×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Reviews, suggestions and discussions

  • Blockchain as a service for protecting information about the authenticity of educational diplomas

    The problem of fake diplomas of education causes alarm and concern to society. In the digital age, falsification has reached great proportions. In this regard, a mechanism for recording and confirming the authenticity of diplomas using technology is proposed. A sector-token method of accessing a blockchain record is proposed. The recording technology and the blockchain formation model are shown. The proposed technology guarantees that the diplomas are genuine, protected from forgery, belong to the specialists who received them.

    Keywords: blockchain, data protection, diploma forgery, educational institution, authentication

  • Review of methods for detecting faults in a permanent magnet synchronous motor

    Overview of existing methods for diagnosing faults in synchronous electric motors and methods for their detection. Classification and analysis of existing methods, their applicability in detecting faults, advantages and disadvantages. Three classes of possible faults in synchronous permanent magnet motors are considered and described: electrical faults, mechanical faults, and demagnetization. The article discusses three classes of diagnostic methods: based on the construction of a mathematical model of a real electric motor and modeling its errors, based on processing signals from sensors, and intelligent methods based on processing collected data using artificial intelligence. The following error detection methods based on modeling are considered: detection based on the model of the electrical schematic, based on the analytical model, and based on the digital simulation model. The following frequency-time analysis methods of the obtained signals from the sensors are considered: analysis using fast Fourier transform, short-time Fourier transform, wavelet transform, Hilbert-Huang transform, and Wigner-Ville distribution. The following intelligent diagnostic methods are considered: diagnosis using convolutional neural networks, recurrent neural networks, support vector machines, fuzzy logic, and sparse representation.

    Keywords: Synchronous motor with permanent magnets, faults of electric motor, modeling, fast Fourier transform, wavelet transform, Hilbert-Huang transform, Wigner-Ville distribution, neural networks, fuzzy logic, support vector machine, sparse representation.

  • About the construction of the Moscow subway

    No modern metropolis can be imagined without such public transport as the subway. The subway is the most important element of infrastructure for large cities and provides a convenient, fast, safe and environmentally friendly way for the population to travel. The construction of the subway is a long and complex process, which requires large investments and consideration of many factors. During the construction of metro stations it is necessary to carry out work on laying utilities, such as electric cables, pipelines for water supply, sewerage, ventilation and other systems. These utilities ensure the operation of the stations and comfort for passengers. Erection of engineering networks in the subway is a complex and multi-year process that requires application of new technologies and high qualification of specialists. However, proper planning and work coordination can significantly reduce time and costs of the project, ensuring uninterrupted operation of metro stations in the future. The work is devoted to the peculiarities of construction of the Moscow subway, which is considered one of the largest subways in the world in terms of length and passenger traffic.

    Keywords: metro, utilities, high voltage cable, ventilation shaft, tunnel fan

  • Improvement of the assembly unit of structures made of solid wood of composite section

    This article presents the main recommendations for the construction of nodes of solid-wood structures. The basic scheme of the rigid junction of the meridional edges is considered. Based on the results of tests and calculations, conclusions are drawn on the possibility of improving this node. Some recommendations for strengthening the node without increasing the metal capacity of the structure are presented. Several schemes for improving the welded structures are shown. Conclusions are drawn on the possibility of implementing the examples given in the designed structures.

    Keywords: Wooden structure, full-size samples, mechanical connections, solid wood, prismatic arch, mounting element, polymer concrete, design model, continuous girder, prefabricated structures

  • Technical science. Informatics, computer facilities and management

  • Mathematical model of optimization of the departmental segment of the feedback platform

    The paper considers the problem of managing the reliability of the departmental segment of the feedback platform, which ensures the reception and consideration of citizens' electronic appeals by the Federal Penitentiary Service of Russia. In this aspect, the reliability optimization problem is an optimal control problem with phase constraints. Using the method of penalty functions, the problem of minimal control is formulated, in which phase constraints are taken into account using an external quadratic penalty function. To solve the resulting problem, a wide range of analytical and numerical methods for finding the optimal solution is available.

