Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search
Vol 52, No 1 (2025)
View or download the full issue PDF (Russian)
https://doi.org/10.21822/2073-6185-2025-52-1

ENERGY AND ELECTRICAL ENGINEERING

6-12 132
Abstract

Objective. The aim of the study is numerical low-Reynolds modeling of heat transfer in a pipe with protrusions of semicircular transverse profiles with Reynolds criteria characteristic of laminar, transitional and turbulent flows of coolants.

Method. Implemented by the method (FCOM-om) in the article, both local and integral, both stationary and non-stationary characteristics of flow and heat transfer in a pipe with internal ribs were generated in transient and laminar flow modes of the coolant, which made it possible to determine for these modes the levels of heat transfer intensification, which satisfactorily correlate with the available experimental data.

Result. The successful modeling of air heat transfer in pipes with turbulators based on the low-Reynolds Mentor model at high Reynolds numbers up to one million determines the promising modeling of heat transfer in pipes with turbulators by this method and at higher Reynolds numbers.

Conclusion. Therefore, the applied model adequately describes the realized phenomena of intensified heat transfer for laminar, transient and turbulent modes of coolant flows with a wide range of Prandtl numbers. The obtained patterns can be used in the engineering and scientific calculation of intensified laminar, transient and turbulent heat transfer during flow in channels with protrusions used in promising heat exchangers used, among other things, in aviation and rocket and space technology.

13-21 90
Abstract

Objective. The article is dedicated to the study of heat transfer processes in a Leontiev tube based on the principle of gas-dynamic temperature stratification. The objective of this work is to describe the mechanism of interaction between subsonic and supersonic flows and identify key parameters influencing stratification efficiency.

Method. The study was conducted using an analytical approach and numerical modeling in the ANSYS Fluent environment. Temperature and velocity fields were visualized, and heat flow density was analyzed. The k−ω SST turbulence model was applied, enabling the consideration of complex gas flow characteristics in the tube.

Results. The main heat transfer patterns were identified, including the effects of temperature and pressure differences between subsonic and supersonic flows, as well as the role of turbulent energy in enhancing heat exchange. It was established that the gas exiting the supersonic channel is heated compared to the inlet conditions, while the gas exiting the subsonic channel is cooled.

Conclusion. The results can be used to improve the efficiency of heat exchange in industrial systems and to design heat recovery devices.

22-30 129
Abstract

Objective. The aim of the study is to assess the presence and form of heat transfer intensifiers in a volumetric crystallizer of the "pipe in a pipe" design.

Method. The study is based on the method of thermodynamic analysis, natural and computational modeling of processes using computer modeling.

Result. It is shown that the most important parameter of heat exchangers (regardless of the process) is the amount of heat transferred per unit of time (thermal power, which is directly proportional to the surface area of the heat exchange). The article presents the results of evaluating the effect of the presence and form of heat transfer intensifiers on the mass of the Crystallizer and the power required for pumping the coolant (when freezing ice on the inner surface of the heat exchanger tube) based on the results of computer modeling.

Conclusion. Two forms of heat transfer intensifiers providing the best energy and mass efficiency of crystallizers are presented.

31-38 83
Abstract

Objective. The aim of the study is to develop recommendations for optimizing cooling systems for power transformers in order to increase their efficiency and reduce losses during electric power transformation.

Method. The study included a thermodynamic and comparative analysis of existing methods of cooling electric transformers in order to identify the advantages and disadvantages of cooling systems.

Result. Various cooling schemes and transformation heat recovery systems are presented. It is substantiated that there are low-temperature systems that can significantly improve the technical characteristics of a transformer without resorting to such low temperatures. Considering the peculiarity of freon refrigeration machines, when a refrigerating agent, for example, R134a and lubricating oil mutually dissolve in each other, forming a "two-layer cake", and fill the entire refrigeration system, a transformer can be considered an element of a refrigeration machine (evaporator).

Conclusion. The use of innovative cooling methods can significantly improve the efficiency of electric transformers while simultaneously increasing their efficiency.

INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

39-48 94
Abstract

Objective. The purpose of this article is to explore issues and develop approaches to enhance information security in the production control networks of industrial enterprises to the necessary level. Traditional and once-effective protective methods based on physical isolation have become outdated, necessitating new approaches that consider the characteristics of automated process control systems.

