «Telegram Rat» virus problem and ways of its transmission are considered. Practical methods of threat detection and neutralization are stipulated. The method of «Telegram Rat» virus threat detection is based on the analysis of active processes, network activity and file system. It is revealed that the main vulnerability on devices infected with the virus is careless user behavior.
Conclusion. The contents of this paper emphasize the importance of vigilance when downloading files and clicking on links. Lack of caution can lead to data loss and information leakage, emphasizing the need for conscious behavior in the digital environment.
Objective. The research presented in the paper is aimed at studying the effectiveness of modern DBMSs.
Method. Along with traditional relational solutions, NoSQL-based DBMSs are becoming increasingly popular. This is primarily due to the ability of such systems to store and process huge volumes of data. At the same time, to work effectively with this data, it is necessary to ensure its compression. Compression allows you to reduce the amount of stored data and provide quick access to it.
Result. A comparative analysis of data compression in the MySQL and OpenSe DBMS was performed.
Conclusion. Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if you
need to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.
Objective. The purpose of this work is to develop a decision support system in the form of a computer program «Calculation of departmental assessment of administrative activities of the police» based on the algorithm for statistical analysis of data from the «1-AP» report, which allows in an inclusive form (for example, graphically) to track the dynamics of key indicators, contained in the «1-AP» report for officials of internal affairs bodies responsible for maintaining public order.
Method. The problem of objective contradiction between the indicators of departmental criteria for assessing the administrative activities of the internal affairs bodies of the Russian Federation and non-departmental assessment of the activities of territorial bodies of the Ministry of Internal Affairs of Russia has been identified. In order to resolve it, it is proposed to take into account the number of identified administrative offenses as an additional indicator of departmental assessment of law enforcement in public places, assessing their growth as a positive characteristic. To identify the quantitative component of this indicator, it is necessary to analyze the dynamics of the data contained in the «1-AP» statistical reporting form.
Result. The developed computer program implements: summary and grouping of information from the statistical forms of the «1-AP» report for the entire period of validity of Order No. 179 of the Ministry of Internal Affairs of Russia; analysis and forecasting of time series, adjusted according to various informative indicators of administrative practice; formation of diagrams for graphical analysis of trends in the phenomena being studied.
Conclusion. The developed decision support system in the form of a computer program is an effective means of implementing information and communication technologies in the activities of internal affairs bodies. Users of this system will be officials of internal affairs bodies responsible for organizing the protection of public order, as well as cadets and adjuncts studying in legal specialties.
Objective. The study is devoted to assessing the applicability of the Isolation Forest method in the task of detecting anomalies in network traffic data characterized by insufficient markup. The main purpose of the work is to evaluate the effectiveness of Isolation Forest with limited data markup and its potential in critical areas such as cybersecurity and financial analytics.
Method. The study includes data preprocessing, training the model on the training set, and evaluating the model's performance on the test set using accuracy metrics, error matrix, and classification report. To implement this research, the Python programming language and the scikit-learn library were chosen to implement the Isolation Forest, as well as Pandas for working with data.
Result. Evaluating the applicability of the Isolation Forest method on unstructured data revealed its potential for identifying anomalous patterns without the need for extensive labeling. This confirms the effectiveness of Isolation Forest in environments where access to labeled data is limited or absent.
Conclusion. The results demonstrate high anomaly detection recall despite relatively low overall accuracy, indicating the importance of contextual interpretation of metrics in the task of detecting rare events in data.
Objective. Comprehensive integrated circuit (IC) verification plays a crucial role in preventing costly errors and delays in product development cycle. It includes testing interaction and compatibility of different system elements, such as central processing unit, memory and various peripheral devices. Validating IC’s compliance to the functional requirements list may take up to 70% of the design process duration. This proportion grows with complexity and size of the device under development. Consequently, the essential tasks that integrated circuit developers face are research and development of methods for cutting design complexity and reducing implementation time.
Method. Conducted research regarding usage of genetic algorithm for error discovery, which could lead to a failure in the end product.