    Keywords: public administration, feedback platform, departmental segment, queuing system, resource management, optimal management task, optimization task, Federal Penitentiary Service of Russia

  • Analysis of the current state of activity of duty units of territorial bodies of the Ministry of the Interior of Russia

    The article analyzes the current state of the duty units of territorial bodies of the Ministry of the Interior of Russia, namely the main activity of receiving and registering applications and reports on crimes, administrative offenses and incidents on the example of one of the subjects of the Russian Federation. Regression models reflecting the state of the operational situation in the serviced territories are constructed. The interrelations are shown by the level of registered statements and reports on crimes, administrative offenses, incidents of citizens and other indicators that indirectly or directly affect it. Conclusions were drawn about the need to modernize the assessment methodology of duty units of the territorial bodies of the Ministry of Internal Affairs of Russia.

    Keywords: duty unit, regression analysis, internal affairs agencies, mathematical modeling, assessment of the activity of duty units

  • The mechanism of loading of piece cargoes of cylindrical shape

    Currently, loaders for piece loads used in the technological process of loading-transporting and laying barrels of oil are widely used in industry. In particular cases, during loading and transport operations, the functionality of the loader is sufficient, but when laying cargo or obstacles occur, it is necessary to maneuver using the loader chassis, which significantly increases the execution time of the technological process. The results of the conducted studies have shown that when performing the technological operation of capturing, transporting and stacking barrels, the time to move the chassis is up to 12%, while the loader performance coefficient is 0.65. Numerical modeling of the positioning process of the load-handling body of the output link of the loading and transport unit is carried out, on this basis, a loader design based on a stacker is proposed and developed. The degree of mobility of the manipulation mechanism is calculated.

    Keywords: numerical modeling, loader, manipulator, hinges, chassis, structural analysis, degree of mobility, kinematic analysis, service area, lifting body, mechanism

  • Generation of datasets for educational tasks of computer vision

    There are now many reasons why training in artificial intelligence (AI) technologies can be important for today's students. Therefore, AI-related disciplines are actively included by universities in undergraduate and graduate programs. It is important to teach students to understand how such technologies work and how they can be used to solve various problems. In turn, training is unthinkable without demonstrating examples of solving various problems. An important step in solving the problem of machine learning in general, incl. task of computer vision, is the stage of formation of the training sample. Therefore, the idea arose of writing a program that would be able to generate datasets on various topics for computer vision tasks. The data format of the generated sample for training train.csv is generally accepted and looks like this: each line is a description of one image; the first column contains the class labels to which the image belongs; the remaining columns contain the pixel values of the image, for example as a flat vector, where each value corresponds to the brightness of a corresponding pixel in the image. The resulting datasets can be used to organize the project activities of students on artificial intelligence.

    Keywords: artificial intelligence, machine learning, computer vision, neural network, training set, dataset, C#, pixel, subpixel image processing, organization of student project activities

  • Analysis of modern data encryption algorithms

    The article is devoted to the analysis of modern data encryption algorithms. The introduction gives an overview of the most common encryption algorithms, such as AES, RSA and SHA. The main part of the article includes an analysis of vulnerabilities of modern encryption algorithms and considers various attack methods. It concludes by drawing conclusions that it is necessary to use comprehensive data protection methods and periodically update the encryption algorithms used to prevent possible attacks.

    Keywords: Encryption algorithm, data security, vulnerability, attack method, complex method of data protection

  • Automating the deployment of Kubernetes clusters based on Ubuntu OS in Rancher on the VMware vSphere infrastructure

    Тhe article discusses the mechanism for the rapid creation and maintenance of Kubernetes clusters without low-level operations with a significant reduction in time and labor costs using automation based on Rancher, VMware vSphere and Ubuntu products.

    Keywords: Kubernetes, Ubuntu, Rancher, Docker, cluster, containerization, automation

  • Analysis of methods for predicting the consumption of electrical energy and power

    Forecasting the consumption of electrical energy and power is an urgent and significant problem. This paper discusses current methods for predicting the consumption of electrical energy, reflected in various scientific papers, their analysis is carried out with the identification of more promising forecasting methods.

    Keywords: energy consumption forecasting, statistical forecasting methods, neural network forecasting methods, hybrid forecasting methods

  • Investigation of the effectiveness of Siamese neural networks for biometric authentication by ECG for signals with non-periodic cardiac arrhythmias

    Electrocardiogram signals have unique characteristics and structure that are difficult to fake. This is due to the fact that the electrical activity of the heart is unique for each person. In addition, the main biometric parameters are hidden during ECG authentication, which makes the process more secure and protected from counterfeiting. The purpose of this study is to evaluate the effectiveness of neural networks for ECG authentication for signals with non-periodic cardiac arrhythmias. The Siamese neural network has been developed as a model. The stages of preprocessing of ECG signals taken from the MIT-BIH database are also described. The model presented in the paper has achieved the following results. Accuracy: 99.69%. Sensitivity: 99.43%. Specificity: 99.94%. ROC-AUC: 99.69%. The results allow us to conclude that the proposed model can effectively authenticate users who have non-periodic cardiac arrhythmias, provided at least a small number of registered standards with violations.

