首页 > 最新文献

2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)最新文献

英文 中文
Machine learning in electric power systems adequacy assessment using Monte-Carlo method 蒙特卡罗方法在电力系统充分性评估中的机器学习
Boyarkin Denis, Krupenev Dmitriy, I. Dmitriy, Sidorov Denis
This paper deals with the computational efficiency related problem appearing in electric power systems adequacy assessment using Monte-Carlo method. To attack this problem the novel method is suggested to reduce number of random states to be analyzed. The machine learning methods are employed for electric power system states precalculated classification. Random forest and support vector machine methods are proposed to use for solving this problem. Efficiency of proposed approach is demonstrated on test scheme.
本文讨论了用蒙特卡罗方法进行电力系统充分性评估时出现的计算效率问题。为了解决这个问题,提出了一种新的方法来减少需要分析的随机状态的数量。采用机器学习方法对电力系统状态进行预估分类。提出了随机森林和支持向量机方法来解决这一问题。试验方案验证了该方法的有效性。
{"title":"Machine learning in electric power systems adequacy assessment using Monte-Carlo method","authors":"Boyarkin Denis, Krupenev Dmitriy, I. Dmitriy, Sidorov Denis","doi":"10.1109/SIBIRCON.2017.8109871","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109871","url":null,"abstract":"This paper deals with the computational efficiency related problem appearing in electric power systems adequacy assessment using Monte-Carlo method. To attack this problem the novel method is suggested to reduce number of random states to be analyzed. The machine learning methods are employed for electric power system states precalculated classification. Random forest and support vector machine methods are proposed to use for solving this problem. Efficiency of proposed approach is demonstrated on test scheme.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Q-hypernets as a new model of dynamical multi-layer networks q -超网络作为动态多层网络的一种新模型
A. Rodionov
New model of multi-layer service network is discussed in the paper. Each server or any group of servers of a given layer of an hierarchical queuing network may be a customer in queuing systems of next layer. Conception of hypernet uses for representing structure of such multi-layer network, which we name as Q-hypernet. Some typical cases of Q-hypernet with possible applications are discussed along with possible enhancement of the concept.
本文讨论了一种新的多层业务网络模型。分层排队网络中某一层的每台服务器或任意一组服务器都可能是下一层排队系统中的客户。使用超网络的概念来表示这种多层网络的结构,我们称之为q -超网络。讨论了q -超网络的一些典型案例及其可能的应用,并对该概念进行了可能的改进。
{"title":"Q-hypernets as a new model of dynamical multi-layer networks","authors":"A. Rodionov","doi":"10.1109/SIBIRCON.2017.8109826","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109826","url":null,"abstract":"New model of multi-layer service network is discussed in the paper. Each server or any group of servers of a given layer of an hierarchical queuing network may be a customer in queuing systems of next layer. Conception of hypernet uses for representing structure of such multi-layer network, which we name as Q-hypernet. Some typical cases of Q-hypernet with possible applications are discussed along with possible enhancement of the concept.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the distinguishing attack to lightweight block ciphers 鉴别攻击在轻量级分组密码中的应用
B. Ryabko, A. Soskov
By definition, a distinguishing attack is any test that allows distinguishing the encrypted data from random data and modern symmetric-key ciphers must be immune to such an attack. In other words, modern block ciphers are designed to have ciphertext indistinguishability. If an algorithm that can distinguish the cipher output from random faster than a brute force search is found, then that is considered a break of the cipher. We applied the distinguishing attack to modern lightweight block ciphers Speck, Simon, Simeck, HIGHT and LEA using statistical test “Book Stack”. We experimentally found a minimal number of rounds where encrypted data looked like random bit-sequence. It is shown, that this number of rounds varies significantly for different ciphers. In particular, our experiments and estimations show that cipher Simeck48/96 is not immune to distinguishing attack.
