Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537489
A. P. Dimitriev, R. Bazhenov, L. Alekseeva
This paper dwells on the issues of improving the switching schedule quality for a group of power consumers when using a pulse-width method of power control. In this regard, the authors comment on a corresponding discrete optimization problem, which is one of the NP-complete problems. They also review the expression for the objective function used to optimize such schedules. The second chance algorithm that the authors offer is based on two algorithms proposed before: the algorithm for finding the initial selection sequence close to an optimum and the selection sequence optimization algorithm based on the simulated annealing and the multi-start method. This algorithm allows finding schedules in polynomial time that are relatively close to optimal schedules in terms of the objective function value. The authors study the influence of various parameters of the second chance algorithm on the average value of the objective function for the resulting schedule. It is experimentally shown that for all 10 used sets of initial data for scheduling, the proposed algorithm is more efficient than previously known algorithms.
{"title":"Maximizing Power Factor for Controlling the Load of an Electricity Consumers’ Group by the Second Chance Algorithm","authors":"A. P. Dimitriev, R. Bazhenov, L. Alekseeva","doi":"10.1109/RusAutoCon52004.2021.9537489","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537489","url":null,"abstract":"This paper dwells on the issues of improving the switching schedule quality for a group of power consumers when using a pulse-width method of power control. In this regard, the authors comment on a corresponding discrete optimization problem, which is one of the NP-complete problems. They also review the expression for the objective function used to optimize such schedules. The second chance algorithm that the authors offer is based on two algorithms proposed before: the algorithm for finding the initial selection sequence close to an optimum and the selection sequence optimization algorithm based on the simulated annealing and the multi-start method. This algorithm allows finding schedules in polynomial time that are relatively close to optimal schedules in terms of the objective function value. The authors study the influence of various parameters of the second chance algorithm on the average value of the objective function for the resulting schedule. It is experimentally shown that for all 10 used sets of initial data for scheduling, the proposed algorithm is more efficient than previously known algorithms.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537478
E. Belashova, D. A. Gashigullin
Associative steganography is the method for protecting information using associative masking, which should be considered as a special case of the so-called screening method of historical steganography, when the hidden message is written on a stencil on a clean sheet, after which a meaningful text is formed with such an insert. This work is devoted to the analysis of associative protected spatio-temporal data. A software package was developed for the analysis of associative protected spatiotemporal data. Describes functions for the analysis of associative protected spatio-temporal data. Describes the software products that were used in this work. Describes the architecture and components of the software product that was developed in this work. The results of the developed software are presented. The estimation of the performance and scalability of the developed program product is presented.
{"title":"Analysis of Associative Protected Spatio-Temporal Data","authors":"E. Belashova, D. A. Gashigullin","doi":"10.1109/RusAutoCon52004.2021.9537478","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537478","url":null,"abstract":"Associative steganography is the method for protecting information using associative masking, which should be considered as a special case of the so-called screening method of historical steganography, when the hidden message is written on a stencil on a clean sheet, after which a meaningful text is formed with such an insert. This work is devoted to the analysis of associative protected spatio-temporal data. A software package was developed for the analysis of associative protected spatiotemporal data. Describes functions for the analysis of associative protected spatio-temporal data. Describes the software products that were used in this work. Describes the architecture and components of the software product that was developed in this work. The results of the developed software are presented. The estimation of the performance and scalability of the developed program product is presented.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537367
P. Ilyushin, A. Kulikov
Emergency power systems (EPS) are there to ensure reliable electricity delivery to critical loads. EPS’s are activated when a grid or generation accident renders the centralized electric power system unable to deliver electricity, or when a power deficient occurs coupled with scheduled load-shedding (SLS). Currently, EPS and power restoration are controlled manually in most cases. The authors hereof have developed an automatic control system (ACS) for EPS that is capable of smoothly switching loads to the EPS automatically without interrupting electricity delivery. EPS is controlled from a control-room automated workstation (AWS); the AWS can be a PC or a mobile device and can use any kind of connectivity. This EPS ACS can offload the grid to an extent configured by the control-room staff over a few minutes without consumer outage. This solution would be effective for facilities that utilize multiple EPS’s, where use of high-capacity uninterrupted power supplies (UPS) is not feasible. The ACS will be most efficient for grid companies that operate numerous EPS’s scattered over a large area. This a versatile system that can work with various types of EPS from different manufacturers, although minimum technical requirements exist. The system can ensure reliable electricity delivery to critical loads in most operation situations.
