Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search
Vol 51, No 3 (2024)
View or download the full issue PDF (Russian)
https://doi.org/10.21822/2073-6185-2024-51-3

ENERGY AND ELECTRICAL ENGINEERING

6-14 262
Abstract

Objective. Currently, for the development of Valanginian and other deeplying (compared to the Cenomanian) deposits, low-temperature separation (LTS) units with turboexpander units (TDA) are used, and the booster compressor station (BCS) is one of the key technological facilities necessary to ensure the efficient operation of promising technologies for gas preparation using the NTS method with TDA turboexpander units for transport. The purpose of the study is to substantiate optimal operating modes, as well as to develop measures for the technological development of a booster compressor station based on the use of methods for modeling the operation of centrifugal compressors, gas pumping units and, directly, the booster compressor station. Method. The following methods were used: the method of reduced characteristics, the refined method of reduced characteristics, and the two-dimensional approximation method. The basis of the mathematical model of the research objects is the gas-dynamic characteristics of centrifugal compressors. Result. The results of a comparison of methods for modeling HDC (reduced characteristics method, refined method of reduced characteristics, two-parameter approximation method) of high-pressure pulp and paper mills are presented using the example of a pulp and paper mill with a pressure ratio of up to 1.9...2.1, intended for equipping gas compressor units with a unit power of 16.0 MW as part of field operations. DKS. An analysis and comparison of the obtained modeling results with actual data was carried out. Conclusion. The accuracy of the mathematical model of the GDC PPM as part of the field booster compressor stations that ensure the operation of NTS installations with TDA determines the accuracy of the assessment of energy consumption and the technical condition of the gas pumping units, as well as calculations of future operating modes of gas pumping equipment, which are carried out to solve a number of applied problems, including determining the timing of equipment modernization or reconstruction of the station.

15-24 168
Abstract

Objective. The purpose of the study is to develop the design of a thermoelectric installation for lifting objects from shallow reservoirs using the freezing method, as well as its calculation, analysis of parameters and electrical and thermophysical characteristics. Method. The research is based on the use of methods of thermodynamic analysis, full-scale and computational modeling of cryogenic equipment in order to find optimal solutions for the reliability and service life of low-temperature installations. Result. The installation includes a waterproof probe, on the end surface of which, facing the bottom of the reservoir, thermoelectric modules are installed, heat is removed from the hot junctions of which by means of a heat removal system made in the form of an all-metal heat pipe or in the form of a thermal thermosiphon. The connection between the object lifted from the reservoir and the thermoelectric installation is carried out through a cold wall by freezing. The thermoelectric installation was calculated and its parameters were determined. Graphs were constructed and dependencies were obtained describing the main characteristics of TEMs included in the thermoelectric installation. The graphs are presented at a temperature of the hot junctions of the TEM of 300 K and the achievement of such values of the thickness of frozen water ice on the cold wall of the technical device that would allow lifting objects from a reservoir up to 4 m deep. Conclusion. The installation parameters have been determined: the number of TEMs of the DRIFT-1.2 type is 8, the operating power range of a single TEM of the DRIFT-1.2 type is from 14 to 40 W with an average temperature difference between the junctions of 45 K, the supply current is from 3.8 to 7 .6 A with power consumption from 50 to 200 W, coefficient of performance - from 0.1 to 0.45, minimum temperature of the cold wall of the TU - 248 K, a domestically produced thermal thermosyphon is used as a heat removal system from the hot junctions of the TEM.

