ENERGY AND ELECTRICAL ENGINEERING
Objective. This study examines the performance indicators of a solar-powered lithium bromide absorption chiller (LBAC) in the climate conditions of Astrakhan. Method. A new mathematical model based on simulation data was developed and verified to analyze the system's performance. The model's accuracy was validated by comparing it with existing data, and calculations were performed to determine the required number of solar collectors. Result. The study showed that the efficiency of the LBAC depends on the mode of coolant supply to the absorber and condenser of the LBAC. Parallel supply demonstrated better results in terms of thermal coefficient. The dynamics of the thermal load on the generator showed that solar insolation directly affects system performance, achieving maximum efficiency at high levels of solar energy. Conclusion. The results of this study can be used to design and optimize cooling systems in hot climates, promoting more efficient use of solar energy and enhancing energy efficiency.
Objective. The aim of the study is to develop a cooling thermoelectric device for physiotherapeutic methods of treating spine and spinal cord injuries based on local hypothermia. Method. Methods of thermodynamic analysis, natural and computational modeling of cryogenic equipment are applied. It is advisable to use cooling TEUs that have the following properties: reliability, environmental friendliness, noiselessness, functionality and compactness. Result. A segmental design of a cooling TEU is proposed, one segment of which includes a heat-dissipating rib cooled by a TEU, brought into thermal contact with the injured area of the spine, a TEU and a radiator for removing heat from it. Several segments of the device are used, which are attached to each other using a special device. During CTED operation, all radiators are blown by a fan unit. The dependencies were obtained and graphs were constructed describing the main characteristics of the TEU: change in the refrigeration capacity of the TEM, the coefficient of performance, supply voltage from the temperature difference between the junctions of the thermoelements for different values of the supply current, the dependence of the voltage on the TEM on the supply current at different values of the temperature difference between the junctions of the thermoelements, as well as the dependence of the coefficient of performance of the TEM on the supply current. The graphs are presented at a temperature of the hot junctions of the TEM of 45 °C. Conclusion. The DRIFT-1.2 TEM manufactured by Krioterm LLC, St. Petersburg, can be used. TEM parameters: operating power range of a single TEM is from 37 to 60 W with an average temperature difference between junctions of 35 K, supply current is from 4.8 to 8.2 A with a power consumption of 90 to 260 W, cooling coefficient is from 0.25 to 0.6.
Objective. The paper investigates the feasibility of heat recovery from reverse flows in the Mixed Fluid Cascade cycle, highlighting its positive impact on specific energy consumption for liquefied natural gas (LNG) production. Method. The study employs mathematical modeling to analyze both the basic and modified cycle operations. The modified version incorporates heat exchangers in the liquefaction and subcooling stages, allowing reverse flows to be heated by direct flow heat. Additionally, a booster compressor for the feed natural gas flow is introduced to enhance energy efficiency. Result. The numerical experiments assess how variations in feed flow pressure, heat under-recovery in heat exchangers, and their configuration affect specific energy consumption and mass flow rates in the cycle's external cooling stages. Results indicate that thermal load can be redistributed towards high-temperature stages, leading to a reduction in specific energy consumption for LNG production. Conclusion. Overall, the research demonstrates the potential benefits of implementing heat recovery strategies in the Mixed Fluid Cascade cycle, contributing to more efficient LNG production processes.
Objective. Various methods and technologies that facilitate the most rational use of energy, including that used in low-temperature installations and life support systems (air conditioning), are becoming increasingly effective. The aim of the study is to develop an optimal design of a heat recovery unit capable of integration into a low-temperature installation or air conditioning system. Method. The study is based on the use of energy-saving technologies in the creation of machines and devices for refrigeration and cryogenic equipment, air conditioning and life support systems, including through heat recovery. Result. A prototype of a low-temperature recuperator made of heat exchange pipes has been designed. Conclusion. The study of the parameters and operating modes of the prototype recuperator is provided for in the experimental setup. It is planned to develop a methodology for designing recuperators for operation in a low-temperature air conditioning system installation. The use of statistical methods is a tool for improving technical solutions, allowing to achieve the efficiency of heat exchangers - recuperators.
