×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Technical science. Informatics, computer facilities and management

  • Overview of modern technologies for recycling construction waste

    The article analyzes modern approaches and technologies for recycling and recycling of building materials. Such types of waste as reinforced concrete, brick, glass, wood, plastic, etc. are considered. Special attention is paid to innovative methods of processing to obtain secondary raw materials (recycling). It is shown that the most promising technologies are the crushing of concrete, brick and reinforced concrete for reuse in construction, the melting of scrap metal, glass and plastic, the processing of wood waste into slabs and fuel. There is an insufficient level of application of innovative solutions in Russia. A set of measures has been proposed to improve the efficiency of construction waste disposal: the introduction of advanced technologies, the construction of waste recycling plants, the adoption of a targeted state program, and the improvement of environmental culture.

    Keywords: waste, construction debris, Russia, secondary raw materials, reuse, environment, recycling, burial, recycling

  • Detecting unauthorised intrusion into wireless peer-to-peer networks

    This paper analyses intrusion detection techniques and provides recommendations for preventing intrusions in peer-to-peer wireless networks. Peer-to-peer wireless networks are particularly vulnerable to attack due to their openness, dynamically changing topology, collaborative algorithms, lack of centralised monitoring, centralised control point and lack of clear protection. Intrusion detection techniques exist in wired networks but they are not applicable in wireless environment. The paper also presents a new intrusion defence method based on intrusion detection in peer-to-peer wireless networks.

    Keywords: security, vulnerability, information protection, attack, intrusion, wireless network, mobile network, detection system, IDS, MANET, DoS, DDoS

  • Selecting a converter of aerodynamic forces and moments into the trajectory of motion for Simulink flight models of aircraft

    The article explores the problem of creating aircraft flight models in the Simulink environment. The reference systems in which transformations are carried out are considered. The equations of motion used in the simplest converters are given. The initial conditions for the equations are determined: the speed of the body, the angular orientation of the body's pitch position, the angle between the velocity vector and the body, the speed of rotation of the body, the initial position, the mass and inertia of the body, the source of gravity, the acceleration due to gravity, the curb and total mass of the body, speed of air flow, inertia of an empty and full body, flight trajectory, etc. An analysis of converters of aerodynamic forces and moments into the trajectory of motion as part of an aerospace package in the Simulink environment was carried out. Recommendations are given for their use for various modeling purposes. The results of modeling a simple converter with three degrees of freedom are presented.

    Keywords: modeling, MatLab, Simulink, equations of motion, aerodynamic torque, flight path, coordinate transformations, reference system, degrees of freedom

  • Identify and rank threats at a critical government facility

    The article discusses the issues of identifying and ranking threats at an important government facility. The classification of threats by type is described. The article discusses the concepts of “design-based threats” and “the most dangerous variant of the violator’s actions” and their differences. An example of ranking threats and reducing their number to reduce the dimensionality of the vulnerability analysis problem is considered. An important government object is considered as an object in the example. Experts are tasked with ranking threats according to the level of potential losses for an important government facility if they are realized. In practice, the implementation of an accepted design threat may lead to lower potential losses than the most dangerous option for violators and, as a result, to lower requirements for the effectiveness of the physical protection system.

    Keywords: comprehensive security, methods, models, security forces, intruders, important government facilities, clashes between security forces and attacks, ranking of threats

  • On the variant of formalization of the task of extracting key skills and cluster analysis of vacancies in the implementation of a comprehensive digital career guidance toolkit

    The article proposes a general formalized model of the task of processing and extracting potential key skills from job descriptions to determine the relevance of training areas and possible areas of employment for graduates. The formalized model is used in the software implementation of the job clustering module based on the obtained sets of key skills within the framework of a comprehensive toolkit for remote career guidance.

    Keywords: vacancies, demand for training areas, career guidance, digitalization of career guidance, formalized model, clustering, professions, key skills

  • Simplex methods for optimizing the composition of composite building materials

    The article discusses the use of simplex methods of experiment planning to determine the optimal composition of composite building materials. Composite building materials are multicomponent systems, so their properties depend on a large number of factors that are diverse in nature and influence. The use of orthogonal plans is not able to adequately describe experimental data with a wide range of varying factors. Therefore, the article proposes to use simplex-lattice Scheffe's plans. A complete third-order model was developed to determine the optimal composition of the filled cement composite, and a regression equation was written. The adequacy of the equation was confirmed at the control points of the plan using the Student's criterion. The proposed planning method can be used to optimize the composition of multicomponent systems.