根据定义,区分攻击是任何允许将加密数据与随机数据区分开来的测试,现代对称密钥密码必须不受此类攻击的影响。换句话说,现代分组密码被设计成具有密文不可区分性。如果找到了一种算法,可以比暴力搜索更快地区分密码输出和随机输出,那么就认为这是密码的破解。我们使用统计测试“Book Stack”将区别攻击应用于现代轻量级分组密码Speck, Simon, Simeck, ight和LEA。我们通过实验找到了加密数据看起来像随机位序列的最小轮数。可以看出,这个轮数对于不同的密码有很大的不同。特别是,我们的实验和估计表明,密码Simeck48/96不能免疫识别攻击。
{"title":"Application of the distinguishing attack to lightweight block ciphers","authors":"B. Ryabko, A. Soskov","doi":"10.1109/SIBIRCON.2017.8109901","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109901","url":null,"abstract":"By definition, a distinguishing attack is any test that allows distinguishing the encrypted data from random data and modern symmetric-key ciphers must be immune to such an attack. In other words, modern block ciphers are designed to have ciphertext indistinguishability. If an algorithm that can distinguish the cipher output from random faster than a brute force search is found, then that is considered a break of the cipher. We applied the distinguishing attack to modern lightweight block ciphers Speck, Simon, Simeck, HIGHT and LEA using statistical test “Book Stack”. We experimentally found a minimal number of rounds where encrypted data looked like random bit-sequence. It is shown, that this number of rounds varies significantly for different ciphers. In particular, our experiments and estimations show that cipher Simeck48/96 is not immune to distinguishing attack.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The algorithm for elimination of data redundancy in hydraulic fracturing monitoring systems 水力压裂监测系统中数据冗余的消除算法
Eugeniiy V. Rabinovich, P. I. Vaynmaster
The important stage in the monitoring of hydraulic fracturing is construction of a graphical model of a fractured area. However, real data recorded in the process of hydraulic fracturing are characterized by a high intensity of seismic activity in the monitoring area, which makes it difficult to correctly construct such a model. The original algorithm is described, which allows one to eliminate the redundancy of miscroseismic sources and to highlight the local hypocenters of microearthquakes. The results obtained were used to construct a three-dimensional graphical model of a fracture.
水力压裂监测的重要环节是建立裂缝区域的图形模型。然而,在水力压裂过程中记录的真实数据具有监测区域地震活动强度大的特点,这给正确构建水力压裂模型带来了困难。描述了原始算法,该算法可以消除微震源的冗余并突出微震的局部震源。所得到的结果被用来构建一个三维图形模型的骨折。
{"title":"The algorithm for elimination of data redundancy in hydraulic fracturing monitoring systems","authors":"Eugeniiy V. Rabinovich, P. I. Vaynmaster","doi":"10.1109/SIBIRCON.2017.8109866","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109866","url":null,"abstract":"The important stage in the monitoring of hydraulic fracturing is construction of a graphical model of a fractured area. However, real data recorded in the process of hydraulic fracturing are characterized by a high intensity of seismic activity in the monitoring area, which makes it difficult to correctly construct such a model. The original algorithm is described, which allows one to eliminate the redundancy of miscroseismic sources and to highlight the local hypocenters of microearthquakes. The results obtained were used to construct a three-dimensional graphical model of a fracture.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1/2-Approximation polynomial-time algorithm for a problem of searching a subset 子集搜索问题的1/2逼近多项式时间算法
A. Ageev, A. Kel'manov, A. Pyatkin, S. Khamidullin, Vladimir Shenmaier
The work considers the mathematical aspects of one of the most fundamental problems of data analysis: search (choice) among a collection of objects for a subset of similar ones. In particular, the problem appears in connection with data editing and cleaning (removal of irrelevant (not similar) elements). We consider the model of this problem, i.e., the problem of searching for a subset of largest cardinality in a finite set of points of the Euclidean space for which quadratic variation of points with respect to its unknown centroid does not exceed a given fraction of the quadratic variation of points of the input set with respect to its centroid. It is proved that the problem is strongly NP-hard. A polynomial-time 1/2-approximation algorithm is proposed. The results of the numerical simulation demonstrating the effectiveness of the algorithm are presented.