Objective. The aim of the study is to determine the design features of the main part of the generator-absorber of solar power refrigeration units of the absorption type reactor - a device where the sorbent saturated with freon is located, and in which thermochemical reactions of desorption and absorption occur during heating and cooling. The study is carried out to identify the principles of a rational device that implements the efficiency of action and the maximum possibility of using the physicochemical properties of the sorbent and refrigerant. Method. The dynamics of the generator-absorber reactor development operating on solid sorbents and ozone-safe refrigerants is analyzed. Result. The designs of reactors used in solar power refrigeration units are considered; advantages and disadvantages, mechanisms of interaction and regulation of internal processes in the thermochemical compressor are identified; prospects for the development of new sorbents and refrigerants, ways to improve the efficiency of reactors and prospects for the development of solar power refrigeration units and units are determined. The article notes the features of application of technical solutions increasing the efficiency of the generator-absorber and solar power refrigeration plant. Conclusion. The increase in the performance of the solar power refrigeration plant is influenced by the following factors: mechanism for regulating mechanical deformations of the working sorbent in the reactor; introduction of new sorbents and search for effective working pairs; application of selective coatings on the outer surface of the reactor heated by the sun; rational focusing of solar energy on the heating elements of the reactor during the day; creation of effective conditions for cooling the reactor surface at night. A compromise design solution is the main task of developers of such solar power thermal transformers for refrigerators, air conditioners, food ice generators, etc.
INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS
Objective. The objective of the study is to develop a method for constructing a mathematical model of construction production based on processing expert data using tools of the mathematical apparatus of fuzzy sets such as linguistic variables and linguistic functions. Method. The data are processed using regression analysis, resulting in an analytical expression of the linguistic function graph, which is actually an analytical expression establishing the dependence of the performance indicator under consideration on the factors of the unstable economic environment of complex systems (construction organization) that influence it. Result. Analytical dependencies of the graphs of linguistic functions corresponding to various performance indicators are constructed, used as criteria for optimal decision-making. The greatest effect can be achieved by setting and solving various problems of multi-criteria Pareto optimization, using analytical expressions of several performance indicators of construction production as optimality criteria. Conclusion. Constructing empirical expressions of performance indicators of the systems under study allows organizing optimal management decisions on their basis and ensuring the effective functioning of complex management objects in unstable environmental conditions. Further development of the research is associated with the development of a method for optimal control of the behavior of various systems operating in spontaneously changing environmental conditions based on solving problems of multi-criteria optimization and developing optimal chains of organizational and management measures.
Objective. The paper considers the issues of designing and developing a service for automating the management and analysis of information security incidents for a metallurgical enterprise. The main stages and actions of incident management at the enterprise are examined and described. Methods. A software service that allows you to automate the processes of monitoring, evaluating and analyzing undesirable and unexpected information security events has been developed in the Visual Studio Code environment in the high-level Python programming language. To expand the functionality of the created software application, additional frameworks and the necessary libraries were used. The storage of information about the company's incidents is organized in the created database. Result. The article describes the algorithm for developing a software service, and provides examples of screen forms of this application. The functionality of the service allows you to receive various analytics: a general and detailed analysis of incidents by type, detection methods, time spent on solving the incident, the level of criticality, status, method of detection, speed of response, and the consequences caused. Conclusion. Testing of the software service demonstrated effective detection of new attacks and prompt protection of information systems and automated equipment of the enterprise. Incident analysis is aimed at identifying problem areas in the work of information security services, the elimination of which will allow for faster detection of unwanted events and minimization of the recurrence of incidents and their consequences.
Objective. The aim of the research is to develop an adaptive system for protecting critical life support infrastructure based on hybrid AI methods that combine machine learning (ML) and reinforcement learning. Method. A hybrid method of modeling artificial intelligence systems to detect cyber attacks is used. The basis of the method is a combination of reinforcement learning and anomaly analysis, which allows the system to automatically adapt to new threats. Result. It is proposed to implement artificial intelligence systems at the stages of monitoring, analysis of the received data and prompt response to eliminate the threat. The system includes the development of hybrid models for data analysis, which combines information from external sources and event logs. The use of the system will increase the stability of the infrastructure, reduce vulnerability to threats, and ensure uninterrupted operation in the conditions of an information threat. Conclusion. New approaches to the use of artificial intelligence systems are considered. Artificial intelligence models based on machine learning are proposed, allowing for the detection of not only old threats but also atypical scenarios of information hacks in a short time. Predictive algorithms are used to analyze the abnormal behavior of the malicious system, and deep learning provides accurate conclusions about threat classification.