Method. The analysis presented in the article identifies differences between automated process control systems and classical information systems, based on the NIST SP 800-82 standard, and evaluates their unique requirements and vulnerabilities. Methods for improving information security are proposed, including regular training, audits, network segmentation, and the use of specialized protection systems.

Result. An action algorithm has been developed to protect the APCS system, ensuring that enterprises comply with regulatory requirements and minimize the risks of cyber attacks, as well as protect critical production processes. A set of preventive measures and methods for eliminating vulnerabilities in APCS systems to protect industrial networks is proposed.

Conclusion. Ensuring information security in APCS requires a comprehensive approach, including risk management strategies, technical means and continuous personnel training. The implementation of the proposed measures and strategies will increase the overall resilience of industrial systems to modern information security threats.

49-56 106
Abstract

Objective. The aim of the study is to model the behavior of dynamic control objects. The control objects are considered, the mathematical model of which corresponds to the description of typical dynamic links, for example, oscillatory, inertial.

Method. Approaches inherent to the linear problem of speed and the boundary value problem for ordinary differential equations are used. Solutions are determined programmatically using traditional computing packages.

Result. The results show the possibility of transferring a given control object from the zero state to the calculated point of the external trajectory of movement.

Conclusion. The possibility of solving a boundary value problem for control objects that can be both stable and unstable at their poles is shown.

57-66 100
Abstract

Objective. The purpose of this article is to identify ways to improve the security systems (SS) of critical facilities (CF) that are subject to the regulation of legislation on critical information infrastructure (CII).

Method. The methods used were information protection and information security, analysis and generalization of individual provisions of regulatory documents on ensuring the information security of critical information infrastructure facilities, the results of research work on the subject of the study, presented in the Russian Science Citation Index, Russian State Library, and Federal Institute of Industrial Property. The general methodological basis is a systematic approach.

Result. A review of the requirements of regulatory and legal documents on ensuring the safety of the SS of CF, as objects of CII, has been conducted, which showed that an analysis of the established practice of ensuring their safety is necessary. A review of the methods of ensuring the safety of radio-channel SS present in the Russian market is carried out. Widely used radio channel security alarm systems (SAS) are considered. Contradictions have been revealed between certain provisions of regulatory legal documents on ensuring the safety of CII and the established practice of using radio-channel SS, which can be attributed to CII. Ways to improve the security system of critical information systems, which can be classified as insignificant critical information infrastructure objects, in particular radio channels alarm systems.

Conclusion. The conducted research allowed us to identify ways to improve the radio-channel SS of the CF, as objects of CII, in the field of ensuring their IS.

67-76 73
Abstract

Objective. The aim of the study is to solve a problem aimed at assessing the characteristics of electromagnetic wave scattering on hollow structures whose dimensions belong to the resonant region.

Method. The dimensions of the hollow structures with maximum scattering characteristics were determined by a combination of the integral equation method and the optimization method. Scattering at the edges of the aperture of the hollow structure is taken into account. It is proposed to use the Mathieu equation to determine the flow characteristics. The stages of the algorithm for calculating the Mathieu functions are given, which were used during the implementation of the computer program. Parseval's equality is used for the integral transformation.

Result. A mathematical model and an algorithm for numerical analysis of the scattering features of plane radio waves on hollow structures that are components of complex-shaped objects, antenna-feeder lines, and antenna devices have been created. The results of test calculations have been obtained. The structure of the subsystem for analyzing complex-shaped hollow structures has been proposed.

Conclusion. A priori estimates are obtained for the solution of a boundary value problem in a strip of higher-order elliptic equations degenerating to a cubic equation in one variable. Conditions for achieving a priori estimates are shown; additional spaces are introduced for this purpose. The problem is studied in weighted spaces of the S.L. Sobolev type. Two theorems related to the boundary value problem in a strip for one class of degenerate elliptic equations of high order are considered, and an analysis of the possibilities of obtaining an a priori estimate is carried out. Weighted spaces give an a priori estimate for the solution of a boundary value problem in a strip for a higher-order elliptic equation degenerating to a cubic equation on one of the boundaries of the strip in one of the variables.

77-86 67
Abstract

Objective. The aim of the study is to assess the prospects for using building information modeling technologies to solve problems of designing buildings and structures in adverse climatic conditions.

