首页 > 最新文献

2021 International Russian Automation Conference (RusAutoCon)最新文献

英文 中文
Evaluation of Information Security of Industrial Automation Systems Using Fuzzy Algorithms and Predicates 基于模糊算法和谓词的工业自动化系统信息安全评估
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537332
Igor Kotenko, I. Parashchuk
The issues of using fuzzy algorithms and fuzzy predicates in the process of evaluating information security indicators of industrial automation systems are considered. This approach makes it possible to increase the reliability of decision-making on the values of specific evaluated information security indicators, taking into account the uncertainty (fuzziness) of observation data. The concepts of a fuzzy algorithm, a fuzzy predicate, a fuzzy number and a fuzzy operator, their role and interrelation in the problems of accounting for the fuzzy conditions for evaluating (measuring, modeling and observing) information security indicators are discussed. The features of the use of fuzzy algorithms and predicates for problems of this class are determined, the results of experimental calculations are described. It allow, as an example, one to judge on the degree of belongingness of the final evaluation of a specific indicator of information security for industrial automation systems to the set of true verified values of this indicator.
研究了模糊算法和模糊谓词在工业自动化系统信息安全指标评价中的应用问题。考虑到观测数据的不确定性(模糊性),该方法可以提高对具体评估信息安全指标值的决策可靠性。讨论了模糊算法、模糊谓词、模糊数和模糊算子的概念,以及它们在信息安全指标评价(测量、建模和观察)的模糊条件的计算问题中的作用和相互关系。确定了模糊算法和谓词在这类问题中的应用特点,并给出了实验计算结果。例如,它允许人们判断工业自动化系统信息安全特定指标的最终评价与该指标的真实验证值集的归属程度。
{"title":"Evaluation of Information Security of Industrial Automation Systems Using Fuzzy Algorithms and Predicates","authors":"Igor Kotenko, I. Parashchuk","doi":"10.1109/RusAutoCon52004.2021.9537332","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537332","url":null,"abstract":"The issues of using fuzzy algorithms and fuzzy predicates in the process of evaluating information security indicators of industrial automation systems are considered. This approach makes it possible to increase the reliability of decision-making on the values of specific evaluated information security indicators, taking into account the uncertainty (fuzziness) of observation data. The concepts of a fuzzy algorithm, a fuzzy predicate, a fuzzy number and a fuzzy operator, their role and interrelation in the problems of accounting for the fuzzy conditions for evaluating (measuring, modeling and observing) information security indicators are discussed. The features of the use of fuzzy algorithms and predicates for problems of this class are determined, the results of experimental calculations are described. It allow, as an example, one to judge on the degree of belongingness of the final evaluation of a specific indicator of information security for industrial automation systems to the set of true verified values of this indicator.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of a System for Protecting a Computational Algorithm Using a Local Network of Personal Computers 利用个人计算机局域网络保护计算算法的系统实现
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537530
K. Kostromitin, B. N. Dokuchaev, D. A. Kozlov
An applied problem associated with the development of a comprehensive information protection system (computational algorithm) in a local computer network is to ensure information security of specific nodes of this network, information in which is of some value to their owner, due to its unknown to third parties, for example, information constituting trade secrets. In this case, a certain computational algorithm (computational function) acts as the protected information, with the help of which it is possible to perform a unique transformation of a specific input parameter, or data set, into an output value - the final result of the algorithm. At the same time, the input and output information, as well as information circulating outside the boundaries of the algorithm, is of no value to the user of this LAN, therefore, is not subject to protection.