    Keywords: multicomponent system, optimization methods, composite building material, experiment planning, simplex plans, Scheffe's polynomial, regression equation

  • Mathematical modeling of the motion of a planning body of complex configuration

    motion of the body are obtained, which can only be solved numerically. The equilibrium equations are solved and the basic stationary modes of body motion are obtained. The main result is the most gentle body planning mode. In the matlab computer mathematics system, a set of programs is written that searches for a numerical solution and outputs trajectories. The movement of the modes under consideration is modeled and the stability of the main modes is looked at using numerical calculations.

    Keywords: body, planning mode, stability, geometric dimensions

  • Modelling of cargo transportation parameters based on benchmark analysis of the transport companies’ market

    The paper examines current issues of modeling and forecasting market parameters for transport companies providing services for the transportation of industrial enterprises’ good, such as cost, time, speed and volumes of delivery of finished products to consumers, and also assesses the potential capabilities of transport companies to provide the required quantity and quality of transport and logistics services. The aim of the study is to determine the area of reliable forecasts of transportation indicators for each interval value of the cargo delivery shoulder, taking into account the company’s market share. Modeling of the time parameters of cargo transportation was carried out based on road transportation conditions and the time of year. When implementing modeling procedures, the required statistical basis for parameters of travel time and distance on the route was formed on the basis of data from specialized applications for analyzing indicators of transport and logistics services of freight vehicles. A family of forecast curves was obtained for various variants of forecast models of speed and travel time, as well as interval values of delivery lengths for the initial set of transport and logistics companies. and development of new production on available floor spaces. The most important organizational economic targets of a diversification of management are presented by innovative activity of the industrial enterprise.

    Keywords: statistical forecasting, transportation efficiency, benchmark models, tariffs for cargo transportation, piecewise linear approximation, areas of reliable forecasts, cargo transportation parameters, benchmark analysis, transport company market

  • Models and application of neural network post-recognition image interpreters

    The work outlines the concept of “post-interpretation” of images and for its algorithmic implementation a model of a post-recognition interpreter is proposed. The recognition results of the initial images entering the recognition system are considered as post-images, and an artificial neural network is used as a post-recognizer. To assess the effectiveness of using the model, it is proposed to use the “expediency criterion” and numerical examples are considered to illustrate the features of its use in systems for recognizing and interpreting images with high risks. Data from preliminary results of experimental testing of a model for recognizing speech commands as part of an interactive operator's manual for performing various tasks and an assessment of its effectiveness are presented.

    Keywords: intelligent data processing system, image interpretation, recognition reliability, decision-making criterion, artificial neural network

  • Development of a data indexing system for the production, economic and labor sectors of the penitentiary system

    The development of business analytics, decision-making and resource planning systems is one of the most important components of almost any enterprise. In these matters, enterprises and production facilities of the penitentiary system are no exception. The paper examines the problem of the relationship between existing databases and statistical reporting forms of the production, economic and labor sectors of the penitentiary system. It has been established that indirectly interrelated parameters are quite difficult to compare due to different data recording systems, as well as approved statistical forms. One of the first steps in solving this problem could be the introduction of a generalized data indexing system. The paper discusses data indexing systems, the construction of their hierarchical structures, as well as the possibility of practical application using SQL. Examples of implementation using ORM technology and the Python language are considered.

    Keywords: databases, indexing, ORM, SQL, Python, manufacturing sector, economic indicators, penitentiary system

  • Methodology for Creating the Electronic Structure of High-Tech Electronic Products

    The traditional cycle of manufacturing high-tech electronic products was examined, and a methodology for its optimization was developed. The interrelation between the stages of design documentation development and the electronic structure of the product was established. The methodology significantly reduced the manufacturing time of products by parallel development of the electronic structure alongside the product. The rationale for applying the methodology in design was provided.