25-34 194
Abstract

Objective. The purpose of the study is to develop a mathematical model for constructing a matrix of thermal conductivity coefficients under low-temperature exposure to the multilayer epidermis of biological tissue. Method. The research is based on methods of thermo dynamic analysis, full-scale and computational modeling of processes under low-temperature influence. Result. A mathematical model of the matrix of thermal conductivity coefficients under low-temperature effects on biological tissue has been developed. Heat transfer in a multilayer medium under low-temperature influence on biological tissue is presented as a process with a discrete step in time and coordinate. Thermal properties are evenly distributed throughout the volume of layers of biological tissue. For exposure to cold, layers of the epidermis of biological tissue were used, divided into uniform identical cells, where the cell area of the biological tissue was taken to be equal to one. Conclusion. The results obtained in this work can be useful to specialists who deal with modeling problems with free boundaries.

35-41 193
Abstract

Objective. In today's world, where the amount of data is growing every day, the importance of reliable and efficient data centers (DPCs) is becoming increasingly clear. One of the key aspects of maintaining data center availability and reliability is ensuring adequate cooling of server rooms. This scientific work is devoted to the study and analysis of various cooling techniques used in server rooms. Method. The study is based on thermodynamic analysis methods to optimize cooling systems to improve their efficiency and reduce energy consumption. Result. The work examines both traditional cooling systems and modern innovative solutions that improve cooling efficiency while reducing energy consumption. The authors compare different cooling methods, evaluate their advantages and disadvantages, and analyze the potential economic and environmental benefits of introducing advanced technologies into server room management practices. Conclusion. The choice of the optimal cooling method should take into account the specifics of the server equipment, thermal loads, room size and other factors. It is also important to pay attention to maintenance and selection of the optimal cooling system in accordance with the needs and characteristics of the server equipment.

INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

42-53 317
Abstract

Objective. Currently, the task of ensuring the security of Russia's national information resources is being updated as an important area of state policy in the information sphere. The purpose of the article is to describe a methodology for determining the criticality of processes in the research activities of a higher educational institution in order to solve the issue of assigning it the category of critical information infrastructure and, in accordance with this category, ensuring the requirements for the information security system. Method. The method of expert assessments and BPMN business process modeling are used. Result. An overview of approaches to categorizing objects of critical information infrastructure of scientific activity of higher education institutions is presented. The analysis and comparison of regulatory documents of regulators, their adaptation for the field of science, the main stages of categorization, local regulatory documents allowing categorization in accordance with the requirements of the regulatory framework are determined. To carry out the categorization process of the university, a scheme of categorization stages has been developed, the rules of analysis of the organization's objects for the purpose of identifying criticality with subsequent assignment of a category of significance or rejection of a category have been considered. Conclusion. The scientific activity of a higher education institution is subject to analysis to identify critical processes, inventory of objects with identification of possible consequences as a result of the implementation of security threats, identification of subjects and objects of critical information infrastructure, assessment of the category of significance. To increase the reliability of the results obtained, the rules of procedure of the special commission on categorization, drafts of local documents on the inventory of objects and the formalization of processes have been developed.

54-59 158
Abstract

Objective. The purpose of the study is to use artificial intelligence tools to optimize and model the automated organization of work at a mass service enterprise. Method. The research is based on the use of a Petri net as a modeling tool, as well as mathematical hardware that makes it possible to implement simulation models of subsystems and conduct additional research on GPSS artificial intelligence models. Result. To process the results of the modeling process, the Petri net modeling method was used and a network activity model graph was developed. The modeling process used with the Petri Net application allows such functions to be described more clearly. The principles of modeling systems based on the GPSS language and Petri nets are considered. Conclusion. It is advisable to use the language devices GPSS and SP, which provide information support for the activities of a mass service enterprise, modeling the structural organization and information flows.

60-71 195
Abstract

Objective. The study presented in the paper is aimed at studying the methods for improving the efficiency of software in modern computing systems with a hierarchical memory structure. Method. The study is based on data caching technologies in microprocessors. Result. The article presents the results of the analysis of various approaches to the development of efficient software taking into account the characteristics of the memory subsystem of the computing system, which made it possible to prove the importance of cache memory in improving the performance and interaction of computer components. Conclusion. Cache memory is a critical element in the architecture of microprocessors, playing a key role in determining the performance of the computing system. Optimizing the use of cache can significantly improve data access time and, as a result, overall system performance. Software developers need to pay special attention to the characteristics of the memory subsystem when designing and implementing solutions.