    Keywords: biometric authentication, ECG, Siamese neural network, convolutional neural network, Euclidean distance, ROC analysis

  • Analysis of the stability of the technological system for the production of caramel

    The paper considers the operator model of the technological system for the production of caramel, assesses the stability of the subsystems and the content of the technological system. For a consistently stable caramel formation subsystem using the Shewhart map under specific production conditions, an analysis of the stability of the subsystem was carried out.

    Keywords: operator model, subsystem, system integrity, process stability, control charts, average values, range

  • Development of the control system for loading the gali and scrap output mill of the Lebedinsky GOK processing plant JSC based on the bearing units vibration measurement

    The article discusses the development of an automated system for controlling the loading of the gali output mill and scrap of the Lebedinsky GOK processing plant JSC based on the measurement of bearing vibration signals. Gali and scrap output mills are a bottleneck of production, a decrease in their productivity threatens to lose the production of two enrichment workshops. The pur-pose of this system is to conduct the technological process of the mill in maximum load modes with no overloads. The automated ball mill control system proposed in the article will increase the mill's productivity, reduce the specific consumption of electricity, and reduce the time of emergency downtime.

    Keywords: production of iron ore concentrate, processing plant, ball mill, mill overload protection, automated bearing vibration monitoring system, automated process control system

  • Visualization model for convective cloud numerical simulation data

    The paper considers a data visualization model of numerical simulation of a convective cloud. Data visualization is used for visual representation and analysis of processes in a convective cloud. New methods and approaches to visualization of results based on modern technologies and algorithms, such as real-time visualization and the use of calculations on GPUs. An approach to automating the process of rapid qualitative analysis are presentedThe paper aims to create a specialized software for three-dimensional visualization. This software is used for tasks related to the study of complex processes of interaction of processes in a convective cloud based on a numerical model with detailed microphysics.The article considers a data visualization model for numerical simulation of a convective cloud. Data visualization is used for visual representation and analysis of processes in a convective cloud. New methods and approaches to visualization of results based on modern technologies and algorithms, such as real-time visualization and the use of calculations on graphics processors, are presented. The approach to automating the process of rapid qualitative analysis of numerical simulation data is to create specialized software for three-dimensional visualization. This software is used for tasks related to the study of complex processes of interaction of processes in a convective cloud based on a numerical model with detailed microphysics.

    Keywords: application program, three-dimensional visualization, numerical simulation data, machine graphics, visualization model, cloud parameters, modeling

  • Analytical calculation of the constant force support working profile

    Constant force supports are used in all gas and oil refineries in cases where it is necessary to provide the mobility of the pipeline at the attachment points. The article discusses the algorithm for calculating the shape of the support profile details, which has a certain design. These details provide the constancy of the pipeline support vertical force when it is transferred from the compression spring to the support point. Analytical and geometrical variations of calculation are given. The article will be useful to specialists involved in the design of pipeline supports.

    Keywords: movable joint, geometric calculation, variable stiffness, lisega, import substitution

  • Application of the dynamic system oscillation indicator to identify catastrophic cutter wear

    The object of the study is the method of evaluating the durability of the cutting tool, which evaluates the rationality of the periodicity of changing the cutting tool during turning on the basis of the indicator of vibration. To form a signal for the analysis the registration of vibroacoustic vibrations during the processing of parts by the device for measuring noise and vibration VShV-003-M2 takes place. To check the transfer function used in the methodology the construction of the model of dynamic system of the lathe is made. The construction of autocorrelation function and amplitude-frequency response of the dynamic system is used to estimate the durability according to the oscillation index. A series of tests to estimate tool life under recommended cutting modes are made, and the results are corrected according to the obtained results. Record of files for the analysis was made in a wave-file format. Analysis of the results made it possible to make recommendations for tool change intervals for better control of tool and labor rationing. Knowledge of the durability of cutting tools is necessary for timely replacement of cutting inserts and control of losses in production.

