首页 > 最新文献

2021 International Russian Automation Conference (RusAutoCon)最新文献

英文 中文
Maximizing Power Factor for Controlling the Load of an Electricity Consumers’ Group by the Second Chance Algorithm 利用二次机会算法最大化电力用户群负荷控制的功率因数
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537489
A. P. Dimitriev, R. Bazhenov, L. Alekseeva
This paper dwells on the issues of improving the switching schedule quality for a group of power consumers when using a pulse-width method of power control. In this regard, the authors comment on a corresponding discrete optimization problem, which is one of the NP-complete problems. They also review the expression for the objective function used to optimize such schedules. The second chance algorithm that the authors offer is based on two algorithms proposed before: the algorithm for finding the initial selection sequence close to an optimum and the selection sequence optimization algorithm based on the simulated annealing and the multi-start method. This algorithm allows finding schedules in polynomial time that are relatively close to optimal schedules in terms of the objective function value. The authors study the influence of various parameters of the second chance algorithm on the average value of the objective function for the resulting schedule. It is experimentally shown that for all 10 used sets of initial data for scheduling, the proposed algorithm is more efficient than previously known algorithms.
本文研究了采用脉宽功率控制方法提高一组电力用户的开关调度质量的问题。在这方面,作者评论了一个相应的离散优化问题,这是np完全问题之一。他们还回顾了用于优化这些时间表的目标函数的表达式。第二次机会算法是在前人提出的两种算法的基础上提出的:一种是寻找接近最优的初始选择序列的算法,另一种是基于模拟退火和多起点法的选择序列优化算法。该算法允许在多项式时间内找到相对接近目标函数值的最优调度。研究了二次机会算法中各参数对最终调度目标函数平均值的影响。实验表明,对于所有10个用于调度的初始数据集,所提出的算法比以前已知的算法效率更高。
{"title":"Maximizing Power Factor for Controlling the Load of an Electricity Consumers’ Group by the Second Chance Algorithm","authors":"A. P. Dimitriev, R. Bazhenov, L. Alekseeva","doi":"10.1109/RusAutoCon52004.2021.9537489","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537489","url":null,"abstract":"This paper dwells on the issues of improving the switching schedule quality for a group of power consumers when using a pulse-width method of power control. In this regard, the authors comment on a corresponding discrete optimization problem, which is one of the NP-complete problems. They also review the expression for the objective function used to optimize such schedules. The second chance algorithm that the authors offer is based on two algorithms proposed before: the algorithm for finding the initial selection sequence close to an optimum and the selection sequence optimization algorithm based on the simulated annealing and the multi-start method. This algorithm allows finding schedules in polynomial time that are relatively close to optimal schedules in terms of the objective function value. The authors study the influence of various parameters of the second chance algorithm on the average value of the objective function for the resulting schedule. It is experimentally shown that for all 10 used sets of initial data for scheduling, the proposed algorithm is more efficient than previously known algorithms.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Associative Protected Spatio-Temporal Data 关联保护时空数据分析
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537478
E. Belashova, D. A. Gashigullin
Associative steganography is the method for protecting information using associative masking, which should be considered as a special case of the so-called screening method of historical steganography, when the hidden message is written on a stencil on a clean sheet, after which a meaningful text is formed with such an insert. This work is devoted to the analysis of associative protected spatio-temporal data. A software package was developed for the analysis of associative protected spatiotemporal data. Describes functions for the analysis of associative protected spatio-temporal data. Describes the software products that were used in this work. Describes the architecture and components of the software product that was developed in this work. The results of the developed software are presented. The estimation of the performance and scalability of the developed program product is presented.