Objective. In the field of high-performance computing, optimization of software systems for specific computing architectures is of great importance. The aim of the study is to improve the methods for determining the parameters of block algorithms. Method. The study is based on the methodology of computer modeling and automated design in engineering and technology, including the formulation, formalization and typification of design procedures and algorithms. Result. An analytical approach to improving the efficiency of designed software systems is proposed, within the framework of which a method for determining the parameters of block algorithms is considered. The advantage of this method is the possibility of its implementation based on static analysis of the source code of the program at the initial stages of design; the obtained parameters can be used in the optimization process. Computational experiments confirming the efficiency of the proposed method were conducted. Conclusion. The proposed method allows determining the block sizes at which no cache misses will be generated at a certain level of cache memory or the number of these misses will remain at an acceptable level. The method can be used at the initial stages of designing software systems without resorting to dynamic analysis of the application; in this case, static analysis of the program source code is used.
Objective. The purpose of this paper is to describe the causes of software vulnerabilities, as well as their classification. Eliminating the ambiguity of the concept of software vulnerability criticality. Method. Analysis of existing approaches to the assessment, classification, and identification of software vulnerabilities. Modeling, building a UML model, and describing an algorithm. Result. A definition of the criticality of a software vulnerability is proposed. The causes of the software are partially described, and the existing classification of software vulnerabilities is expanded. An example of assessing the criticality of software vulnerabilities based on calculated metrics is given. An example of vulnerability metrics evaluation and prioritization is given. The UML model and vulnerability assessment algorithm are presented. Conclusion. The results of the conducted research expand the list of indicators and the subject area of the description of software vulnerabilities.
Objective. The relevance of this study stems from the rapid advancement of the digital economy and the escalating cyber threats that jeopardize the security of personal data and financial transactions. The aim of the scientific research is to analyze modern strategies for protecting against cyber threats and to advance the development of a cybersecurity system in the context of digital transformation. Method. Research methods encompass literature review, statistical analysis, and case studies. Result. The paper considers the types of cyberattacks (phishing, DDoS, malware, cyber espionage) and key security technologies, including AES-256 encryption, multifactor authentication (MFA), and intrusion detection systems (IDS). Attention is paid to the following strategies: proactive defense, adaptive security, and zero trust architecture, with examples of their application in Russia (Sberbank, Rostelecom, medical institutions). The paper studies the mechanisms for preventing attacks and increasing cyber resilience, including the role of GosSOPKA, which processed over 500 thousand incidents in 2023. The paper identifies system vulnerabilities and proposes ways to minimize them: upgrading technical equipment, developing human resources, and improving the regulatory framework. Conclusion. The practical significance lies in the development of recommendations for the implementation of strategies that reduced damage from attacks by 18% in 2023. A systematic approach is needed to integrate innovations and coordinate efforts to ensure sustainable development of cybersecurity in Russia.
Objective. The aim of the study is to integrate the YOLO and CSRT algorithms for automated recognition and tracking of objects in a video stream. The focus is on the problems associated with the growing volume of video data and the need for efficient identification of anomalous objects in security control systems. Method. The study is based on computer simulation methods and algorithms. Result. The key features of each algorithm, their advantages and disadvantages are defined. The results of experimental tests based on the analysis of video streams with various scenarios of object movement are presented, which show a reduction in frame processing time with high recognition accuracy. The possibility of further improvement of the automated recognition and tracking system is proven, in particular, adding the function of predicting the movement of objects, which will increase its efficiency and expand the scope of application in video surveillance and security tasks. Conclusion. Integration of algorithms allows achieving significant improvements in real time, which is especially important in the context of video surveillance and security. Adding the function of predicting the movement of objects will not only increase the functionality of the system, but also make it more adaptive to dynamic conditions, which is extremely important for preventing potential threats.
Objective. The aim of the study is to summarize the available information on the problem of ensuring information security at industrial enterprises working exclusively with commercial secrets. Method. The methods of scientific knowledge used in writing the work: systematization, analysis, description, forecast. Result. The analysis of the need for forming a protection model was conducted from open sources; a forecast of potential damage was given. A conceptual model of the protected object was formed; the incoming divisions of the industrial enterprise were grouped according to the probability of a computer attack. The importance of forming a protection model was proven, the process of forming the organizational structure of an industrial enterprise and a protection model was described. Conclusions. The calculations obtained in the work allow us to estimate the dynamics of damage growth from a computer attack, thereby proving the importance of such studies. The results of the study provide a rationale for the unjustified use of certain measures when considering production from the point of view of protecting commercial information.
