Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search
Vol 51, No 2 (2024)
View or download the full issue PDF (Russian)
https://doi.org/10.21822/2073-6185-2024-51-2

ENERGY AND ELECTRICAL ENGINEERING

6-14 224
Abstract

Objective. To set the parameters of the liquefied natural gas shipment system for various options for filling a gas tanker from large-capacity storage facilities during its bunkering.
Method. Mathematical and numerical modeling of the liquefied natural gas shipment process for various tank-emptying modes during the shipment of liquefied natural gas to a largecapacity gas carrier by a submersible cryogenic pump.
Result. The analysis of the modes of shipment of liquefied natural gas from large-capacity storage facilities has been carried out in order to ensure filling of a gas tanker within the permissible freight period with an upgraded design of a submersible pump of liquefied natural gas. Analytical dependencies have been obtained to describe the process of shipping liquefied natural gas for various operating options of the shipping system.
Conclusion. The optimal option for the operation of the liquefied natural gas shipment system for filling a gas tanker within the permissible bunkering time has been determined.

15-22 200
Abstract

Objective. The purpose of the study is to develop the design of a thermoelectric device for fastening parts by freezing during machining, and to analyze its parameters and characteristics.
Method. The design of a thermoelectric device for fastening parts using the freezing method during their machining is described. The device includes a high-current fuel cell, made on the basis of layered thermoelements with improved thermomechanical characteristics. The fuel cell is interfaced with a heat-equalizing ceramic plate on the side of the cold junctions, and on the side of the hot junctions, through a similar ceramic plate, it is in contact with the heat release system.
Result. To ensure the required operating mode of the device, a layered thermoelectric battery developed at the Research Institute of Semiconductor Thermoelectric Devices and Devices can be used in its composition. T.A. Ismailov”, Dagestan State Technical University.
Conclusion. The operating power range of the used fuel cell is in the range of 20-50 W with an average temperature difference between the junctions of 50 K, the supply current is 50-80 A with a power consumption of 50-160 W. The refrigeration coefficient varies from 0.1 to 0.45.

23-30 188
Abstract

Objective. The purpose of the study is to discuss the issue of creating and developing an integrated methodological approach to testing and standardizing the process of testing turboexpanders based on automation equipment, taking into account the existing and potential demand for domestic turbine units by 2035 under the conditions of sanction pressure.
Method. Identification of the problem and formation of an approach to its solution based on the existing domestic experience in testing turboexpanders, taking into account the introduction of automation tools and analysis of potential consumers of properly marked and structured data on the characteristics of the machine. Development and implementation of automatic regulation and control systems for low-temperature machines.
Result. In accordance with the general classification of product testing, 9 types of research have been identified that are of scientific and practical interest in the experimental determination of the most relevant parameters of turboexpanders: isentropic efficiency, stability of the rotor and impellers, strength of impellers, vibration and noise characteristics.
Conclusion. Based on the list of tests and the main characteristics of the machines, the place of application of experimental data was determined and requirements for means of conducting automated tests were formed in order to optimize cryogenic systems as a whole.

31-43 208
Abstract

Objective. Night radiative cooling (Radiative cooling) is based on the phenomenon of Earth's effective radiation, in which heat is removed into the atmosphere and partially carried away into outer space, which leads to a decrease in the temperature of objects located on the Earth's surface below the air temperature in the surface layer.
Method. The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology. On the basis of the method developed by the authors and the existing method, a computational and theoretical analysis of radiative cooling for the Euro-Asian continent was carried out. As a result, the regularity of the change in the radiative cooling potential depending on the geographic latitude was determined, starting from the equator to the northernmost point of the continent. Schematic solutions and designs of refrigeration systems of various functional purposes for various regions with yearround use of radiative cooling have been developed. Theoretical and experimental studies of installations with radiative cooling are presented. for food storage and air conditioning was carried out.
Conclusion. On the basis of the developed computer model, an analysis of the energy efficiency of refrigeration systems for food storage and air conditioning, in which the object is cooled by radiative cooling and a vapor compression refrigeration machine, was carried out using the simulation of the annual operation cycle in continental climatic conditions.

INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

44-52 181
Abstract

Objective. Development of a mathematical model of the joint movement of traffic and pedestrian flows at urban unregulated junctions at the same level in order to develop recommendations for determining their capacity.
Method. The research is based on the use of modern technology of mathematical modeling and computational experiment. A probabilistic Poisson mathematical model was chosen as a model of a complex system of interaction between transport and pedestrian flows.
Result. Calculation schemes have been developed for mathematical modeling depending on the number of traffic lanes and the location of the pedestrian crossing. A method has been developed to determine the capacity of unregulated junctions at the same level as pedestrian traffic.
Conclusion. The capacity of an unregulated junction is defined as the sum of the capacity of the lanes of a secondary road, taking into account the priority of pedestrian flows and traffic flows of the main direction, depending on various variables (the intensity of traffic of cars in the main direction, the proportion of turning cars, the intervals of arrival of groups of pedestrians, the intensity of pedestrian traffic).

53-61 196
Abstract

Objective. Analyze the implementation features of a “Port scanning” attack using a “Zombie” computer to hide the IP address of the attacking machine.
Method. The method is based on computer simulation of a “port scanning” attack using a virtual infrastructure of the network.
Result. Theoretical aspects related to the implementation of a “port scanning” attack using a “zombie” computer are analyzed. The parameters by which a “zombie” machine is selected on the network are indicated. A computer simulation of a “port scanning” attack using a virtual infrastructure of the network was carried out. Simulation results illustrating the successful implementation of the attack are presented. A simple way to counter this attack is proposed.
Conclusion. When implementing a port scanning attack using the Nmap utility, you can obtain a lot of valuable information related to open TCP ports and services running on the attacked systems. To ensure security when conducting port scanning, attackers can successfully use technology to mask the IP address of the attacking machine by using a “zombie” computer. The technique of replacing the attacker’s IP address with the IP address of a “zombie” machine is not only effective, but also safe for attackers. By using a “zombie” machine, the attacker scans ports without revealing his real location, which allows him to avoid legal consequences associated with illegal activity on the network. By analyzing the data obtained after scanning, an attacker can obtain information about which ports are open on the target computer and create a map of the vulnerabilities of the attacked system. As a way to protect against this attack, it is enough to use the Windows Firewall with standard settings.

62-69 200
Abstract

Objective. The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.
Method. The methods of scientific research used in the work include: analysis of social networks, methods based on graph decomposition algorithms, methods of data analysis from open sources, methods of linear algebra and algorithmization.
Result. Taking into account the objectives of the study, the main direction of the structural analysis of the social network is justified – the definition of communities and an approach to solving the problem of community research is proposed, which involves two stages. At the first, preparatory stage, the graph of the source network is formed taking into account the intensity of connections between the participants, and at the second, the main separation of the source and obtaining the target fragment of the graph containing the most connected nodes that will correspond to the most active members of the community is performed. It is shown that the key element of the graph separation algorithm – the spectral bisection algorithm is the calculation of the Fiedler vector, which can be implemented based on the Lanczoc algorithm. A software implementation of the algorithm in the form of a Python function and using the Numpy library is also proposed. The possibilities of controlling the size of the target fragment of the source graph by means of a function parameter – the value of the weighted median are shown.
Conclusions. Experimental evaluations of the algorithm showed its positive capabilities as part of a set of tools for researching social networks. The use of this solution will reduce the number of community participants being studied, focusing on the most active and closely related ones, and the inclusion of additional parameters in the software implementation of the algorithm will provide the opportunity to study the community, taking into account the intensity and nature of the interaction of participants.

70-76 264
Abstract

Objective. The purpose of the research is to develop and implement a Telegram bot for effective task management using the functionality of the Telegram API. Method. The study is based on database design techniques. Result.The paper describes the process of developing and optimizing a Telegram bot for effective task management. As part of the research, an application was developed, implemented in Python using the Telegram API and using the PostgreSQL DBMS to store data as part of the workflow. The system is designed to optimize the workflow, manage tasks in the system and delegate them to users. A database has been designed, where the structure and relationships between data are defined, ensuring efficient storage and access to information, taking into account the needs of the application. Conclusion.The phased implementation of functionality, from task management, user notification systems, to data processing and analysis, allows us to obtain a fully functional system with a wide range of capabilities. To clarify the functions and capabilities of the bot, a demonstration of the application was carried out, reflecting the functionality of the system.