在本地计算机网络中开发综合信息保护系统(计算算法)的一个应用问题是确保该网络特定节点的信息安全,这些信息对其所有者具有一定价值,但由于第三方不知道,例如构成商业秘密的信息。在这种情况下,某种计算算法(计算函数)充当受保护的信息,借助它可以将特定的输入参数或数据集执行唯一转换为输出值-算法的最终结果。同时,输入输出信息以及在算法边界外流通的信息对本局域网的用户没有价值,因此不受保护。
{"title":"Implementation of a System for Protecting a Computational Algorithm Using a Local Network of Personal Computers","authors":"K. Kostromitin, B. N. Dokuchaev, D. A. Kozlov","doi":"10.1109/RusAutoCon52004.2021.9537530","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537530","url":null,"abstract":"An applied problem associated with the development of a comprehensive information protection system (computational algorithm) in a local computer network is to ensure information security of specific nodes of this network, information in which is of some value to their owner, due to its unknown to third parties, for example, information constituting trade secrets. In this case, a certain computational algorithm (computational function) acts as the protected information, with the help of which it is possible to perform a unique transformation of a specific input parameter, or data set, into an output value - the final result of the algorithm. At the same time, the input and output information, as well as information circulating outside the boundaries of the algorithm, is of no value to the user of this LAN, therefore, is not subject to protection.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realization of Computer Vision System for Biometric Identification of Personality 人格生物特征识别计算机视觉系统的实现
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537374
L. Chernenkaya, E. N. Desyatirikova, A. V. Rechinskii
This paper discusses issues dedicated to the person’s identity defining. Biometric identification of a person, contrary to established stereotypes, is required not only in criminology, where it has been used initially. Methods applied for persons’ identification differ in the complexity of implementation, the time needed to receive a result (system response) after the identification procedure, and, most importantly, the reliability of obtained results. Biometric identification methods provide the maximal authenticity, and are based on the recognition of biometric data of a particular person, which include physiological data (static) and behavioral data (recognized in dynamics). Objectives of the research are: choice of the identification method based on the conducted analysis that is the most applicable for operational person’s identification within given restrictions, and the description of the biometric identification system realization based on computer vision. The development of the simple and operative system is described, and results are demonstrated.
这篇论文讨论了关于人的身份定义的问题。与既定的刻板印象相反,不仅在犯罪学中需要对一个人进行生物特征识别,在犯罪学中已经最初使用了这种识别。用于人员身份识别的方法在实施的复杂性,识别程序后接收结果(系统响应)所需的时间,以及最重要的是所获得结果的可靠性方面有所不同。生物特征识别方法提供了最大的真实性,并且基于对特定人的生物特征数据的识别,其中包括生理数据(静态)和行为数据(动态识别)。研究的目的是:在给定的限制条件下,根据所进行的分析选择最适用于操作人员识别的识别方法,描述基于计算机视觉的生物特征识别系统实现。介绍了该系统的开发过程,并对结果进行了验证。
{"title":"Realization of Computer Vision System for Biometric Identification of Personality","authors":"L. Chernenkaya, E. N. Desyatirikova, A. V. Rechinskii","doi":"10.1109/RusAutoCon52004.2021.9537374","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537374","url":null,"abstract":"This paper discusses issues dedicated to the person’s identity defining. Biometric identification of a person, contrary to established stereotypes, is required not only in criminology, where it has been used initially. Methods applied for persons’ identification differ in the complexity of implementation, the time needed to receive a result (system response) after the identification procedure, and, most importantly, the reliability of obtained results. Biometric identification methods provide the maximal authenticity, and are based on the recognition of biometric data of a particular person, which include physiological data (static) and behavioral data (recognized in dynamics). Objectives of the research are: choice of the identification method based on the conducted analysis that is the most applicable for operational person’s identification within given restrictions, and the description of the biometric identification system realization based on computer vision. The development of the simple and operative system is described, and results are demonstrated.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124557645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Transient Processes in Electromechanical Brake Units Taking into Account Armature Movement Behavior 考虑电枢运动特性的机电制动装置瞬态过程研究
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537329
I. Bochkarev, V. Khramshin, Kasymbek K. Kelebaev, Jalalidin T. Galbaev
The paper is concerned with transient processes taking place in electromechanical brake units depending on their control circuit. Laws of current and electromagnet flux linkage variation were considered in various operating modes taking into account armature movement behavior. The research group developed and analyzed a brake unit mathematical model in the form of a differential equation system taking into account its design features and operating modes. The mathematical model was used to develop brake unit simulation models in Simulink environment for various control circuits including the one with forced opening of the brake friction unit. The simulation models were used to investigate the transient processes in the brake unit depending on the change in its parameters and some recommendations were given on the choice of the most appropriate forcing schemes.