    Keywords: electronic structure of the product, eBOM, 1C:PLM, procurement of components

  • Correlation analysis of the fire and rescue units functioning parameters

    The article examines the experience of using correlation analysis to assess the nature of the relationships between various parameters of the organization and activities of fire and rescue garrisons in Russia. The analysis of absolute and relative parameters is carried out. The influence of the size of the service areas of fire departments on other response parameters, as well as the negative impact of population density and the number of fires on the speed of fire trucks is shown. The paper proposes a method for calculating the built-up area of settlements and a method for calculating the coefficient of non-straightness of the street and road network along arbitrary routes.

    Keywords: fire service, analysis, fire statistics, large city, urbanism

  • Comparative analysis of the effectiveness of software tools for splitting videos into frames using the example of the field of road surface quality assessment

    Roads occupy an important place in the life of almost every person. The quality of the coating is the most significant characteristic of the roadway. To evaluate it, there are many systems, among which there are those that analyze the road surface using video information streams. In turn, the video is divided into frames, and the images are used to directly assess the road quality. Splitting video into frames in such systems works based on special software tools. To understand how effective a particular software is, a detailed analysis is needed. In this article, OpenCV, MoviePy and FFMpeg are selected as software tools for analysis. The research material is a two-minute video of the road surface with a frame rate 29.97 frames/s and mp4 format. The average time to get one frame from a video is used as an efficiency indicator. For each of the three software tools, 5 different experiments were conducted in which the frame size in pixels was consistently increased by 2 times: 40000, 80000, 160000, 320000, 640000. Each program has a linear dependence of O(n) average frame retrieving time on resolution, however, FFMpeg has the lowest absolute time indicators, as well as the lowest growth rate of the function, therefore it is the most effective tool compared to the others (OpenCV, MoviePy).

    Keywords: comparison, analysis, effectiveness, software tool, library, program, video splitting, frame size, resolution, road surface

  • Statical algorithms for identifying unique features from a person's handwritten signature

    One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.

    Keywords: static algorithms, metrics, signature length, scaling, signature angle

  • Dynamic algorithms for identifying unique features from a person's handwritten signature

    Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.

    Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform

  • On the quality of learning of root-based decision making of partially connected neural networks under conditions of limited data

    The quality of training of incompletely connected neural networks based on decision's roots is discussed. Using the example of limited data on patients with clinically diagnosed Alzheimer's disease and conditionally healthy patients, a decision's root and the corresponding neural network structure are found by preprocessing the data. The results of training an incompletely connected artificial neural network of this type are demonstrated for the first time. The results of training of this type of neural network allowed us to find a neural network with an acceptable level of accuracy for the practical application of the obtained neural network to support medical decision making - in the considered example for the diagnosis of Alzheimer's disease.

    Keywords: neural networks, complex assessment mechanisms; decision roots, criteria trees, convolution matrices, data preprocessing

  • Technical science. Building and architecture

  • Towards a method for calculating reinforced concrete flexible eccentrically compressed structures operating with large eccentricity

    This article presents a new developed calculation methodology, which includes provisions for standard calculations and takes into account the peculiarities of the operation of eccentrically compressed reinforced concrete structures operating at large eccentricities of load application. Adjustments have been made to the calculation methodology to take into account the following factors: the standard methodology uses the maximum tensile strength of reinforcement; proposals have been developed to determine the actual resistance of tensile reinforcement, which, in fact, will be significantly lower than the limit. Proposals are given that take into account the limiting deformations of concrete, which, in turn, will be a key quantity for determining the resistance of tensile reinforcement in the cross section. The article also presents the results of experimental studies of a flexible reinforced concrete pillar operating with a load eccentricity equal to e0 = 0.32h. Theoretical calculations and experimental studies were analyzed and appropriate conclusions were drawn.A formula has been developed to determine the real resistance of the stretched metal reinforcement at the time preceding destruction. The calculation algorithm has been compiled. When comparing theoretical and experimental strength, the difference did not exceed 5%.