关联隐写是一种利用关联掩蔽来保护信息的方法,它应该被认为是历史隐写的所谓筛选方法的一种特殊情况,将隐藏的信息写在一张干净的纸上的模板上,然后用这样的插入形成有意义的文本。这项工作致力于对关联保护的时空数据进行分析。开发了一个用于关联保护时空数据分析的软件包。描述分析关联保护时空数据的功能。描述在这项工作中使用的软件产品。描述在此工作中开发的软件产品的体系结构和组件。给出了开发软件的结果。对所开发的程序产品的性能和可扩展性进行了评估。
{"title":"Analysis of Associative Protected Spatio-Temporal Data","authors":"E. Belashova, D. A. Gashigullin","doi":"10.1109/RusAutoCon52004.2021.9537478","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537478","url":null,"abstract":"Associative steganography is the method for protecting information using associative masking, which should be considered as a special case of the so-called screening method of historical steganography, when the hidden message is written on a stencil on a clean sheet, after which a meaningful text is formed with such an insert. This work is devoted to the analysis of associative protected spatio-temporal data. A software package was developed for the analysis of associative protected spatiotemporal data. Describes functions for the analysis of associative protected spatio-temporal data. Describes the software products that were used in this work. Describes the architecture and components of the software product that was developed in this work. The results of the developed software are presented. The estimation of the performance and scalability of the developed program product is presented.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards More Efficient Emergency Power Systems in Low- and Medium-Voltage Distribution Grids 在低压和中压配电网中建立更高效的应急电力系统
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537367
P. Ilyushin, A. Kulikov
Emergency power systems (EPS) are there to ensure reliable electricity delivery to critical loads. EPS’s are activated when a grid or generation accident renders the centralized electric power system unable to deliver electricity, or when a power deficient occurs coupled with scheduled load-shedding (SLS). Currently, EPS and power restoration are controlled manually in most cases. The authors hereof have developed an automatic control system (ACS) for EPS that is capable of smoothly switching loads to the EPS automatically without interrupting electricity delivery. EPS is controlled from a control-room automated workstation (AWS); the AWS can be a PC or a mobile device and can use any kind of connectivity. This EPS ACS can offload the grid to an extent configured by the control-room staff over a few minutes without consumer outage. This solution would be effective for facilities that utilize multiple EPS’s, where use of high-capacity uninterrupted power supplies (UPS) is not feasible. The ACS will be most efficient for grid companies that operate numerous EPS’s scattered over a large area. This a versatile system that can work with various types of EPS from different manufacturers, although minimum technical requirements exist. The system can ensure reliable electricity delivery to critical loads in most operation situations.
应急电力系统(EPS)的存在是为了确保向关键负荷提供可靠的电力。当电网或发电事故导致集中电力系统无法供电时,或当电力短缺与计划减载(SLS)一起发生时,EPS就会启动。目前,大多数情况下,EPS和电源恢复都是手动控制的。本文作者开发了一种用于EPS的自动控制系统(ACS),该系统能够在不中断电力输送的情况下自动平稳地将负载切换到EPS。EPS由控制室自动化工作站(AWS)控制;AWS可以是PC或移动设备,可以使用任何类型的连接。这种EPS ACS可以在几分钟内将电网卸载到控制室工作人员配置的程度,而不会造成用户中断。这种解决方案对于使用多个EPS的设施是有效的,在这些设施中,使用高容量不间断电源(UPS)是不可行的。对于电网公司来说,ACS将是最有效的,因为它们在大片区域内分散着许多EPS。这是一个多功能系统,可以与不同制造商的各种类型的EPS一起工作,尽管存在最低的技术要求。在大多数运行情况下,该系统可确保对关键负载的可靠电力输送。
{"title":"Towards More Efficient Emergency Power Systems in Low- and Medium-Voltage Distribution Grids","authors":"P. Ilyushin, A. Kulikov","doi":"10.1109/RusAutoCon52004.2021.9537367","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537367","url":null,"abstract":"Emergency power systems (EPS) are there to ensure reliable electricity delivery to critical loads. EPS’s are activated when a grid or generation accident renders the centralized electric power system unable to deliver electricity, or when a power deficient occurs coupled with scheduled load-shedding (SLS). Currently, EPS and power restoration are controlled manually in most cases. The authors hereof have developed an automatic control system (ACS) for EPS that is capable of smoothly switching loads to the EPS automatically without interrupting electricity delivery. EPS is controlled from a control-room automated workstation (AWS); the AWS can be a PC or a mobile device and can use any kind of connectivity. This EPS ACS can offload the grid to an extent configured by the control-room staff over a few minutes without consumer outage. This solution would be effective for facilities that utilize multiple EPS’s, where use of high-capacity uninterrupted power supplies (UPS) is not feasible. The ACS will be most efficient for grid companies that operate numerous EPS’s scattered over a large area. This a versatile system that can work with various types of EPS from different manufacturers, although minimum technical requirements exist. The system can ensure reliable electricity delivery to critical loads in most operation situations.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twins as a Key Technology for Ensuring Effective Modernization of Complex Industrial Systems 数字孪生是保证复杂工业系统有效现代化的关键技术