Objective. The aim of the study is to develop practical recommendations for conducting a quantitative assessment of software security in real time and choosing its optimal version in accordance with the requirements of the FSTEC of Russia and taking into account the features and shortcomings of the operation of automated systems of internal affairs agencies. Method. A systems approach has been implemented. The methods of theoretical analysis, synthesis, and deduction have been used. Result. Practical recommendations are presented for the implementation of the methodology for analyzing and quantitatively assessing the security of software, taking into account vulnerabilities and selecting the most secure version for use in automated systems of internal affairs agencies. Supplementing existing methods with practical recommendations will improve the efficiency and quality of software evaluation at IT facilities of internal affairs agencies. Conclusion. Prospects for using the obtained results are associated with the development of methodological documentation for assessing the state of technical information protection in automated systems of the internal affairs agencies in order to justify the choice of organizational and technical measures to ensure the security of restricted service information.
Objective. The aim of the study is a software analysis of a cyber attack carried out to block accounts and implement protection of the protection mechanism. Method. The study is based on the use of the PHP programming language in the PhpStorm IDE environment from JetBrains. In addition to this language, the CSS and JS layout languages, the HTML markup language were used. Result. A DDoS attack of the account blocking type, its possible consequences and existing protection mechanisms are considered in detail. Also, in order to counteract the implementation of this attack, a modification of the algorithm is proposed, which can significantly reduce the likelihood of its successful implementation. The result of this work is the developed software tool and a comparative analysis with similar products on the market. Conclusion. Ready-made software solutions are analyzed and a protection mechanism is developed, which is a modern solution that provides reliable protection of user accounts and protected from attacks directed at them.
Objective. The purpose of the work is to develop a methodology for load testing domestic firewalls to assess their real throughput and stability under load. This is necessary to verify the compliance of the characteristics of the proposed firewalls declared by the manufacturer for use in specific protected automated systems. Method. The research method is empirical. A test bench with a Cisco TRex traffic generator that emulates the load is proposed. Traffic patterns are created to simulate various network conditions. The testing methodology includes three modes: routing without filtering, complete traffic blocking, and filtering at the application level. The load is gradually increased until the limit values of stable operation are identified. Result. A testing methodology was developed to conduct load testing of firewalls. Quantitative indicators of firewall performance in different modes were determined. Conclusion.The proposed methodology is intended for an objective assessment of firewall performance. It allows choosing optimal solutions for information protection, identifying critical scenarios and preventing the use of insufficiently productive solutions.
Objective. The aim of the study is to examine approaches to creating an intelligent system, the implementation of which can affect the quality of decisions made by the fire extinguishing manager (FEM) in the process of managing personnel during fire extinguishing. Method. The work uses methods of statistical analysis, control theory, data processing methods and the implementation of production rules for indexing, hashing and clustering of the received information for its further transformation into a knowledge base. Result. The paper presents statistical data on injuries and deaths of fire and rescue unit personnel from thermal consequences caused by the movement of gaseous masses at capital construction sites. The research cycle on defining and applying artificial intelligence methods and algorithms in the process of managing combat operations at the call site is continued. The inadequacy of studies of the smoke-forming ability of building materials affecting the personnel of the Russian Emergencies Ministry at the call site is determined. Conclusion. An algorithm for creating a database of images of smoke generated during combustion of various substances and materials that constitute the main combustible load in the premises of objects of different functional purposes is formulated, and a classifier of smoke images depending on the fire load is proposed. An example of a description of the structure of the database being formed based on existing simulation models and software products is given. A model for forming a knowledge base of the RTP for smoke analysis depending on the type of combustible load is presented.