{"title":"Towards More Efficient Emergency Power Systems in Low- and Medium-Voltage Distribution Grids","authors":"P. Ilyushin, A. Kulikov","doi":"10.1109/RusAutoCon52004.2021.9537367","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537367","url":null,"abstract":"Emergency power systems (EPS) are there to ensure reliable electricity delivery to critical loads. EPS’s are activated when a grid or generation accident renders the centralized electric power system unable to deliver electricity, or when a power deficient occurs coupled with scheduled load-shedding (SLS). Currently, EPS and power restoration are controlled manually in most cases. The authors hereof have developed an automatic control system (ACS) for EPS that is capable of smoothly switching loads to the EPS automatically without interrupting electricity delivery. EPS is controlled from a control-room automated workstation (AWS); the AWS can be a PC or a mobile device and can use any kind of connectivity. This EPS ACS can offload the grid to an extent configured by the control-room staff over a few minutes without consumer outage. This solution would be effective for facilities that utilize multiple EPS’s, where use of high-capacity uninterrupted power supplies (UPS) is not feasible. The ACS will be most efficient for grid companies that operate numerous EPS’s scattered over a large area. This a versatile system that can work with various types of EPS from different manufacturers, although minimum technical requirements exist. The system can ensure reliable electricity delivery to critical loads in most operation situations.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537443
Alexy Poletikin, V. Promyslov, K. Semenkov
The paper considers the problem of the operation maintenance of complex soft- and hardware systems, for example, automated control systems of industrial objects, when individual components of the system become unavailable for replacement in case of their failure or for other reasons. When the replacement components differ from those that were designed at the system creation stage, the upgrade task arises. System upgrades require a complete cycle of work on validating both the replaceable components and the changed system itself. The system itself, if it is included in the life cycle of an existing industrial object, actually cannot be used as a testbed of the new components; generally, full-size system layouts are used for the testbed, and the complexity of those layouts may be comparable to the system itself. The inclusion of the digital twin in the life cycle of the object and its control system allows to effectively solve the problem of system modification (individual components replacement) in this case. The digital twin is not only a cheaper analog of the system that can be used for testing; due to the properties that allow parallel testing for several copies and to influence the model time within certain limits, it provides a higher quality of testing.
{"title":"Digital Twins as a Key Technology for Ensuring Effective Modernization of Complex Industrial Systems","authors":"Alexy Poletikin, V. Promyslov, K. Semenkov","doi":"10.1109/RusAutoCon52004.2021.9537443","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537443","url":null,"abstract":"The paper considers the problem of the operation maintenance of complex soft- and hardware systems, for example, automated control systems of industrial objects, when individual components of the system become unavailable for replacement in case of their failure or for other reasons. When the replacement components differ from those that were designed at the system creation stage, the upgrade task arises. System upgrades require a complete cycle of work on validating both the replaceable components and the changed system itself. The system itself, if it is included in the life cycle of an existing industrial object, actually cannot be used as a testbed of the new components; generally, full-size system layouts are used for the testbed, and the complexity of those layouts may be comparable to the system itself. The inclusion of the digital twin in the life cycle of the object and its control system allows to effectively solve the problem of system modification (individual components replacement) in this case. The digital twin is not only a cheaper analog of the system that can be used for testing; due to the properties that allow parallel testing for several copies and to influence the model time within certain limits, it provides a higher quality of testing.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537338
A. Martyshkin, D. Pashchenko
The purpose of the work is to study social network users as potential internal violators through the analysis of the tonality of text messages. To achieve the goal, the following tasks have been set and solved: 1) Determine the basics of sentiment analysis for text messages; 2) Highlight the lack of existing methods for identifying internal violators; 3) Propose and develop a preventive method for identifying potential internal violators based on the analysis of the sentiment of text messages. An analysis of the subject area of the study was carried out, which included a review of existing methods for identifying insiders. The paper analyzes internal violators with the identification of potential ones, and also considers the means of processing natural languages and identifies approaches to the classification of the tonality of the text.. The article solves the problem of developing a method for identifying potential internal offenders, based on the analysis of the sentiment of text messages. An analysis was made of the funds allocated and the methods that are appropriate to achieve the research objective. The developed method is described. As a result of the study, a method was proposed that allows one to identify potential internal offenders by analyzing the sentiment of their text messages on social networks.