72-85 243
Abstract

Objective. The research aims to detect anomalies in data using machine learning models, in particular random forest and gradient boosting, to analyze network activity and detect cyberattacks. The research topic is relevant as cyber attacks are becoming increasingly complex and sophisticated. Developing effective methods for detecting anomalies and protecting against cyber threats is becoming a priority for organizations. Method. The research is carried out using two machine learning algorithms: Random Forest and gradient boosting. The process includes analyzing important metrics, visualizing solutions, evaluating the performance of each model, and analyzing error matrices for attack categories. Result. The Random Forest model showed an accuracy of about 94% when using the top 10 important features. The graph provides insight into how the model makes decisions based on features. The Xgboost gradient boosting model achieved high accuracy and reliability of results. The report provides a description of the model's performance for each category. Conclusion. The work done is the result of a comprehensive analysis of a machine learning model designed to detect cyberattacks. It includes several key steps and methods that allow us to evaluate the effectiveness of the model, identify important features, and analyze performance for various attacks.

86-92 191
Abstract

Objective. The study examined the main aspects of building an information security system from the point of view of optimizing the resources spent and funds to ensure information security. Method. In this subject area, the possibilities of structural-parametric models and Markov chains for identifying the optimal line for constructing a multi-level information security system are considered. Practice shows that the construction and implementation of a multi-level information security system reduces the possibility for an attacker of compromise and unauthorized access to protected information. Result. An analysis of the functionality of the constructed models was carried out as a means of finding the optimal way to build an information security system. An assessment of information security risks was carried out at the most vulnerable points in the information security processes. An approach to building a multi-level information security system using the functionality of structural-parametric models and Markov chains has been developed and proposed. A pattern has been formulated that makes it possible to determine the correctness of the constructed information security system based on the analysis and assessment of information security risks at the most vulnerable points of a multi-level information security system, in the process of transition from one state to another. Conclusion. Ensuring information security using mathematical modeling methods is a relevant and valuable tool based on the dynamism of threats and their uncertainty at different periods of time. The development, testing and implementation of new approaches based on modeling allows us to predict and prevent the most likely actions and steps of an attacker, thereby reducing the level of risk and possible damage to protected information resources and systems.

93-102 194
Abstract

Objective. The objective of the study is to create an intelligent system for monitoring the condition of equipment and managing the operating modes of a gas distribution station (GDS) based on a logical-linguistic (fuzzy) model for making assessment and management decisions. Method. The theory of fuzzy sets and algorithms of L. Zade was used, which allows the use of qualitative concepts and allows the creation of logical-linguistic models of the controlled process on their basis. Result. The article provides a rationale for using an intelligent system for assessing the state of equipment and managing a gas distribution station (GDS) based on a logical-linguistic (fuzzy) model for representing the knowledge base for making assessment and management decisions. This approach provides developers of control systems for complex processes and/or objects with a clear and effective way to describe their dynamics. Conclusion. An intelligent system for assessing equipment conditions and managing the operating modes of the gas distribution station, in which the knowledge base is presented in the form of a logicallinguistic (fuzzy) model, allows for solutions to the specified problem based on the knowledge of an experienced expert (dispatcher), which will improve the quality of service and reduce the operating costs of the gas distribution station

103-109 183
Abstract

Objective. This paper presents a study of object tracking algorithms for analyzing sports competitions with a minimum permissible number of frames per second without critical loss of quality of operational systems. The purpose of the study is to determine the optimal tracking method and reidentification model with an increase in the time interval between frames. Method. The study used the Re-Identification MSMT17, Market1501, DukeMTMCreID datasets; specialized neural networks OsNet, ResNet and MobileNet. Tracking algorithms BotSort, Bytetrack, OcSort, DeepOcSort, StrongSort. The NOTA and IDF1 quality metrics were used. Result. The metrics of the experiments are generally quite low, which is due to the nonlinearity of athletes' movement, unlike pedestrians' movement, and a large number of changes in their posture. Conclusion. Depending on the degree of information compression, the optimal tracking methods when using pre-trained reidentification models are ByteTrack and OcSort.