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537443
Alexy Poletikin, V. Promyslov, K. Semenkov
The paper considers the problem of the operation maintenance of complex soft- and hardware systems, for example, automated control systems of industrial objects, when individual components of the system become unavailable for replacement in case of their failure or for other reasons. When the replacement components differ from those that were designed at the system creation stage, the upgrade task arises. System upgrades require a complete cycle of work on validating both the replaceable components and the changed system itself. The system itself, if it is included in the life cycle of an existing industrial object, actually cannot be used as a testbed of the new components; generally, full-size system layouts are used for the testbed, and the complexity of those layouts may be comparable to the system itself. The inclusion of the digital twin in the life cycle of the object and its control system allows to effectively solve the problem of system modification (individual components replacement) in this case. The digital twin is not only a cheaper analog of the system that can be used for testing; due to the properties that allow parallel testing for several copies and to influence the model time within certain limits, it provides a higher quality of testing.
本文考虑了复杂的软、硬件系统的运行维护问题,例如,工业对象的自动控制系统,当系统的单个组件因故障或其他原因而无法更换时。当替换组件与系统创建阶段设计的组件不同时,就会出现升级任务。系统升级需要一个完整的工作周期来验证可替换的组件和已更改的系统本身。系统本身,如果包含在现有工业对象的生命周期中,实际上不能用作新组件的测试平台;通常,全尺寸的系统布局用于测试平台,并且这些布局的复杂性可能与系统本身相当。将数字孪生体包含在对象及其控制系统的生命周期中,可以有效地解决这种情况下的系统修改(单个部件更换)问题。数字孪生不仅是一个更便宜的模拟系统,可以用于测试;由于允许对多个副本进行并行测试并在一定范围内影响模型时间的特性,它提供了更高质量的测试。
{"title":"Digital Twins as a Key Technology for Ensuring Effective Modernization of Complex Industrial Systems","authors":"Alexy Poletikin, V. Promyslov, K. Semenkov","doi":"10.1109/RusAutoCon52004.2021.9537443","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537443","url":null,"abstract":"The paper considers the problem of the operation maintenance of complex soft- and hardware systems, for example, automated control systems of industrial objects, when individual components of the system become unavailable for replacement in case of their failure or for other reasons. When the replacement components differ from those that were designed at the system creation stage, the upgrade task arises. System upgrades require a complete cycle of work on validating both the replaceable components and the changed system itself. The system itself, if it is included in the life cycle of an existing industrial object, actually cannot be used as a testbed of the new components; generally, full-size system layouts are used for the testbed, and the complexity of those layouts may be comparable to the system itself. The inclusion of the digital twin in the life cycle of the object and its control system allows to effectively solve the problem of system modification (individual components replacement) in this case. The digital twin is not only a cheaper analog of the system that can be used for testing; due to the properties that allow parallel testing for several copies and to influence the model time within certain limits, it provides a higher quality of testing.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method for Identifying Potential Internal Violators Based on the Analysis of the Tone of Messages from Users of Social Networks 基于社交网络用户信息语气分析的潜在内部违规者识别方法
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537338
A. Martyshkin, D. Pashchenko
The purpose of the work is to study social network users as potential internal violators through the analysis of the tonality of text messages. To achieve the goal, the following tasks have been set and solved: 1) Determine the basics of sentiment analysis for text messages; 2) Highlight the lack of existing methods for identifying internal violators; 3) Propose and develop a preventive method for identifying potential internal violators based on the analysis of the sentiment of text messages. An analysis of the subject area of the study was carried out, which included a review of existing methods for identifying insiders. The paper analyzes internal violators with the identification of potential ones, and also considers the means of processing natural languages and identifies approaches to the classification of the tonality of the text.. The article solves the problem of developing a method for identifying potential internal offenders, based on the analysis of the sentiment of text messages. An analysis was made of the funds allocated and the methods that are appropriate to achieve the research objective. The developed method is described. As a result of the study, a method was proposed that allows one to identify potential internal offenders by analyzing the sentiment of their text messages on social networks.