{"title":"A Method for Identifying Potential Internal Violators Based on the Analysis of the Tone of Messages from Users of Social Networks","authors":"A. Martyshkin, D. Pashchenko","doi":"10.1109/RusAutoCon52004.2021.9537338","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537338","url":null,"abstract":"The purpose of the work is to study social network users as potential internal violators through the analysis of the tonality of text messages. To achieve the goal, the following tasks have been set and solved: 1) Determine the basics of sentiment analysis for text messages; 2) Highlight the lack of existing methods for identifying internal violators; 3) Propose and develop a preventive method for identifying potential internal violators based on the analysis of the sentiment of text messages. An analysis of the subject area of the study was carried out, which included a review of existing methods for identifying insiders. The paper analyzes internal violators with the identification of potential ones, and also considers the means of processing natural languages and identifies approaches to the classification of the tonality of the text.. The article solves the problem of developing a method for identifying potential internal offenders, based on the analysis of the sentiment of text messages. An analysis was made of the funds allocated and the methods that are appropriate to achieve the research objective. The developed method is described. As a result of the study, a method was proposed that allows one to identify potential internal offenders by analyzing the sentiment of their text messages on social networks.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537461
M. Kharinov
This paper offers the simplest understanding of superpixels as maximal pixel clusters providing error-free obtaining of a limited sequence of accessible optimal piecewise constant image approximations with the minimum achievable approximation error (total squared error) E for each number of pixel clusters. The superpixel hierarchy is generated by the intersection of optimal image partitions into an increasing number of clusters g. It is irregular and differs markedly from the non-hierarchical sequence of optimal approximations, since described by a non-convex dependence of the approximation error E on the cluster number g. Therefore, the task of hierarchical superpixel clustering is posed and solved, which is briefly described in the paper.
{"title":"Superpixel Clustering","authors":"M. Kharinov","doi":"10.1109/RusAutoCon52004.2021.9537461","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537461","url":null,"abstract":"This paper offers the simplest understanding of superpixels as maximal pixel clusters providing error-free obtaining of a limited sequence of accessible optimal piecewise constant image approximations with the minimum achievable approximation error (total squared error) E for each number of pixel clusters. The superpixel hierarchy is generated by the intersection of optimal image partitions into an increasing number of clusters g. It is irregular and differs markedly from the non-hierarchical sequence of optimal approximations, since described by a non-convex dependence of the approximation error E on the cluster number g. Therefore, the task of hierarchical superpixel clustering is posed and solved, which is briefly described in the paper.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116784761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537554
K. Charafeddine, Y. Ryzhkova, S. Tsyruk
Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the analysis of an asynchronous generator connected to wind turbines, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been eveloped to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.
{"title":"Analysis of a Wind Turbine with Wound Rotor Asynchronous Machine","authors":"K. Charafeddine, Y. Ryzhkova, S. Tsyruk","doi":"10.1109/RusAutoCon52004.2021.9537554","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537554","url":null,"abstract":"Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the analysis of an asynchronous generator connected to wind turbines, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been eveloped to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537497
A. Tyutyunnik, A. Lazarev
At the present stage of development of hardware and software in the field of information technology an important place is occupied by information security, which implies the use of additional means to ensure secure processing of confidential data of end-users of target systems. The main problem, allocated in existing electronic computers, is insufficient protection of hardware ports from external influences. An example of such vulnerabilities is the USB Rubber Ducky hardware and software security solution from hak5 that exploits vulnerabilities by emulating peripherals to perform unauthorised actions on the target machine. Offensive Security's advanced, similar solutions allow complex target machine interception and remote control of the target machine, underscoring the urgency of the problem at hand. To solve this problem, an intelligent system was developed to evaluate and calculate the states of connected peripheral devices, in particular, to evaluate the comparability of input groups of peripheral device parameters. To improve security, a deep learning artificial neural network process was integrated into the implemented system. Based on user actions – software processing call speed, user errors and existing exploitation patterns of variant vulnerabilities – it can identify a device as potentially dangerous and then hardware disconnect the USB port. The artificial neural network's learning functionality based on user behaviour patterns also allowed for personal identification without an active account, which has a positive impact on system security. An important feature of the system is also the ability to interact with the system remotely using the Telegram API.