本文研究了机电制动装置控制电路中发生的暂态过程。在考虑电枢运动特性的情况下,考虑了不同工作模式下电流和电磁链的变化规律。课题组考虑制动单元的设计特点和工作方式,建立并分析了制动单元的微分方程组数学模型。利用该数学模型,在Simulink环境下建立了制动单元的各种控制电路的仿真模型,其中包括制动摩擦单元强制开启的控制电路。利用仿真模型研究了制动单元随参数变化的瞬态过程,并对选择最合适的强制方案提出了建议。
{"title":"Investigation of Transient Processes in Electromechanical Brake Units Taking into Account Armature Movement Behavior","authors":"I. Bochkarev, V. Khramshin, Kasymbek K. Kelebaev, Jalalidin T. Galbaev","doi":"10.1109/RusAutoCon52004.2021.9537329","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537329","url":null,"abstract":"The paper is concerned with transient processes taking place in electromechanical brake units depending on their control circuit. Laws of current and electromagnet flux linkage variation were considered in various operating modes taking into account armature movement behavior. The research group developed and analyzed a brake unit mathematical model in the form of a differential equation system taking into account its design features and operating modes. The mathematical model was used to develop brake unit simulation models in Simulink environment for various control circuits including the one with forced opening of the brake friction unit. The simulation models were used to investigate the transient processes in the brake unit depending on the change in its parameters and some recommendations were given on the choice of the most appropriate forcing schemes.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formation of a Digital Footprint Based on the Characteristics of Computer Hardware to Identity APCS Users 基于计算机硬件特征形成数字足迹识别APCS用户
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537361
A. Salomatin, A. Iskhakov, R. Meshcheryakov
Present research studies the formation of a digital footprint based on the characteristics of computer hardware to identify APCS users. The authors of the article propose to form a digital footprint from significant static and dynamic hardware characteristics. The main elements of the system and their functionality are reviewed, and the characteristic features are noted. In addition to the selection of characteristics based on analysis, selection is carried out based on a computational experiment, which consists in testing the hardware components of a computer using tests of various types. The effective types of tests are determined that can be carried out and provide the desired level of uniqueness of the dynamic hardware performance associated with the stability index. The results of the article, obtained by the authors, could be used in future works, both for improving and generalizing theoretical results, and for practical application in the problem of identifying APCS users.