110-116 213
Abstract

Objective. The article explores a way to improve the security of a corporate network by using the technique of spoofing sender addresses when forwarding packets between computers. Method. Network traffic analysis methods, network protocol level programming and data packet processing algorithms are used. Computers on the network are connected to one server. When sending packets between computers in the network, the sender's address is replaced, and when a packet is received by another computer, the packet is disassembled, and the real sender's address is inside it. Result. The method allows for effective protection of a corporate network from attacks associated with the forgery of addresses of data packet senders. Conclusion. Using the sender address substitution technique when transmitting data in a corporate network is an effective way to increase security and protection from external threats. Further research is aimed at developing complex and reliable methods for protecting networks.

117-122 130
Abstract

Objective. The purpose of the study is to solve the problem of calculating the parameters of a linear regression model based on the joint application of anti-robust estimation methods and maximum consistency between the real and calculated values of the dependent variable in continuous form. Method. The unknown parameters of the model are calculated by reducing the original problem to a linear programming problem. Its solution should not cause computational difficulties due to the significant number of developed effective software tools. Result. The generated linear programming problem has a dimension acceptable for real situations. Conclusion. The results of solving a numerical example indicate the effectiveness of the method proposed in the work for calculating the parameters of a linear regression model based on the joint application of anti-robust estimation methods and maximum consistency. The final choice of parameter values remains with the model developer.

123-129 185
Abstract

Objective. The goal is to develop a web service for detecting aerial objects that detects a flying object, highlights it in an image and classifies it as a threat, since modern aerial object detection systems do not always cope with the task of detecting unmanned aerial vehicles due to their small size, low flight altitude and the use of materials that are barely noticeable to radar stations. Unmanned aerial vehicles that operate without operator control make it difficult to detect by radio signals. To detect UAVs, it is proposed to use a system based on optical scanning of the sky around protected objects. The system should be capable of autonomous operation and include aerial object detectors created on the basis of computer vision and artificial intelligence technologies. Method. The research and development of the airspace monitoring web service are based on the methods of system analysis, synthesis, and deduction. Result. The visual part of the web interface has been designed and developed; a dataset has been formed from open sources for the correct detection of flying objects; a neural network detector has been developed for classifying flying objects that pose a danger; a software module has been developed that allows for the automatic detection of identification flags of dangerous air objects with subsequent provision of reports in txt files in yolo format (coordinates are normalized). Conclusion. Separation of the visual part of the service will allow for distributed deployment of the server part, increasing flexibility and scalability. Development of the administrator control panel will allow for effective control of the service, management of settings and users. As a result, the web service will be able to: monitor the sky around protected objects, automatically detecting and classifying air objects and identifying air objects by threat level, providing information for taking necessary measures.

130-144 332
Abstract

Objective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes. The aim of the work is to identify threats and existing methods and means of ensuring the security of a user's personal data and his reputation when using OSINT by intruders, as well as to identify the main problems in protecting user PD taking into account OSINT. Method. The study uses an extended method of systematic literature review (e-SLR), which is a systematic literature review (SLR) supplemented by responses from ChatGPT, GigaCHAT, YndexGPT neural networks. Result. 41 sources were received for the analysis of the problem, on the basis of which threats to personal data were identified: violation of the confidentiality of personal data and the operation of information systems, targeted attacks using social engineering, password disclosure, espionage; protection tools: data processing before publication, anonymization and depersonalization, limitation of personal data, selection of sites, protection using OSINT, creation of complex passwords, use of protection tools, organizational measures; problems in the development of protection tools: working with big data, unreliability of information and sources, labor-intensiveness of data analysis, technical limitations, bias, ethical and legal aspects. Conclusion. The results were used to develop models for protecting personal data in open sources, methods and means for detecting and preventing violations of their security.