Objective. The article considers a mathematical model for quantitative assessment of the security of open operating systems (hereinafter referred to as OS) of automated systems of the internal affairs bodies of the Russian Federation (hereinafter referred to as AS OVD RF), developed based on the requirements of the standard GOST R ISO/IEC 15408. Method. The study was conducted based on the methods: analysis of possible threats to the security of open operating systems and the requirements of the standard GOST R ISO / IEC 15408, analysis of hierarchies and applications of fuzzy logic provisions. Result. The result of calculating the security indicator of the analyzed OS is a linguistic indicator of the degree of OS security and an OS security indicator expressed as a percentage. Conclusion. The authors propose a mathematical model for assessing the security of open operating systems when choosing them in the AS OVD RF.
BUILDING AND ARCHITECTURE
Objective. The objective of the study is to assess the influence of various methods of processing mineral powders on the formation of high-quality and long-term characteristics of asphalt concrete pavements. The article covers the topic of production and application of activated and hydrophobized mineral powders in asphalt concrete pavements. Method. The method includes a search and theoretical analysis, as well as the systematization of existing Russian and foreign studies. Result. The practical experience of using mineral powders has been studied, the main attention is paid to the differences in processing methods, their influence on the characteristics of asphalt concrete and the determination of the optimal conditions for the use of each method for the needs of the transport and road complex as a filler. Research has shown that any type of impact on mineral powder for asphalt concrete, whether activation or hydrophobization, significantly increases its reactivity with bitumen. Chemical activation of mineral powder improves the mechanical properties and resistance of asphalt concrete to chemical reagents, while by means of hydrophobization of fillers it is possible to significantly increase the frost resistance of the composite and its resistance to water erosion. Conclusion. The choice of method and composition for treating mineral powder should be determined by the individual operating conditions of asphalt pavements. Each method is potentially promising, but it exhibits its maximum properties only in specific operational circumstances.
Objective. The paper presents general equations of the moment theory of thin shallow shells with a relatively small rise above the plane of their projection taking into account creep deformation. The problem of the stress-strain state of the shell with boundary conditions is considered. At the edges, the shell is connected to diaphragms that are absolutely rigid in their plane and flexible from it. Resolving equations are obtained for calculating shallow isotropic and orthotropic shells taking into account creep deformations. The problem is reduced to a system of two fourth-order differential equations with respect to deflection and stress function. Method. The solution is given by the numerical-analytical method in the MATLAB software package. The nonlinear Maxwell-Gurevich equation is used as the equation of state between creep deformations and stresses. To determine creep deformations, a linear approximation of the first derivative with respect to time (Runge-Kutta method) was used. To verify the solution to the problem, a shell made of secondary PVC was calculated using the grid method. The method has been tested by comparing the solution with the calculations of other well-known researchers. Result. A program has been developed for calculation in the MATLAB package with the ability to vary the initial data and output a graph of the dependence of displacements and stresses on time. It has been established that stresses and internal forces in an orthotropic shell of the same shape as for an isotropic one are subject to stress redistribution: normal stresses increase, and tangential stresses decrease. Longitudinal and shear forces remain almost constant; stress changes occur mainly due to the redistribution of bending and torque moments. Conclusion. The proposed approach can be applied to the analysis of the stress-strain state and bearing capacity of a reinforced concrete shell as well. There are no restrictions on boundary conditions and types of loading, and the beam material can be not only polymers and composites for construction purposes, but also concrete.
Objective. Air quality in buildings is determined by various factors, including: decisions on air exchange and ventilation systems. The level of relative humidity, indoor air temperature and concentration of other pollutants play a key role in creating a comfortable living environment. The purpose of the study is to develop recommendations for the design of exhaust ventilation in residential buildings. Method. Natural studies of the regularity of changes in heat and humidity parameters of air in the kitchen-living room in the case of natural and forced exhaust ventilation in the design points, as well as the time of restoration of thermal balance in the room (or the flat as a whole). Result. It was found that the air temperature varied in the range of 23.1-24.6 ° C, relative humidity – in the range of 38.7-50.3 %, which corresponds to an acceptable range, but not optimal. The use of a hood over the cooker gives a steady decrease in temperature in all points by 1-1,5 °С, and relative humidity in the working zone at the cooker – by 10-20 %, in the upper zone and at the hood – up to 30 %. Exit to the temperature plateau of values before the experiment with the use of an extraction umbrella over the cooker occurred 30 minutes faster than with natural ventilation. Conclusion. An improved ventilation system is required to ensure optimum indoor climate conditions. The correct design of the extraction system above the cooker with an umbrella and an integrated fan helps to prevent condensation on surfaces and improves the climate characteristics of the area served.