Result. Collected data regarding the amounts of victims and target errors for each fault of types stuck-at-0 and stuck-at-1 for circuits from ISCAS’85 and ISCAS’89 benchmarks. It has been discovered that the proposed method is more effective in comparison to random vector generation to an extent of target errors amount for every benchmark.
Conclusions. Accumulated results allow for the algorithm usage during IC design in order to reduce time consumption for circuitry validation and improve on test kits quality.
Objective. The problem of training specialists in the field of information security seems relevant given the lack of specialists capable of countering new threats. Objectively, there is a significant shortage of qualified specialists who could be trained by technical universities of the Russian Federation in the very near future. When solving this problem, it is important to take into account the level of quality of the graduates and the negative risk from the distance learning mode.
Method. The presented work proposes an analysis of the needs for qualified specialists in the program 10.04.01 “Information Security” and a statistical analysis of the final qualifying works of masters of the Faculty of FBIT of ITMO University based on the results of the work of state examination commissions in 2023.
Result. An analysis of the needs for qualified information security specialists was carried out based on available data; It is shown that given the current dynamics, it is not possible in the near future to provide the required number of qualified specialists without significant changes in universities. An analysis of the graduate work of masters studying under the 10.04.01 “Information Security” program was carried out in the aspect of the problem posed: examples of excellent performance of work for the “industry” and the risks of performing standard “template” work were reflected.
Conclusion. The results can be used to assess the quality of training of specialists in the field of information security in technical universities in Russia.
Objective. The purpose of theoretical research is the need to formulate and describe additional approaches and topical issues and tasks when conducting an expert assessment of group (collective) aspects of the human factor's influence on the safety of technical systems.
Method. The paper considers the methodology of assessment based on the use of the Gauss distribution for the statistical description of cases of the influence of the human factor on safety, shows the relationship between individual and group aspects.
Result. Examples are given and explanations are given for the application of a quantitative assessment of the influence of the human factor on the safety of technical systems, taking into account the consideration of safety culture, different levels of professionalism of employees, organizational measures taken, the possibilities of the method and its potential tasks are formulated.
Conclusion. The use of statistical distributions to describe the impact of the human factor on safety makes it possible to combine and describe the relationship between individual and group aspects of the phenomenon. This allows the expert to carry out quantitative assessments, modeling and make predictions on the level of safety culture in the organization and the effectiveness of production management or technical systems.
Objective. Development of principles for constructing a multi-level intelligent utility metering system (MISUKU) with increased survivability based on modern utility metering devices (CU) with expanded communication and functionality, as well as determining the fundamental possibility of constructing MISUKU based on a self-configuring mesh network of utility metering devices.
Method. The study is based on an analysis of the functional and communication capabilities of modern utility metering devices and advances in the field of information technology and computer technology, as well as the availability of hardware for organizing inexpensive wireless data transmission lines. The work outlines the basic principles for constructing self-adjusting mesh networks of digital metering devices, while the basic device of the first-level system is a subscriber electric energy meter (ASEM), which has good energy, communication and functional parameters.
Result. The basic principles for the creation of SNF utility metering devices and the structure of a multi-level system have been developed: the first level consists of ASEE with subscriber gas and water metering devices with built-in electronic devices connected to it via a radio channel; the second level is the district's strategic nuclear forces with a network coordinator installed at the district's transformer substation or on the roof of a high-rise apartment building. The third level consists of microdistricts united in the strategic nuclear forces system in the center, of which there is a control center for collecting and processing accounting and service information, as well as a payment center.
Conclusion. The use of ASEE with mechanical gas and water meters and built-in electronic set-top boxes connected to it via a radio channel will make it possible to build a node of a self-organizing mesh network (SNF) of the first level, and on the basis of this network to create a MISUKU with high communication characteristics. The MISUKU structures presented in the work with increased survivability based on intelligent mesh networks of utility metering devices make it possible to increase the reliability of accounting information and the reliability of communications.
Objective. In this paper, the main approaches to modeling the management processes of organizational and technical systems for special purposes are reviewed and analyzed, and their detailed comparative analysis is carried out. This circumstance will allow us to further develop methodological recommendations to improve the efficiency and validity of management decisions.