145-153 152
Abstract

Objective. Currently, the task of increasing the spectral solvability of a video stream using modern frame filtering methods is urgent. Various methods of frame filtering are considered and analyzed in the work, and their detailed comparative analysis is carried out. The obtained data contribute to the further development of various materials to increase the spectral resolution of the video stream. Method. A large number of different approaches have been developed in the scientific literature to increase the spectral resolution of a video stream using modern frame filtering methods, and the most basic ones are analyzed in this paper: linear spatial filtering; nonlinear spatial filtering; spatial frequency filtering; filtering using Fourier analysis; filtering based on wavelet analysis. Result. A preliminary systematization of the characteristics of the methods under consideration has been carried out in order to develop new algorithms and implement them to improve image quality, increase detail and clarity of the video stream; various frame filtering methods have been analyzed, contributing to an increase in the spectral resolution of the video stream, and their impact on the quality of video content has been considered; during the analysis, it was found that in order to increase the spectral solvability of the video stream, it is necessary to use a combined filter. The above facts will allow us to further develop methodological recommendations for increasing the spectral solvability of the video stream. Conclusion. The considered approaches to increasing the spectral resolution of a video stream using modern frame filtering methods are preferable when increasing the spectral resolution of images, since they use all the positive aspects of linear, nonlinear and spatial frequency filtering.

154-162 172
Abstract

Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. Method. Systematization of disparate information, analysis of the field, description of available developments are the main methods that were used in the study. The work is divided into three large sub-blocks. The first one analyzes the concept of machine learning, describes the main ways to correctly interpret the information entered, indicates the most popular techniques and databases. In the second part of the work, an analysis of artificial neural networks is carried out. In particular, their subspecies are shown with a description of the implementation features, and a comparison with living neurons is carried out. In the third part, the practical implementation of the two techniques and their comparison are carried out, recommendations are given regarding their use in detecting phishing portals. Result. The paper investigates the methods of analyzing phishing portals. The analysis showed that it is most rational to use a random forest, because it provides quality according to the precession, recall, F1-score, 98% metrics with a significant number of parametric values entered. Conclusions. When implementing various search methodologies for phishing portals, it is necessary to take into account their decrease in efficiency from the entered parameters. To do this, it is important to conduct preliminary tests. However, the test result can be interpreted in different ways. In particular, the effectiveness of the methods can be improved if you limit the number of input parameters, but at the same time rigidly structured according to one search criterion.

163-171 196
Abstract

Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the Russian Federation), taking into account possible security threats and the requirements of the standard GOST R ISO/IEC 15408 for leveling possible consequences. Information Message № 240/24/4893 dated October 18, 2016 «On Approval of Information Security Requirements for Operating Systems» of the FSTEC of Russia defines 6 OS security classes. Operating systems corresponding to protection classes 1, 2 and 3 are used in information (automated) systems in which information containing information constituting a state secret is processed, operating systems corresponding to protection classes 4, 5 and 6 are not intended for processing such information. In the presented study, the open operating systems of the AS of the Russian Federation are understood as OS AS, in which information containing information constituting a state secret is not processed. Method. The study was conducted based on the method of analyzing possible security threats to open operating systems, as well as the requirements of GOST R ISO/IEC 15408 standard, using the provisions of fuzzy logic. Result. The result of the automated system for calculating the security index of the analyzed open OS is one of the specified criteria for the degree of security of the OS, based on the provisions of fuzzy logic. Conclusion. The authors propose a method for assessing the security of open OS of the AS of the Russian Federation, based on the provisions of fuzzy logic.