77-82 191
Abstract

Objective. The purpose of the study is to develop and apply a method for extracting information about the identity of users from recordings of their voices using the calculation of mel-cepstral coefficients.
Method. In the study of the application of methods for extracting informative features from a voice recording, allowing identification of the speaker, an authentication scheme using mel-cepstral coefficients is presented.
Result. Based on this method, an authentication module was implemented using audio recordings of user voices using the simplest MFCC. The authentication module was developed using Python language
Conclusion. The biometric authentication method is an inexpensive and relatively simple way to verify the authenticity of users. Despite the obvious advantages of mel-cepstral coefficients, this method has certain disadvantages. To eliminate shortcomings, various frequency filters can be used, as well as third-party algorithms for analyzing audio recordings.

83-90 176
Abstract

Objective. The purpose of the research is to analyze the functionality and features of dynamic modeling as part of training specialists in the field of information security and countering various threats in the information space, taking into account the time factor.
Method. The analysis of modeling the basic scenario of incidents and threats to information security, which are the initial data for the formation of the necessary level and requirements for the training of information security specialists, is carried out.
Result. A new approach to training specialists in the field of information security has been developed and proposed, taking into account modern needs and requirements. The proposed approach introduces a numerical coefficient that allows us to determine the area of necessary skills and knowledge to prevent and minimize possible incidents over a period of time.
Conclusion. The area of information security under consideration, namely the training of qualified specialists with the necessary level of knowledge and skills, is relevant from the point of view of the development of the information technology sector and ensuring the protection of all processes occurring in it. This area requires further attention and the introduction of new approaches and methods of training due to the development of the information society and the need for highly qualified personnel.

91-100 631
Abstract

Objective. The purpose of the theoretical research of the article is to formulate and describe cases in which it is possible to conduct correlation and other types of analysis for some situations to quantify the impact of the human factor on safety of technical systems using plausible patterns and statistical distributions, to consider some problems and reliability issues that arise in the course of solving such problems.
Method. Some cases of possible application of the chi-square distribution to assess the impact of the human factor on safety of systems with the participation of people in technological operations are presented.
Result. Approach on using of agreement criterium of chi-square, explanations and recommendations on the implementation of expert research in this area are offered for analysis and assessment.
Conclusion. The article considers the conditions and describes the possibilities for carrying out some types of analysis in assessing the impact of the human factor on the functioning of technical systems.

101-110 177
Abstract

Objective. The purpose of the research is to develop a model and a method of decision support for managing the process of functioning of an information system, ensuring efficiency and optimizing work at all stages of its life cycle.
Method. The use of mathematical modeling methods, business process analysis, comparative and SWOT analysis in research on the development of a model and a decision support method for managing the operation of an information system and determining the required efficiency of an automated information system is an integrated approach that has been used to conduct research.
Result. The methodology and model of system improvement management have been developed, which is an important tool for evaluating and improving the information system. They allow you to analyze the effectiveness and current state of the system, determine the optimal moment for the transition to reengineering in order to improve its performance and efficiency, as well as ensure the optimal functioning of the information system and achieve your goals.
Conclusion. The developed methodology and management model for system improvement allows us to analyze the rate of moral aging of the information system, identify changes in its effectiveness and functioning over time. The application of the improvement management model allows you to identify specific steps and changes that need to be made to the system to increase its efficiency and extend its life cycle. This may include improving business processes, introducing new technologies, optimizing resources, and other measures aimed at improving the productivity and competitiveness of the system.

111-119 181
Abstract

Objective. The purpose of the study is to consider the stages of design and development of an automated information system for planning the staffing of educational organizations of the Russian Ministry of Internal Affairs system with a variable composition.
Method. The construction of a conceptual and mathematical model of the system being developed is based on a systems approach and methods of mathematical modeling.
Result. A conceptual approach to staffing educational organizations has been proposed, on the basis of which an automated information system has been developed. The advantage of the proposed approach gives a clear idea of the structure and functional purpose of the system.
Conclusion. The system will automate the process of recruiting educational organizations in order to increase the efficiency of decision support in the field of training specialists for the Russian Ministry of Internal Affairs.