这项工作考虑了数据分析中最基本问题之一的数学方面:在一组对象中搜索(选择)相似对象的子集。特别是,这个问题出现在数据编辑和清理(删除不相关(不相似)的元素)方面。我们考虑这个问题的模型,即在欧几里德空间的有限点集中寻找最大基数的子集的问题,其中点相对于其未知质心的二次变分不超过输入集的点相对于其质心的二次变分的给定分数。证明了该问题是强np困难的。提出了一种多项式时间1/2逼近算法。最后给出了数值仿真结果,验证了该算法的有效性。
{"title":"1/2-Approximation polynomial-time algorithm for a problem of searching a subset","authors":"A. Ageev, A. Kel'manov, A. Pyatkin, S. Khamidullin, Vladimir Shenmaier","doi":"10.1109/SIBIRCON.2017.8109827","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109827","url":null,"abstract":"The work considers the mathematical aspects of one of the most fundamental problems of data analysis: search (choice) among a collection of objects for a subset of similar ones. In particular, the problem appears in connection with data editing and cleaning (removal of irrelevant (not similar) elements). We consider the model of this problem, i.e., the problem of searching for a subset of largest cardinality in a finite set of points of the Euclidean space for which quadratic variation of points with respect to its unknown centroid does not exceed a given fraction of the quadratic variation of points of the input set with respect to its centroid. It is proved that the problem is strongly NP-hard. A polynomial-time 1/2-approximation algorithm is proposed. The results of the numerical simulation demonstrating the effectiveness of the algorithm are presented.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometrie and information technologies in clinical and experimental MRI 临床和实验MRI中的生物计量和信息技术
A. Letyagin
Biometric Technologies in MRI: MRI can be considered as the verification / authentication system has a 1st part — sensor, 2nd part — pre-processing, 3d part — feature extractor. The goal is to identify and verify the biomarker / biomarkers of a typical pathology (edema, cyst, scarring, swelling, hemorrhage, fracture, etc.) as the basis for diagnosing the disease. Information Technologies in MRI: application of computers and computer networks for storing, studying, retrieving, transmitting and processing (manipulation) data or information in the context of medical diagnostics. The goal is to track the course of the disease, to ensure the completeness of information about the dynamics of the state of the body, as a basis for risk indicators and an adequate prognosis of the disease.
MRI中的生物识别技术:MRI可以被认为是具有第一部分-传感器,第二部分-预处理,第三部分-特征提取器的验证/认证系统。目标是识别和验证典型病理(水肿、囊肿、瘢痕、肿胀、出血、骨折等)的生物标志物/生物标志物,作为诊断疾病的基础。核磁共振成像中的信息技术:应用计算机和计算机网络来存储、研究、检索、传输和处理(操纵)医学诊断中的数据或信息。目标是跟踪疾病的病程,以确保关于身体状态动态的信息的完整性,作为风险指标和疾病适当预后的基础。
{"title":"Biometrie and information technologies in clinical and experimental MRI","authors":"A. Letyagin","doi":"10.1109/sibircon.2017.8109883","DOIUrl":"https://doi.org/10.1109/sibircon.2017.8109883","url":null,"abstract":"Biometric Technologies in MRI: MRI can be considered as the verification / authentication system has a 1st part — sensor, 2nd part — pre-processing, 3d part — feature extractor. The goal is to identify and verify the biomarker / biomarkers of a typical pathology (edema, cyst, scarring, swelling, hemorrhage, fracture, etc.) as the basis for diagnosing the disease. Information Technologies in MRI: application of computers and computer networks for storing, studying, retrieving, transmitting and processing (manipulation) data or information in the context of medical diagnostics. The goal is to track the course of the disease, to ensure the completeness of information about the dynamics of the state of the body, as a basis for risk indicators and an adequate prognosis of the disease.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of crossover and mutation coefficients on GA optimization of ultrashort pulse duration by criteria of peak voltage maximization in PCB bus 基于峰值电压最大化准则的交叉和突变系数对超短脉冲持续时间遗传优化的影响
R. Gazizov, R. S. Ryabov, T. T. Gazizov
Importance of genetic algorithms (GA) usage in the investigation of an ultrashort pulse peak voltage in multiconductor structures of printed circuit boards (PCB) is highlighted. Trapezoidal ultrashort pulse propagation along the conductors of real PCB multiconductor bus was simulated. With the usage of GA, an optimization of the rise, top and fall durations of the ultrashort pulse was made by criteria of peak voltage maximization in the PCB bus. The optimization was launched with the following parameters: the number of chromosomes in population — 5; the number of populations — 26; mutation coefficients — 0.01, 0.03, 0.05 and 0.08 when the crossover coefficient was 0.5; crossover coefficients — 0.1, 0.3, 0.5 and 0.8 when the mutation coefficient was 0.1. A voltage maximum by 38% exceeding the steady state level is revealed and localized with variation of ultrashort rise, top and fall durations when the whole ultrashort pulse duration was near 1.5 ns. An influence of mutation and crossover coefficients variation on the obtained results convergence is shown.
