×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Direct synthesis PID controller design for unstable processes

    This article discusses a proportional-integral-derivative controller circuit for an unstable system with a delay in a parallel control structure. The parallel control structure has two separate controllers for tracking tasks and suppressing load disturbances. The considered controller is developed on the basis of a direct synthesis approach by choosing a separate reference model with feedback. The proposed design method is applicable to both the lower and the high-level unstable process without model reduction in the higher order process. The effectiveness of the proposed method is demonstrated through example modeling and comparison with methods published in the literature.

    Keywords: proportional-integral-derivative regulator circuit, direct synthesis, reference model, design method

  • The Case Based Reasoning Method for Management of City Infrastructure Complex Technological Objects

    The paper considers the implementation of the Case Base Reasoning method when managing a city infrastructure complex technological object. A method of formalizing the situation at a complex technological object using a matrix of states is presented. A method is proposed for determining the proximity of situations in the state space, taking into account the proximity of the states of each element of a complex technological object. The implementation of the proposed method when selecting a situation from the knowledge base allows avoiding collisions when two critically different situations with different solutions are selected.

    Keywords: Case Based Reasoning, CBR, case retrieve, knowledge base, facility management, city infrastructure, Euclidean distance

  • Application security testing

    The theme of secure applications is considered, using various techniques and the proposal of a graph calculation model of testograms

    Keywords: application security testing, testograms, test trees

  • Infrared drying with convection-vacuum technology for drying plant products

    In this article, the object of study is the drying of plant products in a combined drying apparatus using infrared radiation, convection and reduced pressure. The process of drying products in the food industry is still relevant today in connection with the optimization of efficiency and reduction of energy consumption. In the presented experimental study, the following products are used: apples, bell peppers, bananas. The slice thickness varies from 5 to 10 mm. Observations show that, with optimal parameters and drying modes, the possibility of using the described drying installation is fully expedient.

    Keywords: drying, infrared radiation, reduced pressure, convection, dried food, pilot plant

  • Monitoring of ice and frost formations on the AC contact network

    Currently, Russian Railways are characterized by an increase in the weight of trains, an expansion of the fleet of sections with high-speed movement of electric rolling stock. All this leads to a complication of the operating modes of the power supply system, increased liability and possible damage from idle trains. At the same time, monitoring systems of the contact network, as an element of the power supply system that does not have a reserve, are of particular importance. On a significant number of sections of the Russian Railways, the wires and cables of the contact network are subject to ice and frost formations and, as a result, serious operational risks and costs. Minimizing the damage caused by the formation of ice and measures to eliminate it is possible if it is detected at the initial stage. The article provides an assessment of the possibility of using systems based on changes in the weight of wires for the purposes of early detection of ice and frost formations.

    Keywords: ice and frost formations, early detection, contact network, carrier cable, contact wire

  • Data Storage Threats

    At the moment, in the conditions of an actively developing information society, information is becoming a necessary factor of production, therefore ensuring the safety of data is an important issue. The article is devoted to the topical, today, problems associated with threats in the field of data storage. The definition of the concept of threat in the field of data storage is given; classification by types of threats is proposed; the following classes of threats in the field of data storage are distinguished: spatial, communicative, destructive; the actual components of threats are described. Based on the analysis of threats in the field of data storage, algorithms for ensuring the safety of information will be developed in the future.

    Keywords: information, data, data storage, data safety, data integrity, data storage threats, data integrity threats

  • Object recognition in images obtained from unmanned aerial vehicles using deep learning methods

    The article discusses transfer learning methods of convolutional neural network VGG16 for solving the problem of object recognition in images from UAVs (unmanned aerial vehicles). In the absence of the required amount of initial information, it is proposed to work on the augmented dataset. The article presents the architecture of a neural network and considered its action on a specific example. When developing a service, loading the image and displaying the results of the model, was used Flask framework, training of models took place using a cloud service Google Colab based on Jupyter Notebook.

    Keywords: deep learning, neural networks, object recognition, data augmentation

  • Means of relay protection and automation state and prospects

    This article uses the structural-functional method. The proposed study shows how many factors influence the performance, efficiency of enterprises and how important it is to follow the latest technologies and vectors of their development. Everything is important, from the material and technical equipment of personnel to the timely replacement of obsolete or outdated devices that have reached the limit of their own reliability. No reliance should be placed solely on technical means or personnel performance - these two crucial aspects must work together, be continuously monitored and have everything they need to perform their tasks in a quality and timely manner. It is also important to learn from the experience of previous years, so that it is possible to understand what mistakes have been made and, therefore, to act appropriately in order to avoid them again. It is also important to develop such positive trends as the transition to remote control of relay protection devices. To date, we must pay special attention to information security of the complexes' operation during the transition to remote control, as the current realities of work at power facilities require exactly that. Equally important is the purpose of this article to forecast future trends in RPA development over a period of twenty years.