    Keywords: vibration index, catastrophic wear, tool, cutter, tool life, condition monitoring, vibration, lathe, sensor

  • Freight container marking recognition algorithm using deep neural networks

    This article implements an algorithm for recognizing the markings of a freight container based on deep neural networks. The main advantage of the proposed algorithm is the absence of the need for additional image transformations for marking localization and character segmentation. The EAST algorithm was used to solve the localization problem. To recognize the owner code and serial number of the container, Faster R-CNN Resnet 50 neural network models were trained. As a result of assessing the accuracy of the algorithm, appropriate conclusions were made, and possible options for improving the algorithm were formulated.

    Keywords: machine learning, algorithm, cargo containers, neural network, image classification, recognition

  • Reverse analysis of malware Raccoon Stealer

    We describe the process and results of reverse analysis of malware Raccoon Stealer v.1.7.3. We describe instruments of analysis, the process of code analysis, unpacking, getting of original code. We describe the process of code analysis, construction of malware working algorithm. We describe recomendations for defense from Raccoon Stealer.

    Keywords: Reverse analysis, reverse engineering, malware, code analysis, debuger, disassembler, hex redactor, database, browser, information security

  • Design and creation of an automated information system for accounting project decisions for the organization

    The article is devoted to the creation of a specialized automated information system for accounting project decisions in the structural unit responsible for this business process in companies engaged in project activities. Targeted development of such software products will cover and take into account all features of engineering organizations. In turn, electronic accounting of such documentation will not only simplify and accelerate the work of employees, allowing them to pay attention to their other responsibilities, but also reduce the human factor in such a responsible process, when the documents of project decisions are the core of activity.

    Keywords: automated information system, design decision accounting system, sequence diagram, precedent, database, report, Windows Forms

  • Methods of detecting false signals of the automatic identification system of unmanned aerial vehicles against the background of ship signals

    The operation of unmanned aerial vehicles (UAVs), as well as their compactness and ease of use, allow them to be actively used in various conditions and situations. UAVs have a number of parameters, from remotely piloted to fully automated, including the degree of their autonomy, as well as design and purpose. AIS transponders receive and process AIS signals, receiving at the output messages about the name of the vessel, data on the course, speed and current navigation status with the display of its location on an electronic map. The use of an open data transfer protocol in AIS makes it vulnerable when false signals (LS) appear in traffic containing distorted information with the display of false targets on the screens of AIS monitors, which can lead to navigation accidents. The purpose of the article is to develop proposals for the detection and identification of AIS UAVs. The paper analyzes the possibility of the formation of an AIS UAV, considers approaches to solving the problems of detecting and identifying drugs and suggests methods for their implementation of technical analysis of radio signals.

    Keywords: automatic identification system, false signals, false signal detection, bearing

  • A model for assessing the intelligence security of a group of unmanned aerial vehicles for military purposes from enemy radio and radio intelligence complexes

    The article considers a probabilistic-temporal model for assessing the intelligence protection of a group of unmanned aerial vehicles for military purposes from enemy radio and radio intelligence complexes in service with the US Army, provides analytical expressions and a calculation sequence with examples.

    Keywords: intelligence security, a group of unmanned aerial vehicles, the probability of temporary contact, the probability of energy detection, stealth, signal-to-noise ratio, surveillance reconnaissance zone, detailed reconnaissance zone, radio and radio intellig

  • The method of selecting configurable hyperparameters of the intelligent classifier of unstructured text data according to the degree of confidentiality based on the hierarchy analysis method

    A structural model of an intelligent classifier of unstructured textual data according to the degree of confidentiality is presented, which is a two-level cascading ensemble of classifier models. The meta-model of a fully connected neural network architecture, which has the greatest impact on the classification efficiency, is highlighted. The multi-criteria task of configuring the intelligent classifier is decomposed into the task of selecting configurable hyperparameters of the meta-model and the task of selecting their values. Taking into account the selected hyperparameters of the neural network meta-model, the multi-criteria task of selecting hyperparameters to be configured is presented in the form of a hierarchy that includes the goal, criteria and alternatives. A method for selecting configurable hyperparameters of an intelligent classifier of unstructured text data by the degree of confidentiality based on the hierarchy analysis method has been developed.

    Keywords: DLP system, unstructured text data, intelligent classifier, hyperparameters, hierarchy analysis method