目前研究的是基于计算机硬件的特点形成数字足迹来识别APCS用户。本文的作者建议从显著的静态和动态硬件特征形成数字足迹。回顾了系统的主要组成部分及其功能,并指出了系统的特点。除了基于分析的特性选择外,还基于计算实验进行选择,计算实验包括使用各种类型的测试来测试计算机的硬件组件。确定了可以进行的有效类型的测试,并提供与稳定性指数相关的动态硬件性能的所需惟一级别。本文的结果可用于今后的工作,既可用于改进和推广理论结果,也可用于APCS用户识别问题的实际应用。
{"title":"Formation of a Digital Footprint Based on the Characteristics of Computer Hardware to Identity APCS Users","authors":"A. Salomatin, A. Iskhakov, R. Meshcheryakov","doi":"10.1109/RusAutoCon52004.2021.9537361","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537361","url":null,"abstract":"Present research studies the formation of a digital footprint based on the characteristics of computer hardware to identify APCS users. The authors of the article propose to form a digital footprint from significant static and dynamic hardware characteristics. The main elements of the system and their functionality are reviewed, and the characteristic features are noted. In addition to the selection of characteristics based on analysis, selection is carried out based on a computational experiment, which consists in testing the hardware components of a computer using tests of various types. The effective types of tests are determined that can be carried out and provide the desired level of uniqueness of the dynamic hardware performance associated with the stability index. The results of the article, obtained by the authors, could be used in future works, both for improving and generalizing theoretical results, and for practical application in the problem of identifying APCS users.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoTaaS based Approach to Design of a WSN for Secure Smart City Monitoring 基于IoTaaS的安全智慧城市监控无线传感器网络设计方法
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537476
V. Desnitsky
The paper proposes a new approach to designing a software for Digital City systems. These systems are built on the basis of wireless sensor networks and implement Internet of Things as a Service (IoTaaS) concept. The approach is based on a proposed knowledge model of distributed systems for design and testing of devices in the Digital City. This approach comprises a specific service-oriented architecture and software prototypes of design and testing tools. The suggested approach increases the automation level of the development process of such systems. It will contribute to reducing time of the development process and operating costs of the developers. The peculiarities of the approach include the use of rules for the interconnection of particular hardware units, on the one hand, and ways of software devices modeling, on the other. Besides, the originality is in application of specific Digital City services by using virtualization tools.
本文提出了一种设计数字城市系统软件的新方法。这些系统建立在无线传感器网络的基础上,实现了物联网即服务(IoTaaS)概念。该方法基于分布式系统的知识模型,用于数字城市中设备的设计和测试。该方法包括特定的面向服务的体系结构以及设计和测试工具的软件原型。建议的方法提高了此类系统开发过程的自动化水平。这将有助于缩短开发过程的时间和开发商的运营成本。该方法的特点包括一方面使用特定硬件单元互连的规则,另一方面使用软件设备建模的方法。此外,创新之处还在于利用虚拟化工具应用具体的数字城市服务。
{"title":"IoTaaS based Approach to Design of a WSN for Secure Smart City Monitoring","authors":"V. Desnitsky","doi":"10.1109/RusAutoCon52004.2021.9537476","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537476","url":null,"abstract":"The paper proposes a new approach to designing a software for Digital City systems. These systems are built on the basis of wireless sensor networks and implement Internet of Things as a Service (IoTaaS) concept. The approach is based on a proposed knowledge model of distributed systems for design and testing of devices in the Digital City. This approach comprises a specific service-oriented architecture and software prototypes of design and testing tools. The suggested approach increases the automation level of the development process of such systems. It will contribute to reducing time of the development process and operating costs of the developers. The peculiarities of the approach include the use of rules for the interconnection of particular hardware units, on the one hand, and ways of software devices modeling, on the other. Besides, the originality is in application of specific Digital City services by using virtualization tools.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121439136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotor Resistance Control of a Wound Induction Generator for wind Turbine with Blade Actuator 叶片驱动风力发电机绕线感应发电机转子阻力控制
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537368
K. Charafeddine, Y. Ryzhkova, S. Tsyruk
Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the use of a wind turbine with an asynchronous generator, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been developed to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.