这项工作的目的是通过分析短信的调性来研究社交网络用户作为潜在的内部违规者。为实现这一目标,设置并解决了以下任务:1)确定短信情感分析的基础;2)强调缺乏现有的识别内部违规者的方法;3)基于对短信情感的分析,提出并开发一种识别潜在内部违规者的预防方法。对研究的主题领域进行了分析,其中包括对识别内部人员的现有方法的审查。本文对内部违规者进行了分析,并对潜在违规者进行了识别,同时对自然语言的处理方法和文本调性分类方法进行了探讨。本文在分析短信情感的基础上,解决了开发一种识别潜在内部违规者的方法的问题。分析了分配的资金和适合实现研究目标的方法。介绍了所开发的方法。研究结果提出了一种方法,可以通过分析社交网络上短信的情绪来识别潜在的内部犯罪者。
{"title":"A Method for Identifying Potential Internal Violators Based on the Analysis of the Tone of Messages from Users of Social Networks","authors":"A. Martyshkin, D. Pashchenko","doi":"10.1109/RusAutoCon52004.2021.9537338","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537338","url":null,"abstract":"The purpose of the work is to study social network users as potential internal violators through the analysis of the tonality of text messages. To achieve the goal, the following tasks have been set and solved: 1) Determine the basics of sentiment analysis for text messages; 2) Highlight the lack of existing methods for identifying internal violators; 3) Propose and develop a preventive method for identifying potential internal violators based on the analysis of the sentiment of text messages. An analysis of the subject area of the study was carried out, which included a review of existing methods for identifying insiders. The paper analyzes internal violators with the identification of potential ones, and also considers the means of processing natural languages and identifies approaches to the classification of the tonality of the text.. The article solves the problem of developing a method for identifying potential internal offenders, based on the analysis of the sentiment of text messages. An analysis was made of the funds allocated and the methods that are appropriate to achieve the research objective. The developed method is described. As a result of the study, a method was proposed that allows one to identify potential internal offenders by analyzing the sentiment of their text messages on social networks.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Superpixel Clustering Superpixel集群
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537461
M. Kharinov
This paper offers the simplest understanding of superpixels as maximal pixel clusters providing error-free obtaining of a limited sequence of accessible optimal piecewise constant image approximations with the minimum achievable approximation error (total squared error) E for each number of pixel clusters. The superpixel hierarchy is generated by the intersection of optimal image partitions into an increasing number of clusters g. It is irregular and differs markedly from the non-hierarchical sequence of optimal approximations, since described by a non-convex dependence of the approximation error E on the cluster number g. Therefore, the task of hierarchical superpixel clustering is posed and solved, which is briefly described in the paper.