Method. This work uses: formal models, structural models of objects, models under conditions of complete certainty, models under conditions of risk using a decision tree, models under conditions of uncertainty, mathematical programming models, quality models, efficiency models.
Result. In the course of reviewing and analyzing the main approaches to modeling management processes for special-purpose organizational and technical systems, the following tasks were solved: a preliminary systematization of the available data on the features of the development of management decision-making models was carried out; a comparative analysis of these models was carried out, during which it was established that most of the developed models can only be applicable in certain subject areas, which significantly limits their universality; have a labor-intensive procedure for processing source data; turn out to be insufficiently adaptive to rapidly changing conditions.
Conclusion. The considered approaches to modeling management processes for specialpurpose organizational and technical systems are a powerful tool for making informed and effective management decisions; they allow you to take into account many factors, conduct scenario analysis and optimize solutions, as well as use computers for more accurate and complex calculations.
Objective. Currently, there is no comprehensive approach to solving the problems of telephone fraud. Despite the widespread awareness of citizens about telephone fraud through the media, the number of victims of this type of fraud is growing day by day. The purpose of the study is to substantiate the possibility of using mivar technologies as part of an expert system to combat telephone fraud.
Method. This article uses the following methods: description, analysis, deduction.
Result. The analysis of the use of mivar expert systems in various areas of life allowed us to conclude that their use in the fight against telephone fraud is appropriate.
Conclusion. The conclusions drawn in this work can serve as the basis for further research in this area, as well as the basis for the development and implementation of mivar expert systems in the fight against telephone fraud.
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.
Method. System analysis method was used.
Result. The main systems of the SIEM class are described, their main capabilities, advantages and disadvantages are listed, and various options for constructing such systems and principles of data collection are considered.
Conclusion. Studying the functioning of systems of this type allows us to assess the possibility of their use in the construction of security systems of various scales and architectures. To make maximum use of the capabilities of SIEM systems, it is necessary to adapt and configure it to specific information security requirements. The prospect for further research will be the use of hybrid approaches based on intermediate storage using data streaming.
BUILDING AND ARCHITECTURE
Objective. Investigation of the influence of the design scheme on the dynamic characteristics of the frame of a building of complex shape in plan.
Method. Four variants of structural solutions for the frame of a complex-shaped building have been developed and four spatial finite element models have been built in the Lira-SAPR software package. The final elements are assigned design materials and sections. The models take into account loads and impacts in accordance with the current regulatory documentation for the selected construction area. The ground base is taken into account according to the one-parameter Winkler model.
Results. Dynamic calculation of the developed models of the building frame was performed, frequencies, forms of natural oscillations, acceleration of the upper floor were obtained. The results obtained were compared with the regulatory requirements, their impact on the cost-effectiveness of the design solutions of the building under study was considered.
Conclusion. The analysis of the dynamic calculation results showed that the use of several design options makes it possible to choose the most economical version of the building frame. Also, as a result of the study, it was found that cutting the frame of a complex shape in terms of simple blocks is not always effective from the point of view of optimizing dynamic characteristics.
Objective. An urgent problem of modernizing engineering systems of buildings to ensure energy efficiency and consumer comfort. It is proposed to introduce a waste heat energy recovery system. The result will be a reduction in climate impact and benefits for consumers.
Method. A method of heating water for a hot water supply system by partial heat energy recovery using high-potential energy of a gaseous refrigerant superheated after compression by a compressor of a refrigerating machine with a temperature of up to 100°C. is proposed. Automation of an individual heating point is carried out by a controller programmed with the logical Aries SPK 107[M01]; control of water heating in the circuits is carried out according to the proportional-integral-differential law by influencing the control valves and controlling the operation of circulation pumps.
Result. An automation and dispatch system has been developed for a double-circuit individual heating point with weather-dependent regulation of the heating system. A diagram of the design of the recovery system and the organization of technical automation equipment is outlined.