    Keywords: relay protection and automation, improvement of the regulatory framework, introduction of relay protection

  • Digital twins for supply chain risk management amid COVID-19 pandemic

    As technology advances, supply chains have become complex and dynamic, and it has never been more important to adopt flexible and innovative approaches to managing them as in the heightened risk of the COVID-19 pandemic. The availability of data in real time, competent and timely planning, the ability to adapt to constantly changing market conditions have become more important competitive advantages than ever. Digital twins are a technological framework that focuses on digitalizing supply chains and presenting analytical capabilities to identify risks, predict them in a digital model for rapid response in the real world.

    Keywords: supply chains, risk management, digital twins, logistics, trucking, modeling

  • Advantages of the field programmable gate array specialized resources for soft intellectual property cores

    Soft intellectual property cores (IP-cores) based on a field programmable gate array (FPGA) are blocks that do not have a specific placement and prerouted interconnects on the chip. These blocks make it possible to speed up the design process of the digital circuits based on the FPGAs, while the use of the FPGA architecture specialized resources can increase the performance of the developed circuits that include soft IP-cores. These resources should be considered both in the soft IP-cores design and in the development of methods and algorithms for computer-aided design systems to achieve the greatest efficiency. In this paper, two soft IP-cores implementations are developed and a comparative analysis of the obtained blocks’ volumes and the used routing resources is carried out. In the first implementation, both the logical and layout syntheses take into account the basic FPGA structural features and FPGA specialized resources. In the second, only standard library elements and a common routing tree are used. On the results of the analysis, the advantages of the FPGA specialized architecture specialized resources in the soft IP-cores design are shown. Also the paper describes the specifics of these resources introduced by the FPGA developers, and the implementation features of the following soft IP-cores: n-bit adder / subtractor, up counter to n and n-bit shift register.

    Keywords: intellectual property core, computer aided design, field programmable gate array, design flow, routing

  • Simulation of the design activity diversification of innovative enterprise

    When designing security systems for buildings and structures, the technical specification specifies the required characteristics of the equipment. On the basis of the technical specification, a certain number of solutions (projects) from different designers and suppliers can be formed. These projects may differ in equipment, method of installation and maintenance, different degrees of functional reserve and the possibility of expanding the system if necessary. At this stage of equipment selection, the engineer is faced with the problem of choosing one optimal option from the presented subset, since all projects (solutions) meet the requirements of the technical specification. The presented algorithm for selecting the elements of the security system of real estate objects is based on the construction of a complex assessment model. The characteristics by which the equipment will be compared are determined. The degree of importance of each characteristic is determined. A comprehensive assessment of each alternative is calculated. The proposed approach avoids the negative consequences of subjectivism arising from the influence of the external environment.

    Keywords: multi-criteria task, algorithm, selection task, security system, ranking, design, terms of reference, criterion, complex evaluation, model

  • Problems of using additional devices to expand the diagnostic capabilities of certain physiological parameters and ways to solve them

    Diagnostic imaging is a necessary procedure for the accurate diagnosis and treatment of at least 25% of patients worldwide. Therefore, the expansion of opportunities for interaction between the doctor and the patient at a distance during instrumental diagnostics leads to an increase in positive treatment results. This article discusses the ways and problems of using additional devices, including robotic systems, in diagnostics. Having investigated the ways of using ultrasound diagnostic devices as the most informative and useful diagnostic method, and complementary technologies for expanding the capabilities of ultrasound diagnostics, the general principles of working with this equipment were determined. An algorithm for working during the survey was also developed. The definition of these principles allowed us to develop our own solution to the problems that arise when conducting a survey using these technologies.

    Keywords: interactive medicine, patient, health status, health diagnostics, severity, condition assessment, counseling, instrumental diagnostics, personalized medicine, services

  • Development of a software product for analysis and prediction of gas concentrations in power transformers oil

    The article is devoted to the development of a software product that analyzes the concentration of gases (H2; CO; C2H4; C2H2) measured in transformer oil and set as a function of time. Product development consists of two stages. The first step is the task of classifying transformers. The second stage is predicting reliable operation before a possible failure based on the concentrations of dissolved gases in the transformer oil set as the initial data. During the development of the software product, the frameworks for creating web applications Flask and ReactJS were used, the models were trained on the frameworks H2O.ai, LightGBM, Sklearn.