Method. The article analyzes the impact of using building information modeling (BIM) technologies on the development of sustainable and energy-efficient buildings. The advantages of using BIM technologies in design and construction, including the use of generative design technology, are described. The stages of working with BIM models are outlined, the advantages of BIM modeling over traditional modeling are described. The main aspects and tasks of designing in difficult climatic conditions are discussed. An example of an energy-efficient building in difficult climatic conditions, built using BIM, is considered.

Result. A script has been developed in the Dynamo visual programming environment, which allows taking into account the influence of adverse climatic conditions (wind) for a particular area. The script makes it possible to select the shape of the facade and the orientation of the building in space to minimize the adverse effects of the wind. The data used to determine the wind strength and its direction at different times of the year are taken from EPW files.

Conclusion. The paper draws conclusions about the key role of using BIM technologies in developing sustainable and energy-efficient buildings in various climatic conditions. It notes the prospects of the proposed approach and the possibility of further development of research in the field of visual programming for designing energy-efficient buildings.

87-96 86
Abstract

Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud. The article describes the features of cyber fraud based on the psychological aspects of influence on the victim.

Method. The study is based on statistical methods related to determining the relationship between the degree of susceptibility to cyber crimes and the level of manifestation of the character traits of victims identified in the form of corresponding quantitative characteristics according to the Cattell test.

Result. A method is proposed for determining the coefficients that set the relative weights for the degree of manifestation of factors in the task of identifying susceptibility to a particular cyber crime. A mathematical model is proposed for assessing the level of cyber victimhood of a respondent in relation to a specific cyber crime depending on the magnitude of numerical values describing the personal characteristics studied using the Cattell test. The model introduces a numerical indicator that determines the criterion for the degree of susceptibility of the respondent to the cyber crime in question. Based on statistical data, the level of cyber victimization was calculated in terms of types of cyber fraud, such as phishing, vishing, online shopping fraud, for respondents who can be classified as victims and resistors of the relevant cyber crimes based on a set of personal characteristics.

Conclusion. The correspondence of the obtained numerical characteristics describing the level of cyber victimization of the respondent, his qualitative belonging to the number of victims or resistors for each type of cyber fraud was demonstrated.

97-104 68
Abstract

Objective. The problem of personal data (PD) protection continues to be relevant even despite the more than significant amount of regulatory documentation developed by various regulators. The aim of the study is to develop methods for assessing the risk of personal data leakage from malicious attacks through supplier channels.

Method. The presented paper examines the problem of protecting personal data in information systems of universities through third–party channels – service providers (supply chain attack), which, in most cases, have not been sufficiently studied by experts in the field of IT-security.

Result. Unlike the well-known "commercial" proposals providing for the introduction of new and new countermeasures (limited only by the budget), it is proposed to apply the method of assessing the risks of PD leakage through all existing PD circulation channels, and not only for the simplest formalized fulfillment of the requirements of the PD owner. The focus of the presented work is on ensuring the protection of PD for Universities in the Russian Federation, accordingly, several channels for the dissemination of PD in the main critical areas (provision of educational content, data of applicants and their representatives, requests from employers, etc.) were studied.

Conclusion. The presented results can be in demand both in the educational process for University programs in the specialty "Information Security", and by experts dealing with practical aspects of ensuring the protection of PD in Universities.

105-112 49
Abstract

Objective. Development of an algorithmic method for estimating the parameters of a linear regression model based on minimizing the sum of excesses of absolute deviations of the calculated values of the dependent variable from the real ones relative to some predetermined level.

Methods. The least absolute values method based on minimizing the city (Manhattan) distance between the vectors of calculated and specified values of the dependent variable is used as a basic method for identifying unknown parameters of the regression equation. Implementation of the method is reduced to a linear programming problem. The problem of minimizing the sum of excesses of absolute deviations of the calculated values of the dependent variable from the real ones relative to some predetermined level is reduced to this problem by introducing some additional constraints and replacing the objective function.

Result. Three alternative, highly adequate, versions of a regression single-factor model for the development of the Russian industrial sector engaged in the production of electrical, electronic and optical equipment are constructed. The volume of investments in the industry is used as an independent variable.

Conclusion. A criterion for the adequacy of regression models is proposed, which is a modification of the loss function used in the least absolute value method.

113-121 108
Abstract

Objective. The aim of the study is to develop a model for estimating the probability of message delivery in a medical Internet of Things (IoMT) system and to study the dependence of this value on the number of retransmissions used to compensate for distorted or lost telemetry data.