Conclusion. An automation scheme for an individual heating point has been proposed, ensuring autonomous operation of a source of secondary thermal energy.
Objective. One of the promising areas for the use of slag raw materials in the construction industry is to increase its structural instability and activity with the help of mechanochemistry. The article is devoted to the study of the combined activation of the produced (fresh) slag of steelmaking production in order to create an effective technology for obtaining cementless slag binder.
Method. Steel slags were used as raw materials - energy-saturated large-tonnage waste of the West Siberian Metallurgical Plant (Novokuznetsk). As an activator waste from the coal industry of the «Abashevskaya» mine (Novokuznetsk): burnt rocks from waste heaps and sludge, obtained by lime neutralization of electrolytes of spent acid batteries, industrial transport batteries. The study of thermogravimetric curves of raw materials: "steel slag" and "burnt rock" before processing showed the characteristic features and their inherent exothermic and endothermic effects. The effect of additives-activators on the physical and chemical processes during the mechanochemical activation of steel-smelting slag has been established and main structure-forming factors.
Result. Based on the used mechanically activated slag raw materials, a cementless binder of a matrix structure was obtained.
Conclusion. The creation of composite binders using steel-smelting slag is relevant today as part of a large-scale task of construction and technological utilization of technogenic formations.
Objective. Currently, cement is crushed in mills to a specific surface area of 2500-3000 and 3500-4500 cm2/g or more. Further grinding of clinker sharply worsens the properties of the resulting product. The purpose of the study is to ensure maximum efficiency of the grinding process by determining the optimal combined influence of a different assortment of grinding media and surfactants.
Method. When grinding the material, a surfactant (surfactant) is introduced. Triethalamine (TEA) was used as a surfactant – grinding intensifier. Triethalamine is added immediately before grinding into the mill, in an amount of 0.03% in terms of dry matter of the mass of clinker loaded into the mill.
Result. By adding a surfactant when grinding clinker, you can obtain a finished product, while the grinding time is reduced by 1.5 times.
Conclusion. The results of experimental studies indicate a significant influence of different compositions of grinding media on the resulting grain composition and properties of cement.
Objective. This article describes a system that allows you to optimize energy costs and reduce the likelihood of heating problems in apartment buildings associated with illegal connection to the hot water circuit.
Methods. The methods of theoretical research and mathematical modeling were used in the study.
Result. The problem of the subject area under study is actualized and its solution is presented. A conceptual model of a system for monitoring the consumption of thermal energy in a hot water supply circuit as part of a smart home management system has been developed. A method for monitoring the consumption of thermal energy of multi-apartment residential buildings is proposed.
Conclusion. The method under study will help to monitor the engineering and technical system of residential buildings, preventing cases of illegal introduction into the hot water supply circuit, and can also be integrated into a smart home system.
Objective. Study of the dependence of the compressive strength on the average density and the flexural strength on the compressive strength of vermiculite concrete composite. Determination of the expression for the coefficients of thermal conductivity and heat capacity of the resulting vermiculite concrete composites in the developed software for thermal engineering calculation of the fire resistance limit of reinforced cement structures with a fire retardant layer of vermiculite concrete.
Method. Methods for reducing the consumption of cement binder in the developed fire-resistant concrete composites are considered. Experimental and theoretical methods for determining the fire-retardant properties of the developed vermiculite-concrete composites and expressions for determining their strength properties are proposed.
Result. The dependences of the ultimate compressive strength on the average density and the ultimate bending strength on the ultimate compressive strength of vermiculite concrete for the concretes under study, the dependence of the coefficients of thermal conductivity and heat capacity during a fire on the type and average density of vermiculite concrete composites were obtained.
Conclusion. Fiber-vermiculite-concrete composites with an average density of 470-560 kg/m3 have the best fire-retardant properties. Software has been developed for thermotechnical calculation using a numerical method of the fire resistance limit of two-layer reinforced-cement structures in a fire, ensuring at least 95% agreement with the experimental data of fire tests of two-layer reinforced-cement elements.
ISSN 2542-095X (Online)