    Keywords: machine learning, regression, power transformers, gas concentration, web-service

  • Effect of silicon ion implantation on the anodic behavior of aluminum films

    The main results of studies of the anodic behavior and chemical composition of the surface layer of the aluminum film before and after implantation of silicon ions (20 keV), conducted using the method of measuring potentiostatic polarization curves, are presented. The decrease in the anode polarization currents and the expansion of the passivation region depending on the dose of the introduced ions, due to the formation of oxide compounds with the implanted silicon impurity, are shown.

    Keywords: ion implantation, films, aluminum, polarization curves, potentiostat, anode behavior, auger electron spectra, electrolyte, silicon ions

  • Modeling and visualization of pipe bending trajectories using a MEMS sensor

    In this paper, we propose modeling and visualization of the pipe movement trajectories in a pipe bending machine. Mathematical equations for converting quaternion data to Euler angular data are presented. The paper uses the method of double integration on the acceleration data from the IMU-9250 MEMS sensor to obtain realistic speed and location. The program is implemented in the MATLAB environment for visualization of pipe trajectories in 3D representation.

    Keywords: the trajectory of the object, the device of inertial measurement, MEMS

  • Software implementation of the neural network training algorithm

    The article deals with the issues related to the design of control devices for technological equipment based on artificial neural networks. The algorithm of the neural network training process based on the Widrow-Hoff method is developed, designed for computer-aided design of artificial neural networks operating in the environment of a microprocessor system or a personal computer. The authors perform a software implementation of the algorithm for training a three-layer neural network using the C# programming language on the platform Microsoft.NET. The program uses a neural network training algorithm with a "teacher". The article shows the interface of interaction of the developed program with the "teacher" (designer of neural networks). An example is given of the development of an artificial neural network that performs the function of a binary number adder. The results of the research can be further used in the development of a computer-aided design system for artificial neural networks, and can also be used in the development of software for microprocessor control systems for technological equipment.

    Keywords: artificial neural network, training, algorithm, programming language, neuron bias, adder, input signals, output signals, synaptic connections, neurons

  • Recognition of defects on metal alloys using OpenCV computer vision algorithms

    The purpose of this work is to develop an algorithm for recognizing shrinkage defects on metal alloys. The steps for image processing are described. When analyzing the algorithm, a description is presented for each step, followed by a software implementation. The final step, after using the methods of the algorithm, is to count the contours of the defects. To demonstrate the functionality of the software, random photos of the metal body in the section were taken, where defects in the form of gas pores can be directly observed. The software, with the correct selection of input data, processes the image with high accuracy, minimizing errors in calculating defects. Using the proposed algorithms reduces the diagnostic time. The article presents a comparative description of the manual and automated methods, showing the effectiveness of the second method in comparison with the first. To write the software, the Python 3.7 programming language was used, as well as the OpenCV computer vision algorithms library.

    Keywords: defect detection, computer vision algorithms, OpenCV, metal defects, shrinkage defects

  • Optimization of the distribution of reactive power of substations of power systems

    The choice of the installation location of compensating devices is determined by various factors that must be taken into account when performing calculations. The location of reactive power compensation devices is determined based on the results of mathematical modeling and the optimal operating mode of individual sections of electrical networks. The paper presents the results of modeling, considers the uncertainties encountered in solving the problem of placement of compensating devices.

    Keywords: compensating devices, electric power industry, active power losses, minimum reduced costs, uncertainty, power gain, optimization criteria, electrical node, damage vector, optimization

  • Interpretation of the National Russian pattern in Modern embroidery by means of Digital technologies

    Methods of interpretation or prototyping of a historical textile sample are not widely covered in the modern scientific literature. But they play a significant role in the reconstruction of certain types of objects. Costume reconstruction is an important part in the field of theater and cinema. The modern fashion image also takes inspiration from history. Now the author's products retain a significant position in the fashion world. The growing interest in ethnic techniques and motifs, as well as in the national peculiarities of textile decoration, requires a detailed study. In this article, we will outline the main software packages, digital tools, and how to use them. In search of original historical sources, we turned to the unique collection of the Kosygin University. We studied a collection of hand-made towels and valances. The entire collection belongs to different periods of the XIX century. The article notes the technical features of the preparation of the embroidery module, which affect the quality of the product and the technology of its creation. There is a photo of the screen of the sewing and embroidery machine at the stage of technical tincture. Some manufacturing steps and a complete set of patterns are demonstrated. The finished product is a linen dress. The collar and cuffs are decorated with elements of standard embroidery. But each element has been revised and decorated as an ethnic element of the decor. The front part of the dress is decorated with embroidery of the author's design. The economic aspect of the use of an automated sewing and embroidery machine for the creation of author's products is noted.