强调了遗传算法在研究印刷电路板(PCB)多导体结构中超短脉冲峰值电压中的重要性。对实际PCB多导体母线的梯形超短脉冲传输进行了仿真。利用遗传算法,以PCB总线的峰值电压最大化为准则,对超短脉冲的上升、顶部和下降持续时间进行了优化。优化开始时使用以下参数:种群中染色体数- 5;人口数量- 26;交叉系数为0.5时,变异系数分别为0.01、0.03、0.05和0.08;突变系数为0.1时,交叉系数分别为0.1、0.3、0.5和0.8。当整个超短脉冲持续时间接近1.5 ns时,随着超短上升、顶部和下降持续时间的变化,出现了超过稳态水平38%的电压最大值。说明了突变系数和交叉系数的变化对所得结果收敛性的影响。
{"title":"Influence of crossover and mutation coefficients on GA optimization of ultrashort pulse duration by criteria of peak voltage maximization in PCB bus","authors":"R. Gazizov, R. S. Ryabov, T. T. Gazizov","doi":"10.1109/SIBIRCON.2017.8109919","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109919","url":null,"abstract":"Importance of genetic algorithms (GA) usage in the investigation of an ultrashort pulse peak voltage in multiconductor structures of printed circuit boards (PCB) is highlighted. Trapezoidal ultrashort pulse propagation along the conductors of real PCB multiconductor bus was simulated. With the usage of GA, an optimization of the rise, top and fall durations of the ultrashort pulse was made by criteria of peak voltage maximization in the PCB bus. The optimization was launched with the following parameters: the number of chromosomes in population — 5; the number of populations — 26; mutation coefficients — 0.01, 0.03, 0.05 and 0.08 when the crossover coefficient was 0.5; crossover coefficients — 0.1, 0.3, 0.5 and 0.8 when the mutation coefficient was 0.1. A voltage maximum by 38% exceeding the steady state level is revealed and localized with variation of ultrashort rise, top and fall durations when the whole ultrashort pulse duration was near 1.5 ns. An influence of mutation and crossover coefficients variation on the obtained results convergence is shown.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anomaly detection: An overview of selected methods 异常检测:所选方法的概述
C. Callegari, S. Giordano, M. Pagano
Detecting anomalous traffic (and above all new ad-hoc attacks) with low false alarm rates is of primary interest in IP networks management. To this aim a key research topic in network security is represented by anomaly-based IDSs (Intrusion Detection Systems) thanks to their ability to face unknown attacks. Starting from more than a decade of research experience by the authors, the aim of this paper is to revise some of the most promising statistical approaches, namely Wavelets, Principal Component Analysis, CUSUM (cumulative sum control chart) and Information Theoretical methods (based on different definitions of the Entropy). Moreover, issues related to the choice of the relevant traffic parameters, use of sketches and availability of dataset for performance comparison are also discussed to highlight the main problems in intrusion detection.
以低误报率检测异常流量(以及所有新的ad-hoc攻击)是IP网络管理的主要兴趣。为了实现这一目标,基于异常的入侵检测系统(ids)是网络安全的一个关键研究课题,因为它们能够面对未知的攻击。从作者十多年的研究经验出发,本文的目的是修订一些最有前途的统计方法,即小波,主成分分析,CUSUM(累积和控制图)和信息论方法(基于熵的不同定义)。此外,还讨论了与相关流量参数的选择、草图的使用和数据集的可用性进行性能比较有关的问题,以突出入侵检测中的主要问题。
{"title":"Anomaly detection: An overview of selected methods","authors":"C. Callegari, S. Giordano, M. Pagano","doi":"10.1109/SIBIRCON.2017.8109836","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109836","url":null,"abstract":"Detecting anomalous traffic (and above all new ad-hoc attacks) with low false alarm rates is of primary interest in IP networks management. To this aim a key research topic in network security is represented by anomaly-based IDSs (Intrusion Detection Systems) thanks to their ability to face unknown attacks. Starting from more than a decade of research experience by the authors, the aim of this paper is to revise some of the most promising statistical approaches, namely Wavelets, Principal Component Analysis, CUSUM (cumulative sum control chart) and Information Theoretical methods (based on different definitions of the Entropy). Moreover, issues related to the choice of the relevant traffic parameters, use of sketches and availability of dataset for performance comparison are also discussed to highlight the main problems in intrusion detection.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bipolar transistor application for «on-line» neutron fluence registration 双极晶体管“在线”中子通量登记的应用
V. Butin, A. Butina
An efficient practical method for bipolar transistor application for neutron fluence registration is presented. The method is focused on neutron fluences damage effect correlation for various sources to reference source. The bipolar transistor connection diagram and an example of device realization based on STM32 microcontroller are described. STM32 is used for providing test signals and parameter registration used for gain factor calculation of bipolar transistors monitor (BTM). The proposed approach allows considering the features of pre-irradiated at reference source BTM and their application as the neutron fluence monitors. These connection diagram and constructive solutions provide “on-line” neutron fluence registration for different sources in terms of reference source as required for radiation tests results verification.