本文提供了对超像素的最简单理解,即最大的像素集群,为每个像素集群提供了可获得的最小逼近误差(总平方误差)E的有限序列的最佳分段常数图像近似的无误差获取。超像素分层是由最优图像分割成越来越多的聚类g的交集产生的。它是不规则的,与非分层的最优逼近序列有明显的不同,因为近似误差E与聚类数g的非凸依赖关系。因此,提出并解决了分层超像素聚类的任务,本文对此进行了简要描述。
{"title":"Superpixel Clustering","authors":"M. Kharinov","doi":"10.1109/RusAutoCon52004.2021.9537461","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537461","url":null,"abstract":"This paper offers the simplest understanding of superpixels as maximal pixel clusters providing error-free obtaining of a limited sequence of accessible optimal piecewise constant image approximations with the minimum achievable approximation error (total squared error) E for each number of pixel clusters. The superpixel hierarchy is generated by the intersection of optimal image partitions into an increasing number of clusters g. It is irregular and differs markedly from the non-hierarchical sequence of optimal approximations, since described by a non-convex dependence of the approximation error E on the cluster number g. Therefore, the task of hierarchical superpixel clustering is posed and solved, which is briefly described in the paper.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116784761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of a Wind Turbine with Wound Rotor Asynchronous Machine 风力发电机绕线转子异步电机分析
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537554
K. Charafeddine, Y. Ryzhkova, S. Tsyruk
Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the analysis of an asynchronous generator connected to wind turbines, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been eveloped to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.
目前,风能在世界上占有重要地位,这导致对风力发电机的需求显著增加。廉价的能量转换器、快速的微处理器和技术过程的自动控制,使得生产一种高科技的风力涡轮机成为可能,这种涡轮机可以在电力系统中有效地工作,也可以在偏僻的偏远地区工作。本文讨论了一种与风力发电机组连接的异步发电机的分析,通过数学建模和实验工作的结果验证,提高了风力发电机组的性能。此外,还开发了一种基于转子电路中的附加电阻并使用电压整流器和斩波器来控制绕组转子发电机转速的方法。获得了不同转子电阻值下感应发电机的转矩-转速特性,同样,通过俯仰角控制获得了功率为1500瓦的水轮机的转矩-转速特性。
{"title":"Analysis of a Wind Turbine with Wound Rotor Asynchronous Machine","authors":"K. Charafeddine, Y. Ryzhkova, S. Tsyruk","doi":"10.1109/RusAutoCon52004.2021.9537554","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537554","url":null,"abstract":"Currently, wind energy occupies an important position in the world, which leads to a significant increase in the demand for wind turbines. Inexpensive power converters of energy, fast microprocessors, and automatic control of technological processes have made it possible to produce a high-tech wind turbine that can work efficiently in the power system, as well as in isolated remote areas. This article discusses the analysis of an asynchronous generator connected to wind turbines, which has improved the performance of the turbine through mathematical modeling and confirmation of the results by experimental work. Also, a method has been eveloped to control the rotational speed of a generator with a wound rotor, based on the additional resistance in the rotor circuit and using a voltage rectifier and a chopper. The torque-speed characteristics of the induction generator were obtained for different rotor resistance values and similarly, characteristics of a turbine with a power of 1500 watts were obtained by pitch angle control.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent System for Preventing Rubber Ducky Attacks Using Deep Learning Neural Networks 基于深度学习神经网络的防橡皮鸭攻击智能系统
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537497
A. Tyutyunnik, A. Lazarev
At the present stage of development of hardware and software in the field of information technology an important place is occupied by information security, which implies the use of additional means to ensure secure processing of confidential data of end-users of target systems. The main problem, allocated in existing electronic computers, is insufficient protection of hardware ports from external influences. An example of such vulnerabilities is the USB Rubber Ducky hardware and software security solution from hak5 that exploits vulnerabilities by emulating peripherals to perform unauthorised actions on the target machine. Offensive Security's advanced, similar solutions allow complex target machine interception and remote control of the target machine, underscoring the urgency of the problem at hand. To solve this problem, an intelligent system was developed to evaluate and calculate the states of connected peripheral devices, in particular, to evaluate the comparability of input groups of peripheral device parameters. To improve security, a deep learning artificial neural network process was integrated into the implemented system. Based on user actions – software processing call speed, user errors and existing exploitation patterns of variant vulnerabilities – it can identify a device as potentially dangerous and then hardware disconnect the USB port. The artificial neural network's learning functionality based on user behaviour patterns also allowed for personal identification without an active account, which has a positive impact on system security. An important feature of the system is also the ability to interact with the system remotely using the Telegram API.