Method. The transmission of telemetry messages is carried out in accordance with the MQTT-SN protocol. Message delivery is performed using the server as an intermediary device to which client devices connect, i.e. sensor devices that transmit measured data, and wireless devices for healthcare workers that receive this data. To develop a message delivery model, it is proposed to use the apparatus of probabilistic graphs. The adequacy of the model was verified based on computational experiments.

Result. A mathematical model of the process of delivering telemetry messages in an IoT system has been developed, which adequately reflects the dependence of the probability of message delivery on the characteristics of wireless channels, parameters of transmitted packets and acknowledgments, as well as the allowed number of retransmissions.

Conclusion. The model can be used to estimate the probability of message delivery in the medical Internet of Things system. The use of the model makes it possible to select theoretically justified values of the permissible number of retransmissions, established to achieve the required values of message delivery probability under the current level of bit error rate in wireless channels.

122-133 79
Abstract

Objective. The purpose of this study is to conduct a comparative analysis of various frameworks for the development of mobile applications: native, hybrid and cross-platform solutions.

Method. To achieve this goal, methods of analysis, synthesis and comparison were used. The characteristics of various mobile application development frameworks were analyzed, including their performance, cost, and access to device capabilities.

Result. Native frameworks have been found to have the highest performance and the ability to provide the most native look and functionality for an application. This approach has limitations as it requires separate development for each platform, which leads to increased time and resource costs. Hybrid solutions have proven to be cost-effective, allowing you to use a single code base to create applications for different platforms. This simplifies the development and maintenance process. Hybrid apps may have limited performance due to the use of WebView to display the interface and limited access to device capabilities. Cross-platform frameworks, on the other hand, provide a balance between performance and resource efficiency. They allow you to use a single code base to create applications for multiple platforms and can achieve satisfactory performance. However, they may have limited access to certain device capabilities and the appearance of applications.

Conclusion. The results make a new contribution to the field by providing a detailed analysis of mobile app development approaches and frameworks used to build them. The results can be used to make informed decisions regarding the choice of framework for mobile app development.

134-146 76
Abstract

Objective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.

Method. Hashing algorithms were used in the study.

Result. The possible functionality of the software tool and organized integrity checking mechanisms by using hash tables and restoring a file from a backup copy are presented. The software module uses the developed algorithm that allows eliminating vulnerabilities associated with program integrity, as well as significantly reducing the impact of malicious algorithms on file integrity. A comparative analysis with existing analogs is carried out for the developed software tool, as well as a graphical representation of the algorithm's performance, showing the dependence of time on the number of files. To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.

Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. The main tasks for future improvement of the software tool have been defined: expanding the functionality of the software tool; optimizing the program code to achieve greater performance; updating and improving the software modules; adding disk image copy functions.

147-161 80
Abstract

Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing. It is necessary to develop the architecture of a Java application for hidden integration with the information system.

Method. The research used methods of analyzing information in information system logs, static analysis methods, programming for application development, and data processing algorithms.

Result. An example of implementing the Elasticsearch stack for processing and storing logs is presented. An implementation of anomaly analysis using the official Elasticsearch library is proposed. Options for using Elasticsearch for anomaly analysis are considered, an implementation of anomaly analysis using the official Elasticsearch library is proposed. The architecture of a Java application integrated into an information system for automated log analysis in order to detect computer attacks or signals of their onset by searching for anomalies is proposed. Variants of anomalies in information system logs are considered and actions for their detection are described. A generalized map of the Java application workflow is demonstrated.

Conclusion. The architecture of a Java application implementing the analysis of logs of an information system for key anomalies has been developed.

162-172 58
Abstract

Objective. The aim of the study is to modify the automatic method for extracting cause-and-effect relationships.

Method. The study is based on the original method of Antonie Sorgente with its subsequent modification.

Result. A method for extracting cause-and-effect relationships is proposed. The method involves the combined use of statistical data and machine methods. The original method was modified by translating the method to modern libraries such as NLTK and Spacy. The rules formed by the author were reworked and added to the Dependency Matcher module of the Spacy library. The number of keywords for each rule was increased. The method also takes into account synonyms, calculates Bayesian statistics and smooths Laplace for zero probabilities. Based on the difference in data with and without PSS, a multiplier coefficient was introduced to compensate for the skew of classes in the data.

Conclusion. The developed method was tested on the original data of the original method and showed improved metrics relative to the original method on training and test data.