Objective. The article presents the modeling of dynamic processes in buildings and structures. The general formulation of the dynamic problem of the motion of a massive load along a massive structure is considered. Method. The equation of motion is obtained in the form of the finite element method. The equations are solved using direct methods of integrating dynamics problems. Absolutely stable direct integration schemes are constructed, in which the system of resolving equations is trivial - the matrix of the system is diagonal. The complexity at the time step is as low as in explicit schemes. The proposed methods can be considered as explicit absolutely stable direct integration schemes for a dynamic problem with a time-varying mass. Recommendations are given for assessing the accuracy of the numerical solution. The problem of moving a massive load along a massive structure is considered. Discretization of the spatial domain is performed by the finite element method. Discretization of the time domain is based on a step-bystep single-layer process. An approach similar to Wilson's theta method, applied on the basis of Gartin's variational principle, is used to construct the main equations. Result. Differential equations of the problem of the motion of a moving massive load on an arbitrary massive structure are constructed in the form of the finite element method, and numerical methods for solving the equations of motion using absolutely stable direct integration schemes are presented. The system of resolving equations can have a diagonal structure, which allows classifying the obtained schemes as explicit. Conclusion. The proposed approach can be applied to the analysis of the stress-strain state and bearing capacity of arbitrary spans when a massive load moves along them. The effect of the load velocity on the stress-strain state of the structure is taken into account. There are no restrictions on boundary conditions and types of loading.
Objective. The study focuses on the analysis of heating demand in the building, as well as on the design and modeling of the heating system. The thermal efficiency of the building is assessed, key factors are identified: external temperature conditions and internal heat loads. The study is devoted to the comprehensive analysis of the energy balance and the design of the heating system for a residential building located in Vicenza, Italy, using the Building Energy Modeling (BEM) method in the IES-VE 2023 software package. Method. Heating demand is modeled and calculated taking into account dynamic conditions, and the heating system is designed for optimal operation and energy efficiency. Advanced tools are used to model the system operation, which allows for optimized energy consumption and cost efficiency. Result. An air source heat pump and radiant floor heating system is designed and analyzed, the parameters of which are optimized taking into account hydraulic characteristics and heat losses. The results provide valuable data for the efficient design of heating systems and energy management in building projects. Conclusion. BEM analysis using an ideal system for energy balance, including both sensible and latent heat fluxes, showed a stable relationship between gains and losses, illustrating the thermal efficiency of the building. The results serve as a basis for further development and implementation of energy-efficient technologies in the design of heating systems for residential buildings in similar climate zones.
Objective. This study presents the development and investigation of repair and restoration compositions based on hydraulic lime and white cement, as well as their physical and mechanical properties and chemical composition. Method. The work used an experimental method of destructive and non-destructive quality control of building materials and X-ray phase analysis to determine the mineralogical composition of the samples. Result. Physical and mechanical tests of the samples were carried out in order to select a restoration composition for the stone masonry of the walls of tower-type historical and cultural monuments. Conclusion. The developed repair and restoration compositions based on hydraulic lime and white cement have satisfactory physical and mechanical properties, which makes them promising for use in the restoration and reconstruction of cultural heritage sites. The results confirm the possibility of using these compositions in construction practice, which can contribute to the preservation of cultural heritage.
Objective. The article examines beam structures with variable rigidity, in which physical nonlinearities of their supports and the material of the structure itself are manifested. The article examines issues of support nonlinearity, beam rigidity variability, and provides a solution to the corresponding differential equations containing variable coefficients. Method. The features of the operation of nonlinear elastic beam supports are presented, and the variability of rigidity of the specified structures, which exhibit significant physical nonlinearities, is described. By introducing special notations, differential equations containing variable coefficients are reduced to a form that allows constructing their classical solution. Result. Beams on nonlinear-elastic supports, beams with variable stiffness, as well as beam structures, beams, the material of which does not follow Hooke's law, are considered. A classical solution to the differential equation of transverse bending of beams with variable rigidity is constructed; calculation schemes, formulas, tables and graphs are provided. Conclusion. The developed algorithms and the obtained results allow taking into account the nonlinear operation of supports, the influence of variability of beam stiffness, physical nonlinearities of the material of the structure. The results of the study can be used in the practice of design and construction.
ISSN 2542-095X (Online)