120-127 176
Abstract

Objective. The article presents the results of a study of tracking algorithms for analyzing a basketball game. The purpose of the work is to determine the optimal method for using athlete tracking when used online.
Method. The research is based on methods and algorithms for solving management problems in organizational systems.
Result. Algorithms with object re-identification are considered, taking into account both motion dynamics and appearance. The most popular tracking algorithms, BYTE, taken from the Bytetrack algorithm, and the Deepsort algorithm, which showed high results in the task of tracking pedestrians in a crowd, were selected as candidates. The algorithms were compared using the MOTA and MOTP tracking assessment quality metrics, as well as the operating time of the algorithms. The experiments were carried out on a general and sports dataset - MOT20 и SportMot.
Conclusion. The study showed that the best result in online frame processing is achieved by the ByteTrack algorithm. It showed comparable quality metrics with fast turnaround times. The authors used open implementations of the algorithms and wrote a convenient interface for conducting experiments on different datasets and detection sources.

128-136 145
Abstract

Objective. The purpose of the study is to construct an algorithm for the functioning of a software package that automates the process of analyzing and assessing the security of the software used and selecting its most secure version for use at informatization facilities of internal affairs bodies.
Method. During the study, we used: a method of a systematic approach to determining software security indicators, a method of mathematical formalization and algorithmization of the process of analyzing and assessing software security for developing program code.
Result. An algorithm for the functioning of a software complex is proposed that allows for analysis and quantitative assessment of the security of software of automated systems of internal affairs bodies in relation to current vulnerabilities in real time. The algorithm is complex in nature, including five component algorithms. The operation of the main blocks of the algorithm is described.
Conclusion. Conclusions are drawn about the importance of the practical implementation of the developed algorithm in the form of a software package that selects the optimal (most secure) version of software for operation at informatization facilities of internal affairs bodies in order to increase the actual security of limited-distribution official information.

137-153 259
Abstract

Objective. The goal of the research is to develop an artificial neural network (ANN) to detect and neutralize network DDoS attacks.
Method. The research is based on the use of the Python programming language in an environment that supports the training functions of PyCharm neural networks.
Result. An analysis of existing artificial neural networks was carried out to determine their optimal structure; Existing methods for detecting network DDoS attacks have been studied; Datasets were collected and refined to improve the quality of training; The structure of the artificial neural network of the classifier was created and its training was carried out, a demonstration software was created that illustrates the process of classification and blocking and neutralizing DDoS attacks.
Conclusion. Having systems to monitor traffic, a Web application firewall, speed limiting, a status page, and a company face to answer questions on social media will all help ensure the most effective protection against DDoS attacks.

154-163 238
Abstract

Objective. Today, capture is a chain for the implementation of medical rehabilitation systems, systems for measuring human physical activity and other medical applications. Their solutions often use hardware systems - sensors, which have a set of limitations and reduce the efficiency of access systems, increasing their cost. The following goal is required: Increasing the availability of application systems being developed, achieving steps without increasing the number of restrictions.
Method. To achieve the goals given in the article, the following approach is used, based on processing a video stream from a camera that records the spectrum of visible radiation. During the research, a set of experimental data was collected.
Result. As a result, a method for classifying video images of a visible phenomenon was developed, which differs from the use of existing models to detect key points of an anthropomorphic body in an image.
Conclusion. This method avoids the use of special equipment and sensors (for example, the Kinect infrared camera) to implement application systems, increasing the availability of such systems and recording their special limitations.