173-182 57
Abstract

Objective. The aim of the study is to create a script for automating the processes of calculating water consumption and water disposal using the DYNAMO STUDIO development environment.

Method. Solving modern problems in the field of automated construction design involves the consistent implementation of two types of processes: algorithmization and visualization.

Result. The methods of operation of Dynamo scenarios are presented and described, which significantly speed up the calculation of water supply and sanitation, as well as the process of preparing project documentation. The principles of information modeling allow to increase the speed of design work and avoid a wide range of errors during design, which will not lead to corresponding problems at the stage of construction of the facility. The results of the application of the developed algorithms for automating the calculation of water consumption and sanitation are presented.

Conclusion. Using the Dynamo Studio development environment allows you to create effective software modules for automating calculations of water consumption and sanitation. This will improve the quality of design and reduce the time required to complete routine tasks.

183-192 84
Abstract

Objective. The article examines the influence of the “man-machine-environment” system on the reliability of automated systems of internal affairs bodies of the Russian Federation.

Method. The study was conducted based on an analysis of possible human and technical factors, as well as environmental factors affecting the reliability of automated systems, various sources of scientific literature and publications.

Result. The result of the automated system for calculating the security index of the analyzed open OS is one of the specified criteria for the degree of security of the OS, based on the provisions of fuzzy logic.

Conclusion. The calculation results demonstrate that replacing even one element allows increasing the overall reliability of the automated system. In the example of the considered ACS, the overall reliability of the automated system increased by 18%.

BUILDING AND ARCHITECTURE

193-201 75
Abstract

Objective. The article considers information modeling of the frame of a unique building of parametric form in the software packages SAPFIR and LIRA-SAPR. This type of architecture is just beginning to develop in Russia, unlike other large cities of the world, which is becoming dominant.

Method. At the first stage, the formation of a rotary surface with axoids "Cylinder-cylinder" formed by a straight line intersecting the axis of the movable cylinder, during external rolling, was considered. Varying the parameters made it possible to obtain a number of surfaces suitable for creating a parametric form of the frame of a unique building. A surface with five convex parts is adopted. The streamlined shapes of the object allow optimizing wind flows and protect against the formation of snow bags, which is relevant.

Result. A modal analysis was carried out for the first version of the system modeling. Calculation of deformations under the action of constant, temporary long-term and short-term loads was performed. A comparison of deflections, horizontal displacements and accelerations of floors with maximum permissible values was carried out.

Conclusion. The results of the study allow choosing the optimal variant of the analytical rotational surface. The calculation of deformations under the action of constant, temporary long-term and short-term loads is performed. Comparison of deflections, horizontal displacements and accelerations of floors with maximum permissible values showed that they do not exceed the maximum permissible values.

202-209 53
Abstract

Objective. The aim of the study is to develop theoretical and practical aspects of the use of cement concrete in the construction of road pavements, as well as to determine the prospects for the development of its production technologies.

Method. The study used a method for modifying the cement matrix at the nanolevel to improve the performance characteristics of the cement concrete pavement.

Result. The calculation of the selection of the thickness of the cement concrete pavement based on the Fuss-Winkler hypothesis was made. Particular attention is paid to modifications that increase the resistance of cement concrete to cyclic loads and temperature fluctuations. Since the hydrated phases of concrete have a thickness within 1-100 nm, the introduction of special additives can provide reinforcement of the cement binder at the micro level.

Conclusion. The unique properties of cement concrete with modern technologies of laying, compaction and maintenance, the use of nanoparticles in the cement matrix contribute to a more uniform filling of pores, improvement of strength and premature aging of concrete, which is an important factor for the transport system of Russia.

210-218 61
Abstract

Objective. The article deals with the analysis of the resistibility of building mortars made of dry building mixtures according to various criteria after 100 cycles of freezing and thawing and aging for 120 days according to the Russian National Standard 24544-2020

Method. The investigation was based on standards to determine the parameters of the pore structure of hardened mortars, flexural and compressive strength, frost resistance, ultrasonic pulse velocity, dynamic modulus of elasticity, adhesion strength to a standard concrete base and frost resistance of the contact zone, and shrinkage deformations.