提出了一种有效实用的双极晶体管中子通量登记方法。该方法着重研究了不同源与参考源之间的中子辐照损伤效应的相关性。介绍了双极晶体管的连接图和基于STM32单片机的器件实现实例。STM32用于为双极晶体管监视器(BTM)的增益因子计算提供测试信号和参数配准。该方法考虑了参考源BTM预辐照的特点及其作为中子通量监测仪的应用。这些连接图和建设性解决方案根据辐射测试结果验证所需的参考源,提供不同源的“在线”中子通量登记。
{"title":"Bipolar transistor application for «on-line» neutron fluence registration","authors":"V. Butin, A. Butina","doi":"10.1109/SIBIRCON.2017.8109881","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109881","url":null,"abstract":"An efficient practical method for bipolar transistor application for neutron fluence registration is presented. The method is focused on neutron fluences damage effect correlation for various sources to reference source. The bipolar transistor connection diagram and an example of device realization based on STM32 microcontroller are described. STM32 is used for providing test signals and parameter registration used for gain factor calculation of bipolar transistors monitor (BTM). The proposed approach allows considering the features of pre-irradiated at reference source BTM and their application as the neutron fluence monitors. These connection diagram and constructive solutions provide “on-line” neutron fluence registration for different sources in terms of reference source as required for radiation tests results verification.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of protective meander line turn with broad-side coupling 宽边联轴器保护弯道转弯的研究
A. Nosov, R. Surovtsev
Protection of electronic equipment against ultrashort pulses by meander lines is considered. The results of cross-section parametric optimization and experimental investigations of a meander line turn with broad-side coupling are presented. As the result of the optimization, the set of parameters is obtained for the line per-unit-length modal delays difference maximization with the geometric mean of modes impedances of 50 Ohm. Based on the selected parameters the printed circuit board with meander delay line prototypes of different lengths is manufactured. Then the study of the prototypes in time and frequency domains was executed. The attenuation of the ultrashort pulse with the duration of 40 ps up to 4.2 times is experimentally obtained. It is revealed that the turn passband decreased from 715 to 365 MHz with the turn length increasing from 50 to 100 mm.
研究了电子设备对曲线超短脉冲的保护。介绍了宽边联轴器曲线弯道的截面参数优化和试验研究结果。通过优化得到了线路单位长度模态时延差最大化的参数集,其模态阻抗几何平均值为50欧姆。根据所选参数,制作了不同长度的曲流延迟线原型印刷电路板。然后对原型进行了时域和频域的研究。实验得到了持续时间为40 ps的超短脉冲衰减高达4.2倍。结果表明,当匝长从50 mm增加到100 mm时,匝通带从715 MHz减小到365 MHz。
{"title":"Study of protective meander line turn with broad-side coupling","authors":"A. Nosov, R. Surovtsev","doi":"10.1109/SIBIRCON.2017.8109926","DOIUrl":"https://doi.org/10.1109/SIBIRCON.2017.8109926","url":null,"abstract":"Protection of electronic equipment against ultrashort pulses by meander lines is considered. The results of cross-section parametric optimization and experimental investigations of a meander line turn with broad-side coupling are presented. As the result of the optimization, the set of parameters is obtained for the line per-unit-length modal delays difference maximization with the geometric mean of modes impedances of 50 Ohm. Based on the selected parameters the printed circuit board with meander delay line prototypes of different lengths is manufactured. Then the study of the prototypes in time and frequency domains was executed. The attenuation of the ultrashort pulse with the duration of 40 ps up to 4.2 times is experimentally obtained. It is revealed that the turn passband decreased from 715 to 365 MHz with the turn length increasing from 50 to 100 mm.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114896914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1