164-174 181
Abstract

Objective. Currently, enterprises are widely implementing information security incident management systems, which are designed to solve such problems as timely identification of the fact of an incident, analysis and research of cause-and-effect relationships that lead to an increase in the likelihood of violations, modification or creation of new regulatory documents describing organizational activities, implementation of technical and software tools that provide preventive protection measures. An enterprise in the oil and gas sector that has been attacked by attackers may face various problems, among which the complete or partial shutdown of production and the failure of expensive equipment are especially significant for the production process. In addition, the relevance of information security incident management processes for enterprises in the oil and gas sector is due to the fact that the implementation of threats can lead not only to financial losses, but also to serious environmental damage.
Method. The developed architecture of the information security incident management system is based on the use of the Shewhart-Deming cycle.
Result. A model of the architecture of an information security incident management system has been obtained, which can be used at enterprises in the oil and gas sector for effective and timely tracking and analysis of emerging incidents, planning measures to eliminate the consequences of incidents, and preventing their reoccurrence.
Conclusion. The proposed architecture of the information security incident management system allows us to take into account the characteristics of oil and gas sector enterprises associated with the impact of information security on the production process due to the high automation of the production process and high man-made risks.

BUILDING AND ARCHITECTURE

175-189 260
Abstract

Objective. The road network, its qualitative and quantitative state, is an indicator of the socio-economic development of any country. The climatic characteristics of the Middle East and, specifically, Jordan, impose a number of stringent requirements on the physicomechanical properties of asphalt concrete mixtures and the operational characteristics of asphalt concrete in pavement, such as rut resistance and fatigue resistance. These issues are particularly acute in countries with a dry climate. By using an approach to the selection of bitumen binders based on the actual range of road operation, it is possible to minimize the occurrence of early defects on the pavement. The aim of this study was to zone the regions of the country based on climatic characteristics, calculate the actual PG grades of bitumen binders for these regions, which would reflect the real temperature range of asphalt concrete operation in the pavement and allow for the reduction of the intensity of plastic deformations, rutting, and temperature-cracking on the roads of Jordan.
Method. The implementation of the set goal was done through the analysis of the climatic conditions of all available settlements in Jordan, with the collection of a temperature array over 15 years on a daily basis throughout the year, and the calculation of actual pavement operating temperatures during the hottest and coldest periods using a standard methodology.
Result. The minimum allowable PG grades of bitumen binders for use in the structural layers of Jordan's road pavement were calculated. Based on the analysis of the country's climatic conditions and the performed calculations, a zoning map of Jordan was proposed according to the PG grades of bitumen binders.
Conclusion. The question of Jordan's road engineers fully transitioning to the Superpave system is ambiguous, however, the use of bitumen binders in the technology of preparing asphalt concrete mixtures with the actual range of operating temperatures will allow for a significant leap in increasing the intervals between road repairs. When developing formulas for PG grades of bitumen binders in laboratory conditions, it is advisable to use modifiers such as rubber powder, SBS polymers, EVA, wax, as well as their complex combination.

190-196 199
Abstract

Objective. The purpose of the study is to develop a new method of analyzing seismic vibrations of seismically isolated structures.
Method. The structure is modeled by a system with one degree of freedom with a nonlinear stiffness characteristic. In the absence of damping an analytical solution of oscillation equations on the phase plane is obtained. In this case the connection between speeds and displacements is accurate, and the law of uniformly variable motion is used to calculate displacements.
Result. To take into account the attenuation, the law of change in mechanical energy at each integration interval is used.
Conclusion. An example of calculating a seismically isolated system with a sliding belt and a spring with a linearly varying characteristic of stiffness is considered. The influence of dry friction and viscous damping on the displacement and acceleration of the system is analyzed.

197-207 291
Abstract

Objective. An emergency shutdown of the heating system of a civil building will inevitably lead to a violation of the thermal regime in the heated rooms. Subsequently, this incident will have a negative impact on human thermal comfort and working conditions. Thus, the issue of predicting the thermal regime of a room in the event of a termination of the supply of thermal energy, along with the search for energy-saving technologies in the construction sector, is an urgent task.
Method. Software calculations are based on the classical theory of thermal stability of a room in the case of intermittent heat supply and the law of regular thermal regime of the first kind (for a heating system), the essence of which is as follows: a decrease in temperature at all points of the body during its cooling occurs in the same way, obeying an exponential law.
Result. For a room in a residential building, it is established that the indoor air temperature will reach the dew point (12.5 ℃) for a period of 8 hours 42 minutes after an emergency shutdown of the heating system, and the zero value after 23 hours 42 minutes. The average value of the rate of temperature drop over a period of 50 hours is 0.72 ℃⁄h, the total loss of thermal energy was 138.2 MJ.
Conclusion. Thermal accumulation of enclosing structures plays a primary role for civil buildings in maintaining the required thermal regime of the room in the event of an emergency shutdown of the heating system. With a relatively low heat capacity and high heat transfer associated with the high temperature pressure of the heating elements, the cooling of the heating system occurs quite quickly (has a high cooling rate).