在信息技术领域的硬件和软件发展的现阶段,信息安全占据了重要的地位,这意味着使用额外的手段来确保目标系统的最终用户的机密数据的安全处理。现有电子计算机的主要问题是硬件端口不受外部影响的保护不足。这种漏洞的一个例子是来自hak5的USB Rubber Ducky硬件和软件安全解决方案,它通过模拟外围设备来利用漏洞在目标机器上执行未经授权的操作。Offensive Security的先进、类似的解决方案允许复杂的目标机拦截和远程控制目标机,强调了手头问题的紧迫性。为了解决这一问题,开发了一个智能系统来评估和计算连接外围设备的状态,特别是评估外围设备参数输入组的可比性。为了提高安全性,将深度学习人工神经网络过程集成到所实现的系统中。基于用户行为——软件处理调用速度、用户错误和现有的各种漏洞利用模式——它可以识别出有潜在危险的设备,然后从硬件上断开USB端口。人工神经网络基于用户行为模式的学习功能也允许在没有活跃账户的情况下进行个人识别,这对系统安全性具有积极影响。该系统的一个重要特性是能够使用Telegram API与系统进行远程交互。
{"title":"Intelligent System for Preventing Rubber Ducky Attacks Using Deep Learning Neural Networks","authors":"A. Tyutyunnik, A. Lazarev","doi":"10.1109/RusAutoCon52004.2021.9537497","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537497","url":null,"abstract":"At the present stage of development of hardware and software in the field of information technology an important place is occupied by information security, which implies the use of additional means to ensure secure processing of confidential data of end-users of target systems. The main problem, allocated in existing electronic computers, is insufficient protection of hardware ports from external influences. An example of such vulnerabilities is the USB Rubber Ducky hardware and software security solution from hak5 that exploits vulnerabilities by emulating peripherals to perform unauthorised actions on the target machine. Offensive Security's advanced, similar solutions allow complex target machine interception and remote control of the target machine, underscoring the urgency of the problem at hand. To solve this problem, an intelligent system was developed to evaluate and calculate the states of connected peripheral devices, in particular, to evaluate the comparability of input groups of peripheral device parameters. To improve security, a deep learning artificial neural network process was integrated into the implemented system. Based on user actions – software processing call speed, user errors and existing exploitation patterns of variant vulnerabilities – it can identify a device as potentially dangerous and then hardware disconnect the USB port. The artificial neural network's learning functionality based on user behaviour patterns also allowed for personal identification without an active account, which has a positive impact on system security. An important feature of the system is also the ability to interact with the system remotely using the Telegram API.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Impact of Use the Artificial Neural Networks in Analysis of Electrical Power Stability at Meharde Plant (Hama-Syria) 人工神经网络在哈马-叙利亚电厂电力稳定性分析中的应用
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537470
A. Alzakkar, Ildar K. Ilyasov, L. Cuong, I. Valeev
The administration of power system has gotten more troublesome than before in light of the fact that power systems are worked nearer as far as possible, ecological requirements limit the development of transmission network, the requirement for significant distance power transfers has increased and less administrators are occupied with the management and activity of power systems. Voltage instability has become a significant worry in many power systems and numerous power outages have been accounted for, where the explanation has been voltage instability. In the current work, the electric voltage stability in Meharde station in Syria has concentrated during the typical and up ordinary loading state. The outcomes in this examination were getting from fake neural network, which is comprising from three layers (input-hidden-output), where this network described by the speed and accuracy in preparing before the failure and cease the providing engine which may prompt practical problems. This investigation has been done through two unique examples of generating in this station (single, double and four) generators. The accomplishment of this network comprises of two phases: preparing Stage (disconnected) and testing Stage (on-line) to make an examination between the preparation stage and testing stage which prompting optimization the load in testing cases relying upon preparing data.