    Keywords: steel, heavy concrete, reinforced concrete, testing, stand

  • Increasing the efficiency of organizational and technological support for the capital repair system at the present stage

    One of the tasks of the state is to create decent living conditions for the population, including providing people with high-quality and comfortable housing. However, over time, housing wears out, becomes outdated, and becomes unsuitable for use. In order to slow down and prevent rapid deterioration of capital construction projects, capital repair measures are being implemented. They are aimed at restoring and replacing structural elements of residential buildings that have fallen into disrepair. Overhaul of housing is a complex of organizational, technological and economic measures aimed at reducing and eliminating the physical deterioration of buildings. Thus, the creation of decent living conditions for the population and the safety of the housing stock, as well as increasing its energy efficiency, depend on the effectiveness of the organization of the capital repair system and its organizational and technological support.

    Keywords: major renovation, apartment building, repair and construction work, energy saving, energy efficiency

  • On normative regulation and perspectives of application of information modeling technologies in planning integrated development of territories

    The article considers domestic, foreign and international experience in the application of information modeling technologies (IMT) and its standardization in the planning of integrated development and information modeling (IM) of territories. The analysis of the world practice of standardization of TIM application in planning of complex development and information modeling of territories has revealed the absence of unified approaches and system representation in the part of development of standards in the subject area. Based on the results of the analysis and generalization of world practice recommendations and proposals for the development and updating of national standards and codes of practice in terms of the application of IMT in the planning of integrated development and information modeling of territories are developed.

    Keywords: information modeling, integrated development of territories, technical standards

  • Forecasting the risk of destruction of building structures

    The article is devoted to the assessment of signs that can lead to the destruction of building structures that undergo physical wear over time. The destruction of the elements can lead to adverse consequences. A mathematical basis is used to diagnose structural failure. With its help, it is possible to determine the influence of signs contributing to the destruction of the structure on the degree of destruction. This article discusses the main provisions of the general kinetic theory, as well as methods of its application in order to determine the emergency condition of structures. The technical condition of the structures is considered from the standpoint of the determinational theory. The concept is based on the principle of reliability of the structure before the first failure. The object's trouble-free operation model embodies the science of the speeds of processes in the field of structuring and decomposition of complex system structures throughout the life cycle and shows the adaptive response of structures to factors that shorten the service life of the object. This concept makes it possible to more accurately assess the risks of structural failure from the effects of certain adverse factors.

    Keywords: construction and technical expertise, defects, reliability, diagnostic tasks, diagnostic methods, efficiency

  • Assessment of manufacturability of assembly elements during the installation of a steel structure

    Methods for calculating technological and functional tolerances in the manufacture and installation of steel structures are described. An experimental installation of the structure was carried out to make it possible to clarify the tolerances, and the foundations of the methodology for assessing the qualitative and quantitative manufacturability of assembly elements were put forward to simplify the processes of manufacturing and assembling the structure.

    Keywords: methods for calculating tolerances, installation of a structure, manufacturing of structures, manufacturability, complex indicator of manufacturability

  • Water resistance of concrete fabric

    Increasing the energy efficiency of the construction process involves the use of materials with the lowest material intensity, including thickness, as well as with a reduced content of Portland cement clinker while maintaining or improving the technical characteristics of the products. In this regard, the use of textile concrete products, including concrete sheets, is promising. The development of a composite binder containing components that reduce nega-tive pressure in hardening concrete, and consequently shrinkage deformations and cracking, made it possible to obtain products with the following waterproofness indicators: determined by the ""wet spot"" method: 1.2 MPa; with a filtration coefficient of 5-7×10-11 cm / s; the concrete waterproof grade W12

    Keywords: textile-concrete, concrete web, water resistance, shrinkage during hardening, cracking, fine concrete

  • Determining the duration of the stages of pre-design and design preparation of objects for construction

    The stages of pre-project and design preparation are fundamental for the further implementation of the investment and construction project. The success of construction and commissioning of facilities depends on the successful completion of these stages. The duration of the stages depends on the competence and consistency of interaction between the participants in the investment and construction project, the rationality of decision-making by the technical customer (developer) and a number of other factors. Identifying factors and finding options for rational planning of the stages of pre-project and design preparation is very relevant. As part of the study, a formula was derived for determining the duration of the stages of pre-design and design preparation of objects for construction, taking into account the influence of negative factors. The results of the study are used in planning the stages of pre-design and design preparation of a facility for construction.

    Keywords: factors, stages of pre-project and design preparation of objects for construction, duration of procedures