208-215 280
Abstract

Objective. The purpose of the study is to assess the quality of energy-saving and environmentally friendly heat-insulating paint, consisting of a binder component - acrylic (polymethyl methacrylate) and aluminosilicate or glass hollow spheres with a diameter of 0.02– 0.3 mm.
Method. During the study, methods of experimental study, analysis and evaluation of the composition of thermal insulation paint were used.
Result. The results of an analytical assessment of the properties of heat-insulating paint are presented. It was experimentally determined that heat-insulating paint has good protective properties against corrosion and for waterproofing.
Conclusion. The use of heat-insulating paint to prevent condensation on cold water pipes is possible with a thickness of up to 3-4 mm. The thickness of the layer depends on many factors and is determined by calculation. The use of energy-saving paint for insulating buildings is possible, but only if traditional thermal insulation is used together.

216-222 163
Abstract

Objective. Longitudinal forced harmonic vibrations of vertical rods with a concentrated mass at the end are considered.
Method. The mathematical model of forced kinematically excited longitudinal vibrations is described by a differential equation and boundary conditions arising from the condition of fixing the ends of the rod. The problem will be solved using the finite difference method.
Result. With near-resonance oscillation there is a significant difference between the amplitudes and standard deviations. The closeness of β to the natural frequency and the smallness of the value of α make almost all values of the frequencies of seismic action almost resonant. The reliability of the results of problems in deterministic and stochastic formulations has been confirmed. It has been established that the forms and parameters of forced deterministic oscillations significantly depend on the combination of the frequencies of the forcing disturbances with the natural frequencies of the oscillatory system. It has been established that the forms and parameters of forced random oscillations significantly depend on the combination of the spectral density of the random process of disturbances with the discrete spectrum of eigenvalues.
Conclusion. It is necessary to expand the scope of research to include other types of vibrations: combinations of longitudinal with transverse, angular, torsional, parametric, etc.

223-231 189
Abstract

Objective. Comprehensive studies of ancient concretes have established the presence in them of zeolite-like minerals, which are analogues of naturally occurring compounds containing alkalis. The work presents development of research aimed at obtaining compounds similar to existing minerals of the earth's crust, and encourages researchers to develop alkali binder systems to use the best results during repair and restoration work of historical architectural objects. During the experiment, such important properties for repair compositions as density, ductility, adhesion, viability and strength were studied.
Method. The studies were carried out in accordance with regulatory documents GOST 12730.3–2020 Concrete. Methods for determining water absorption; GOST 5802–86 Construction mortars. Test methods; GOST 31356–2013 Dry building mixtures based on cement binder. Test methods.
Result. The results obtained correspond in their technical characteristics to products based on Portland cement, the mortar grades were achieved in terms of strength M75–150, in terms of mobility Pk1 and Pk2, viability sufficient for carrying out repair and plastering work 33 minutes – 1.5 hours, high adhesive strength 0.62–0.72 MPa.
Conclusion. The compositions of mortar mixtures will allow high-quality performance of a variety of work: repair, plastering, finishing. The stable properties of the components, strict adherence to the compositions and production technology of mixtures will make it possible in the future to synthesize nature-like and durable minerals in the structure of a high-quality and durable material.

232-240 171
Abstract

Objective. The purpose of the study is to develop design and calculation schemes that can be used in the design of bistal load-bearing structures, ensuring optimization of their parameters by using steels of different strengths.
Method. The research is based on the theory and methods of structural optimization.
Result. Rational structural diagrams of beam structures and stepped columns of industrial buildings have been developed and assembled. Using individual examples, the consumption of metal and its cost are examined for various options for the layout of beams and columns. The necessary calculation formulas and recommendations are given that can be used in the practice of design and construction of metal beams and columns.
Conclusion. The constructed structural diagrams and calculation algorithm indicate the effectiveness of using steels of different strengths in the design of beams and columns.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)