BUILDING AND ARCHITECTURE

172-179 201
Abstract

Objective. The identification of increased noise levels from ventilation systems during the operation of buildings necessitates complex and costly procedures to detect and eliminate noise sources, conduct dismantling work, install additional silencers, or replace ventilation equipment. Therefore, accurate acoustic calculations are one of the most critical tasks in the design of various facilities. Method. This article presents an analysis of domestic and international methods for determining the noise generated by throttling devices. The accuracy of the calculation results was evaluated by comparing them with data from field tests. Result. A sharp increase in sound power level within the throttling device was observed when the blade angle exceeded 60 degrees, significantly impacting the acoustic environment of the premises and leading to an exceedance of regulated noise levels. Conclusion. The conducted comparative analysis of existing calculation methods revealed that the domestic calculation method provides the required margin for the sound power level of the throttling device across all octave bands. A notable drawback of international calculation methods is the lack of consideration for the acoustic impact of duct fittings and the connection of the duct to the throttle, which underscores the need for further validation of these methods for complex systems.

180-188 148
Abstract

Objective. The purpose of the work is to calculate frame buildings with flexible connections and with flexible and switch-off connections, to make recommendations for the use of seismic insulation methods depending on the characteristics of seismic events. Method. Development of an algorithm for calculating frame buildings of a frame structural system with seismic protection in buildings with flexible connections and with flexible and switchable connections Result. A method for calculating frame buildings of a frame structural system with seismic insulation in the form of flexible connections and flexible and switchable connections has been developed. A computer calculation program for seismically insulated and nonseismically insulated frame buildings in the Delphi 5.0 programming environment in the Object Pascal language using the Runge-Kutta numerical method of the 4th order for solving differential equations has been compiled Conclusion. It is determined that the construction of frame buildings with the seismic insulation methods considered in this paper, namely with flexible connections and with flexible connections and disconnecting connections, is not impractical for territories where long-period fluctuations are possible, due to the fact that excessively high deformations occur.

189-194 215
Abstract

Objective. Over the past decades, heat pumps have gained great popularity due to their advantages in energy efficiency and environmental friendliness, becoming one of the most attractive alternatives to replace traditional heating systems running on fossil fuels. Heat pump efficiency is a decisive factor that should be taken into account when selecting and optimizing a heat pump system. The aim of the study was to evaluate the efficiency of air source heat pumps of the air-to-water system in the climatic conditions typical of the regions of the Central Federal District. Method. To evaluate the efficiency of air source heat pumps, a mathematical model is used that takes into account the multifactorial nature of the process under study. Result. To adequately compare the obtained research results with the passport performance indicators, the transformation coefficient (COP) was used, showing the ratio of the energy received to the expended work. As a result, the method of heating rooms with an air source heat pump with a combined operation mode was recognized as more preferable. Conclusion. Currently, the potential of heat pumps in the field of energy saving and CO2 emission reduction remains largely untapped, which sets the vector for further research.

195-201 167
Abstract

Objective. Currently, cement is crushed in mills to a specific surface area of 2500-3000 and 3500-4500 cm2/g or more. Further grinding of clinker sharply worsens the properties of the resulting product. The relevance of the topic is due to the increased interest in reducing material and energy costs in the process of clinker grinding. The purpose of the work is to study the effect of different assortment of grinding media and weighted average ball diameter on the particle size of the final product, performing particle size analysis by particle diffraction. Method. To obtain reliable experimental data, a specially developed model of the grinding unit was used. Analysis of particle size by diffraction or spatial distribution (scattering spectrum) of scattered light was carried out using a laser analyzer. Result. A research methodology has been developed that meets the modern capabilities of experimental technology. Experimental studies have been conducted on clinker grinding in a laboratory mill. The combined effect of different assortments of grinding bodies and the average weighted diameter of the ball on the particle size of the final product has been determined. Conclusion. Studies of the curves of the final product obtained using different weighted average ball diameters have shown that large impact energy is not required to grind small grains; the diameter of the grinding bodies should decrease as the grain size of the material decreases. Therefore, the balls must have a minimum diameter, but sufficient to destroy the particles of the material.