由于电力系统的工作距离越来越近,生态要求限制了输电网络的发展,对远距离输电的要求越来越高,从事电力系统管理和活动的管理人员越来越少,使得电力系统的管理变得比以前更加麻烦。电压不稳定已经成为许多电力系统的一个重大担忧,许多停电已经被解释为电压不稳定。在目前的工作中,叙利亚Meharde电站的电压稳定主要集中在典型和上普通负荷状态。该网络由三层(输入-隐藏-输出)组成,其中该网络描述了故障前准备的速度和准确性,并停止了可能提示实际问题的提供引擎。本研究是通过该站的两个独特的发电实例(单、双、四)来完成的。该网络的完成分为准备阶段(不连接)和测试阶段(在线)两个阶段,在准备阶段和测试阶段之间进行检查,根据准备数据优化测试用例中的负载。
{"title":"An Impact of Use the Artificial Neural Networks in Analysis of Electrical Power Stability at Meharde Plant (Hama-Syria)","authors":"A. Alzakkar, Ildar K. Ilyasov, L. Cuong, I. Valeev","doi":"10.1109/RusAutoCon52004.2021.9537470","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537470","url":null,"abstract":"The administration of power system has gotten more troublesome than before in light of the fact that power systems are worked nearer as far as possible, ecological requirements limit the development of transmission network, the requirement for significant distance power transfers has increased and less administrators are occupied with the management and activity of power systems. Voltage instability has become a significant worry in many power systems and numerous power outages have been accounted for, where the explanation has been voltage instability. In the current work, the electric voltage stability in Meharde station in Syria has concentrated during the typical and up ordinary loading state. The outcomes in this examination were getting from fake neural network, which is comprising from three layers (input-hidden-output), where this network described by the speed and accuracy in preparing before the failure and cease the providing engine which may prompt practical problems. This investigation has been done through two unique examples of generating in this station (single, double and four) generators. The accomplishment of this network comprises of two phases: preparing Stage (disconnected) and testing Stage (on-line) to make an examination between the preparation stage and testing stage which prompting optimization the load in testing cases relying upon preparing data.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125539940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectualization of Methods for Reducing Electromagnetic Influences in Transport Systems 减少运输系统电磁影响方法的智能化
Pub Date : 2021-09-05 DOI: 10.1109/RusAutoCon52004.2021.9537402
V. Taran, Aleksey V. Shandybin, Evgeniy Kislovskiy
The control of transport systems on alternating current is accompanied by switching, as a result of which many spectral components are formed. Spectral components pass through power circuits and excite electromagnetic waves in the surrounding space. The negative influence of these electromagnetic waves is observed in the form of currents and voltages induced on signaling, control and communication lines, as well as other infrastructure components of railway transport. Intelligent control systems for switching power plants of locomotives are proposed to be used to combat these phenomena. The suggested intelligent systems are based on the Volterra-Wiener series and quantum algorithms for the Fourier transform.
传输系统对交流电流的控制伴随着开关,因此形成了许多频谱分量。频谱成分通过电源电路,激发周围空间的电磁波。这些电磁波的负面影响表现为对信号、控制和通信线路以及铁路运输的其他基础设施组成部分产生的电流和电压。针对这些现象,提出了机车开关动力装置的智能控制系统。建议的智能系统基于Volterra-Wiener级数和傅立叶变换的量子算法。
{"title":"Intellectualization of Methods for Reducing Electromagnetic Influences in Transport Systems","authors":"V. Taran, Aleksey V. Shandybin, Evgeniy Kislovskiy","doi":"10.1109/RusAutoCon52004.2021.9537402","DOIUrl":"https://doi.org/10.1109/RusAutoCon52004.2021.9537402","url":null,"abstract":"The control of transport systems on alternating current is accompanied by switching, as a result of which many spectral components are formed. Spectral components pass through power circuits and excite electromagnetic waves in the surrounding space. The negative influence of these electromagnetic waves is observed in the form of currents and voltages induced on signaling, control and communication lines, as well as other infrastructure components of railway transport. Intelligent control systems for switching power plants of locomotives are proposed to be used to combat these phenomena. The suggested intelligent systems are based on the Volterra-Wiener series and quantum algorithms for the Fourier transform.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Russian Automation Conference (RusAutoCon)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1