Result. The relationships of changes in the investigated quality indicators of mortars under the specified impacts depending on the dosage of redispersible polymer powders and the type of mineral additive in the complex modifier are established. It is determined that long-term maturing to air-dry conditions can have more negative effect on some resistance criteria compared to 100 standard freeze-thaw cycles. The research reveals the relationships and offers the equations that describe the relationship between the criteria of "change in flexural strength", "change in adhesion strength to the concrete base" and the criterion of "change in compressive strength" taking into account the formulation factors and the type of mineral additive. The work points to inexpediency of usage such resistance criteria as "change in ultrasonic pulse velocity and dynamic modulus of elasticity" under the considered impacts. An approach to quantitative standardization of the criterion of "change in flexural strength" is proposed.

Conclusion. When developing dry construction mixes, it is necessary to take into account the influence of recipe factors on the indicators that determine the resistance of solutions under various operational impacts. The most "rigid" criterion is the change in the bending strength limit. The influence of complex modifiers on the resistance criteria depends on the type and dosage of additives and can be opposite.

219-226 94
Abstract

Objective. The aim of the study is to determine the causes of the formation of an uncomfortable microclimate in the school premises on the 1st floor (option 1), as well as to examine the school facade (option 2) using thermal imaging and temperature measuring devices inside the building.

Method. Аssessment of the building's structural design; external visual inspection of the building's external enclosures; thermal imaging survey using Testo 868 and Testo 870-1 thermal imagers; additional measurements of indoor air temperature and recording of meteorological conditions using a Testo 435 multifunctional measuring device with an air temperature probe; processing of the obtained thermograms.

Result. As a result of the measurements, thermograms were obtained inside the problematic rooms in the first school and on the facades of the buildings in the second school, as well as the values of the internal and external air temperature.

Conclusion. Thermal imaging revealed defects in the school facade according to option 2 and reasons for the uncomfortable stay of people on the 1st floor of the school according to option 1. Insufficient thermal protection of buildings was revealed due to poor insulation of enclosing structures, uninsulated entrance doors without a vestibule, which leads to condensation of moisture on the inner surface of the outer wall and door, as well as uncomfortable microclimate conditions in the premises. It was revealed that sunny weather in the cold season affects thermal imaging and does not allow measurements to be taken correctly, even taking into account that the amount of thermal energy from solar radiation at this time of year is insignificant.

227-241 56
Abstract

Objective. The aim of the study is to determine the performance characteristics of plate structures with one-sided connections. The paper considers issues that allow constructing calculation models of slabs on discrete supports and solid arrays with one-sided connections, and provides algorithms that allow analyzing the performance of plate structures (two-dimensional structures in plan).

Method. Analytical and graphical dependencies between slab displacements and their support reactions are constructed. Properties of generalized functions are used to describe nonlinearities that occur during structural deformations. Differential equations for transverse bending of slabs are presented, taking into account the above-mentioned performance characteristics of supports. Methods for solving these equations are presented.

Result. The presented design and calculation schemes allow correctly taking into account the performance of plate structure supports, and obtaining more accurate values of deflections and internal forces in sections on this basis, which ensures the required reliability of the structure. The results are presented in the form of analytical expressions, graphs, and tables.

Conclusion. Design and calculation schemes of plate structures with the features of the work of supports with one-sided connections have been developed. Recommendations have been formulated that can be used in the design of real plate structures with one-sided connections.

242-250 60
Abstract

Objective. This article presents a calculation method for a three-layer beam with lightweight filler taking into account the creep of the middle layer. A significant development of deformations over time under a constant load is presented.

Method. A beam hinged at the ends is investigated under a uniformly distributed load; the solution is carried out using the variational-difference method. The linear Maxwell-Thompson equation is used as the creep law. The Euler and Runge-Kutta methods are used to calculate the growth rate of highly elastic deformations.

Result. A graphical analysis of changes in stresses and deformations over time is presented. It is found that the ratio of elastic and creep deformations at different points in time varies significantly. A program has been developed for calculations in the MATLAB package with the ability to vary the initial data and output a graph of the dependence of displacements and bending moment on time. A comparison of the maximum deflection in the elastic stage (at the initial moment of time) with the solution in the LIRA SAPR software package is presented. It is noted that the stresses remain virtually unchanged during creep.

Conclusion. The proposed approach can be applied to the analysis of the stress-strain state and bearing capacity for any sandwich panels of arbitrary cross-section. There are no restrictions on the boundary conditions and type of loading, and the material of the beam's bearing layers can be not only metal, but also any other material, in particular, composite.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)