    Keywords: russian national pattern, ethnic ornament, computer design of the pattern, digital design of embroidery, embroidery module, authorized embroidery

  • Optimization of the architecture of the Unified automated information system of customs authorities

    The existing architecture of the Unified Automated Information System of Customs Authorities (UAIS TO) does not fully comply with modern requirements and the goals and objectives of the FCS of Russia. The problems of desynchronization and multiple duplication of data in numerous automated information subsystems, software complexes, information and reference systems and various software tasks that make up the specialized software of the UAIS TO create prerequisites for the occurrence of emergency situations, which leads to the likelihood of stopping data transmission during customs operations , delays in the release of goods and problems with the functioning of other regulated procedures. Proposals for improving the UAIS TO are presented in terms of technical architecture, in terms of information and software infrastructure and in terms of functional architecture such as: modernization, taking into account the trends of import substitution, increasing the computing power of the data center, improving the telecommunications infrastructure (high channel capacity, uninterrupted, guaranteed data transmission); centralization of information and software tools; implementation of a functional subsystem of a unified analytical storage of information.

    Keywords: automated information system, information system architecture, customs authorities, automation

  • On the issue of improving the quality of food choppers

    The article deals with the issue of improving the quality of the food chopper. Both domestic and industrial shredders are considered. Engineering solutions are proposed that will reduce the operating costs of the consumer and increase the energy efficiency of the grinding process. These recommendations have been tested in production and are reliable.

    Keywords: quality, chopper, energy efficiency, blade, gap, angle, knife, grate, operation, production

  • Simulink Simulation of Wheel Machine Center of Mass Oscillations

    The results of the study of fluctuations of the center of mass of the car UAZ "Hunter" during its movement on the support surface with different height of road irregularities: asphalt-concrete surface and off-road are given. The study uses Simulink simulation.

    Keywords: Center of mass fluctuations, vehicle, simulation, Simulink

  • Improvement of the algorithm for automated formation of solutions for the production of construction works based

    The work is aimed at improving the algorithm of automated formation of solutions for the production of construction works based on the combinatorial approach. The essence of the approach is to form all feasible solutions for the production of construction works, taking into account the specified resources and constraints, and choosing the best option according to the specified criteria. At the same time, at some stages of the generation of altenatives, it is advisable to eliminate obviously losing options, in particular, it is proposed to take into account the losses from downtime of workers and construction machines formed due to some difference in the total productivity of workers and construction machines when forming the composition of resources for performing mechanized construction work. The proposed algorithm assumes the choice of the composition of resources for performing a mechanized technological process with minimal losses from idle resources.

    Keywords: organizational and technological design, simulation model, algorithm, logical and mathematical model, combinatorial approach, multivariate design, automated control system in construction

  • Application of a recurrent mathematical model for estimating the parameters of the traction network during their dynamic change

    The article is devoted to the possibility of applying the methods of successive approximations in the analysis of the instantaneous scheme of the traction network. The described approach allows to improve the accuracy of modeling dynamic modes of operation of traction power supply sections, and also allows to significantly improve the process of modeling diagnostics and control systems of electric rolling stock at the design stage based on a more accurate model of dynamically changing input parameters of the traction network, depending on their required level.

    Keywords: traction network, instantaneous circuit, diagnostics, simulation, recruitment model

  • Adaptation of voice recognition model of Google Cloud Speech for improving source code edit user experience from mobile devices

    The paper discusses approach to voice recognition, that allows to use tools of Google Cloud Speech platform for editing source code for programs, using audioprocessing, editing distances and substitution tables. The paper discusses issues of editing source code on mobile devices and the issues, which does not allow using tools from Google Cloud Speech platform directly, like not recognizing certain keywords. The paper suggests new method, which combines substitution tables and editing distances for solving the issues. This approach can be used for editing source code for programs, using mobile devices. The paper offers a prototypr of web-application, which allows to edit source code and uses this approach and, also, allows to submit changes to Github source code hosting platform and a popular instant messenger Telegram.

    Keywords: voice recognition, mobile devices, source code analysis, formal languages, editing distances