{"title":"Intelligent System for Preventing Rubber Ducky Attacks Using Deep Learning Neural Networks","authors":"A. Tyutyunnik, A. Lazarev","doi":"10.1109/RusAutoCon52004.2021.9537497","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537497","url":null,"abstract":"At the present stage of development of hardware and software in the field of information technology an important place is occupied by information security, which implies the use of additional means to ensure secure processing of confidential data of end-users of target systems. The main problem, allocated in existing electronic computers, is insufficient protection of hardware ports from external influences. An example of such vulnerabilities is the USB Rubber Ducky hardware and software security solution from hak5 that exploits vulnerabilities by emulating peripherals to perform unauthorised actions on the target machine. Offensive Security's advanced, similar solutions allow complex target machine interception and remote control of the target machine, underscoring the urgency of the problem at hand. To solve this problem, an intelligent system was developed to evaluate and calculate the states of connected peripheral devices, in particular, to evaluate the comparability of input groups of peripheral device parameters. To improve security, a deep learning artificial neural network process was integrated into the implemented system. Based on user actions – software processing call speed, user errors and existing exploitation patterns of variant vulnerabilities – it can identify a device as potentially dangerous and then hardware disconnect the USB port. The artificial neural network's learning functionality based on user behaviour patterns also allowed for personal identification without an active account, which has a positive impact on system security. An important feature of the system is also the ability to interact with the system remotely using the Telegram API.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537470
A. Alzakkar, Ildar K. Ilyasov, L. Cuong, I. Valeev
The administration of power system has gotten more troublesome than before in light of the fact that power systems are worked nearer as far as possible, ecological requirements limit the development of transmission network, the requirement for significant distance power transfers has increased and less administrators are occupied with the management and activity of power systems. Voltage instability has become a significant worry in many power systems and numerous power outages have been accounted for, where the explanation has been voltage instability. In the current work, the electric voltage stability in Meharde station in Syria has concentrated during the typical and up ordinary loading state. The outcomes in this examination were getting from fake neural network, which is comprising from three layers (input-hidden-output), where this network described by the speed and accuracy in preparing before the failure and cease the providing engine which may prompt practical problems. This investigation has been done through two unique examples of generating in this station (single, double and four) generators. The accomplishment of this network comprises of two phases: preparing Stage (disconnected) and testing Stage (on-line) to make an examination between the preparation stage and testing stage which prompting optimization the load in testing cases relying upon preparing data.
{"title":"An Impact of Use the Artificial Neural Networks in Analysis of Electrical Power Stability at Meharde Plant (Hama-Syria)","authors":"A. Alzakkar, Ildar K. Ilyasov, L. Cuong, I. Valeev","doi":"10.1109/RusAutoCon52004.2021.9537470","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537470","url":null,"abstract":"The administration of power system has gotten more troublesome than before in light of the fact that power systems are worked nearer as far as possible, ecological requirements limit the development of transmission network, the requirement for significant distance power transfers has increased and less administrators are occupied with the management and activity of power systems. Voltage instability has become a significant worry in many power systems and numerous power outages have been accounted for, where the explanation has been voltage instability. In the current work, the electric voltage stability in Meharde station in Syria has concentrated during the typical and up ordinary loading state. The outcomes in this examination were getting from fake neural network, which is comprising from three layers (input-hidden-output), where this network described by the speed and accuracy in preparing before the failure and cease the providing engine which may prompt practical problems. This investigation has been done through two unique examples of generating in this station (single, double and four) generators. The accomplishment of this network comprises of two phases: preparing Stage (disconnected) and testing Stage (on-line) to make an examination between the preparation stage and testing stage which prompting optimization the load in testing cases relying upon preparing data.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125539940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-05DOI: 10.1109/RusAutoCon52004.2021.9537402
V. Taran, Aleksey V. Shandybin, Evgeniy Kislovskiy
The control of transport systems on alternating current is accompanied by switching, as a result of which many spectral components are formed. Spectral components pass through power circuits and excite electromagnetic waves in the surrounding space. The negative influence of these electromagnetic waves is observed in the form of currents and voltages induced on signaling, control and communication lines, as well as other infrastructure components of railway transport. Intelligent control systems for switching power plants of locomotives are proposed to be used to combat these phenomena. The suggested intelligent systems are based on the Volterra-Wiener series and quantum algorithms for the Fourier transform.
{"title":"Intellectualization of Methods for Reducing Electromagnetic Influences in Transport Systems","authors":"V. Taran, Aleksey V. Shandybin, Evgeniy Kislovskiy","doi":"10.1109/RusAutoCon52004.2021.9537402","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537402","url":null,"abstract":"The control of transport systems on alternating current is accompanied by switching, as a result of which many spectral components are formed. Spectral components pass through power circuits and excite electromagnetic waves in the surrounding space. The negative influence of these electromagnetic waves is observed in the form of currents and voltages induced on signaling, control and communication lines, as well as other infrastructure components of railway transport. Intelligent control systems for switching power plants of locomotives are proposed to be used to combat these phenomena. The suggested intelligent systems are based on the Volterra-Wiener series and quantum algorithms for the Fourier transform.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}