目前,风能在世界上占有重要地位,这导致对风力发电机的需求显著增加。廉价的能量转换器、快速的微处理器和技术过程的自动控制,使得生产一种高科技的风力涡轮机成为可能,这种涡轮机可以在电力系统中有效地工作,也可以在偏僻的偏远地区工作。本文讨论了风力机与异步发电机的结合,通过数学建模和实验工作结果的验证,提高了风力机的性能。此外,还开发了一种基于转子电路中的附加电阻并使用电压整流器和斩波器来控制绕组转子发电机转速的方法。获得了不同转子电阻值下感应发电机的转矩-转速特性,同样,通过俯仰角控制获得了功率为1500瓦的水轮机的转矩-转速特性。
{"title":"Rotor Resistance Control of a Wound Induction Generator for wind Turbine with Blade Actuator","authors":"K. Charafeddine, Y. Ryzhkova, S. Tsyruk","doi":"10.1109/RusAutoCon52004.2021.9537368","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537368","url":null,"abstract":"Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the use of a wind turbine with an asynchronous generator, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been developed to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Cooling System of a Small Electric Motor 小型电动机冷却系统的建模
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537378
A. Kazakov
The relevance of the work is due to the need to select an effective cooling system for a small-sized electric motor. The aim of the work is to determine the efficiency of various structures and liquid cooling systems using numerical experiments, to determine the required operating mode for the given heat generation conditions of the electric motor, to select the required refrigerant and the geometry of the cooling jacket channel. The following research methods were applied: numerical modeling of the process of a complex three-dimensional non-isothermal coolant flow using the finite element method and the Ansys software package. As a result, a mathematical model of a non-isothermal flow was developed in a three-dimensional formulation; the rational geometry of the cooling jacket of the electric motor is proposed and substantiated; the effectiveness of the use of various refrigerants has been evaluated; determined the technological dependences of the efficiency of the cooling system.
这项工作的相关性是由于需要为小型电动机选择有效的冷却系统。这项工作的目的是利用数值实验确定各种结构和液体冷却系统的效率,确定电动机在给定发热条件下所需的运行模式,选择所需的制冷剂和冷却夹套通道的几何形状。采用了以下研究方法:利用有限元法和Ansys软件包对复杂的三维非等温冷却剂流动过程进行数值模拟。在此基础上,建立了非等温流动的三维数学模型;提出并证实了电动机冷却套的合理几何形状;对各种制冷剂的使用效果进行了评估;确定了冷却系统效率的技术依赖性。
{"title":"Modeling the Cooling System of a Small Electric Motor","authors":"A. Kazakov","doi":"10.1109/RusAutoCon52004.2021.9537378","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537378","url":null,"abstract":"The relevance of the work is due to the need to select an effective cooling system for a small-sized electric motor. The aim of the work is to determine the efficiency of various structures and liquid cooling systems using numerical experiments, to determine the required operating mode for the given heat generation conditions of the electric motor, to select the required refrigerant and the geometry of the cooling jacket channel. The following research methods were applied: numerical modeling of the process of a complex three-dimensional non-isothermal coolant flow using the finite element method and the Ansys software package. As a result, a mathematical model of a non-isothermal flow was developed in a three-dimensional formulation; the rational geometry of the cooling jacket of the electric motor is proposed and substantiated; the effectiveness of the use of various refrigerants has been evaluated; determined the technological dependences of the efficiency of the cooling system.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"51 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Image Analysis Methods for Detecting Nonhomogeneity and Anomalies in the Marine Environment 海洋环境非均匀性和异常图像分析方法的发展
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537347
I. Shishkin, A. N. Grekov
This paper presents a modified image and video analysis model designed to detect nonhomogeneity and anomalies in the marine environment. Unlike known alternatives, the model can detect natural objects after being trained on scarce data and having access to limited computational resources, in anomalous visual monitoring data collected directly in the marine environment. Accuracy in terms of type I and II errors has been improved by implementing additional preprocessing using intelligent anomaly detection and elimination methods. Requirements for the diversity of training sets have been lowered significantly, whilst the use of invariant metrics with adaptive thresholds improves detection adequacy in cases of affine distortions of scaling and rotation of monitored objects. The paper further compares the results of numerical experiments run on real-world data of in-situ monitoring of marine objects.