202-214 140
Abstract

Objective. The aim of the study is to estimate free vibrations of a continuousdiscrete multi-span beam taking into account the inertial forces of rotation. The goal is to determine the spectra of natural frequencies, damping coefficients and natural modes. Method. The study is based on the methods of linear mechanics of structures; numerical and numericalanalytical calculation methods. The solution to the problem is found using the method of separation of variables. Rotational movements of particles of continuous sections are taken into account according to one of the models of the Timoshenko beam. The D'Alembert principle and hypotheses on the smallness of displacements and angles of rotation of sections are used. Result. A system of equations in matrix-vector form is obtained. The mathematical model of transverse vibrations consists of three systems of differential equations. The equation includes transverse forces, external concentrated forces, d'Alembert inertial forcesi, and linear-viscous resistance forces. The inertial forces of rotation of concentrated masses are taken into account. The boundary and other additional conditions to the equations correspond to the calculation scheme. The left end of the beam is hinged. The conjugation conditions are met at the junction of the sections. Conclusions. This random process of disturbances is very close to the processes used in deterministic problems. The amplitudes and standard deviations of displacements in the deterministic and stochastic problems almost coincide, which confirms the reliability of the proposed calculation theory. Analysis of the curves shows that the standard deviations significantly depend on the degree of correlation of the components of the vector random process of disturbances. The use of modern computing computer systems such as Matlab allows us to successfully combine the advantages of both numerical and graphical methods.

215-226 148
Abstract

Objective. Trusses and frames are widely used in the design and construction of buildings and structures, since they have high load-bearing capacity and rigidity. At the same time, they have a significant mass. In order to reduce the mass and cost of rafter and frame structures, this article develops optimal design and calculation schemes using steels of different strengths. Method. The study is based on the theory and methods of design optimization. By studying the features of the frame and truss operation, the most loaded elements of the structures are determined. In accordance with this, steels of different strengths are selected, which ensures a decrease in the mass of the structure and its cost. Comparing various design and calculation schemes, the optimal distribution of steels of different strengths along the span of the structures is proposed. Result. The developed design and calculation schemes make it possible to reduce the mass and cost of frames and trusses by optimally distributing steels of different grades. Conclusion. The proposed solutions can find application in the practice of designing and constructing metal structures. Structural schemes of trusses and frames have been developed, where steels of different strengths are used, which in terms of weight and cost compare favorably with corresponding structures made of steels of the same strength (one grade).

227-236 199
Abstract

Objective. Depending on the stress level, the operation of wooden beams under prolonged load is characterized by both linear and nonlinear creep. This has been shown by numerous experimental studies of wood. The theoretical description of these processes is poorly studied or presented extremely rarely. One of the priority areas in the calculations of wooden structure elements is the derivation of resolving equations of linear or nonlinear creep for various types of stress-strain state. Method. The Maxwell-Thomson equations are used as relations establishing the relationship between stresses and deformations. The technique was tested by comparing the solution with the calculation of well-known researchers. An example of calculation is given for various boundary conditions for fixing a beam of rectangular crosssection loaded with a uniformly distributed load. The deflection value is determined by the grid method. Result. A program has been developed for calculating in the MATLAB package with the possibility of varying the initial data and displaying a graph of the dependence of displacement, bending moment on time. The comparison of the maximum deflection value with the analytical solution is given. It is noted that the stresses practically do not change during creep. Conclusion. The proposed approach can be applied to the analysis of the stress-strain state and bearing capacity of wooden beams of arbitrary cross-section. There are no restrictions on boundary conditions and loading type, and the beam material can be not only wood, but also fiberglass.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)