本文提出了一种改进的图像和视频分析模型,用于检测海洋环境中的非均匀性和异常。与已知的替代方案不同,该模型可以在直接从海洋环境中收集的异常视觉监测数据中,在稀缺数据和有限计算资源的训练下检测自然物体。通过使用智能异常检测和消除方法实施额外的预处理,提高了I型和II型错误的准确性。对训练集多样性的要求已经大大降低,同时使用具有自适应阈值的不变度量提高了在被监测对象缩放和旋转的仿射扭曲情况下的检测充分性。本文进一步比较了在实际海洋目标现场监测数据上进行的数值实验结果。
{"title":"Development of Image Analysis Methods for Detecting Nonhomogeneity and Anomalies in the Marine Environment","authors":"I. Shishkin, A. N. Grekov","doi":"10.1109/RusAutoCon52004.2021.9537347","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537347","url":null,"abstract":"This paper presents a modified image and video analysis model designed to detect nonhomogeneity and anomalies in the marine environment. Unlike known alternatives, the model can detect natural objects after being trained on scarce data and having access to limited computational resources, in anomalous visual monitoring data collected directly in the marine environment. Accuracy in terms of type I and II errors has been improved by implementing additional preprocessing using intelligent anomaly detection and elimination methods. Requirements for the diversity of training sets have been lowered significantly, whilst the use of invariant metrics with adaptive thresholds improves detection adequacy in cases of affine distortions of scaling and rotation of monitored objects. The paper further compares the results of numerical experiments run on real-world data of in-situ monitoring of marine objects.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134647005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing the Reliability of Computer Network Protection System by Analyzing its Controllability Models 通过分析计算机网络保护系统的可控性模型来提高其可靠性
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537393
O. Lauta, I. Saenko, Igor Kotenko
One of the main tasks in organizing the protection of computer networks from cyber attacks is to ensure the management of the protection system. Management includes obtaining information about the state of the protection system, analyzing the information received, developing and executing a solution, as well as implementing control actions on all network protective components. The paper discusses possible variants of models of the control system for the computer network protection system in the context of cyber attacks. Depending on the peculiarities for functioning of the control system of the computer network protection system, one or another controllability function can be selected. The parameters of the model should be determined in advance, so that the model adequately describes the activities of the control system of this class in solving problems in conditions of cyber attacks. The indicator for the effectiveness of the control system of the protection system is substantiated - the probability of an error-free and timely decision-making in time, which determines the cyber resilience of the network as a whole. The adequacy of the developed models has been experimentally confirmed.
组织保护计算机网络免受网络攻击的主要任务之一是确保保护系统的管理。管理包括获取有关保护系统状态的信息,分析收到的信息,制定和执行解决方案,以及对所有网络保护组件实施控制行动。本文讨论了在网络攻击背景下计算机网络保护系统控制系统模型的可能变体。根据计算机网络保护系统控制系统的功能特点,可以选择一种或另一种可控功能。模型的参数应提前确定,使模型充分描述该类控制系统在网络攻击条件下解决问题的活动。验证了保护系统控制系统有效性的指标——无差错及时决策的概率,它决定了整个网络的网络弹性。所建立的模型的充分性已得到实验证实。
{"title":"Increasing the Reliability of Computer Network Protection System by Analyzing its Controllability Models","authors":"O. Lauta, I. Saenko, Igor Kotenko","doi":"10.1109/RusAutoCon52004.2021.9537393","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537393","url":null,"abstract":"One of the main tasks in organizing the protection of computer networks from cyber attacks is to ensure the management of the protection system. Management includes obtaining information about the state of the protection system, analyzing the information received, developing and executing a solution, as well as implementing control actions on all network protective components. The paper discusses possible variants of models of the control system for the computer network protection system in the context of cyber attacks. Depending on the peculiarities for functioning of the control system of the computer network protection system, one or another controllability function can be selected. The parameters of the model should be determined in advance, so that the model adequately describes the activities of the control system of this class in solving problems in conditions of cyber attacks. The indicator for the effectiveness of the control system of the protection system is substantiated - the probability of an error-free and timely decision-making in time, which determines the cyber resilience of the network as a whole. The adequacy of the developed models has been experimentally confirmed.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124237595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Russian Automation Conference (RusAutoCon)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1