Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110738
U.V. Kuzmina, O. Kazakov, Bogdan Erushev
With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.
{"title":"Building an Attack Tree for Analysis of Information Security Risks","authors":"U.V. Kuzmina, O. Kazakov, Bogdan Erushev","doi":"10.1109/SmartIndustryCon57312.2023.10110738","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110738","url":null,"abstract":"With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110729
V. Olonichev, B. Staroverov, Sergey Tarasov
The method of prognosis of dynamic system behavior along its temporal series is suggested. This method is based on the joint application of two types of artificial neural networks: holographic and perceptron. The holographic network plays the role of associated memory and perceptron one—the forecasting approximator. The method was tested on the task of forecasting electrical energy consumption. The holographis network selected similar intervals in the preceding temporal series. The perceptron was then trained on the selected data, using it as input values and the intervals immediately after them as output values. A trained perceptron may be used for the prediction. With the real data from the regional electrical company, the average relative error of the forecast was about 2%.
{"title":"The Holographic and Perceptron Neuron Networks Joint Application for the Dynamic Systems Behavior Forecast","authors":"V. Olonichev, B. Staroverov, Sergey Tarasov","doi":"10.1109/SmartIndustryCon57312.2023.10110729","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110729","url":null,"abstract":"The method of prognosis of dynamic system behavior along its temporal series is suggested. This method is based on the joint application of two types of artificial neural networks: holographic and perceptron. The holographic network plays the role of associated memory and perceptron one—the forecasting approximator. The method was tested on the task of forecasting electrical energy consumption. The holographis network selected similar intervals in the preceding temporal series. The perceptron was then trained on the selected data, using it as input values and the intervals immediately after them as output values. A trained perceptron may be used for the prediction. With the real data from the regional electrical company, the average relative error of the forecast was about 2%.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110756
Aleksandr M. Boger, A. N. Sokolov
The purpose of this research is to develop a method for calculating the maximum response time of information protection systems for networks of industrial control systems (ICS) to the impact of a DDoS-attack. This parameter should not exceed the value corresponding to the average time of a successful DDoS attack and can be used when configuring protection systems for ICS networks to minimize the likelihood of a successful DDoS attack or significantly reduce the possible negative consequences of its impact. To achieve the goal, the task of developing a model of an intruder in the preparation and implementation of a DDoS attack was set and solved, based on a stochastic network of this process. The mathematical expectation of the average time of a successful DDoS attack and its dispersion, as well as the dependence of the probability of a successful DDoS attack on its duration in time, are calculated using the method of topological transformation of a stochastic network and the method of two-time approximation. In conclusion, several experiments simulating a DDoS attack were carried out and allowing us to conclude that the real time of the implementation of a successful DDoS attack corresponds to that time calculated with the proposed method.
{"title":"Calculating the Maximum Response Time of Protection Systems of Industrial Control System Network to the Impact of a DDoS Attack","authors":"Aleksandr M. Boger, A. N. Sokolov","doi":"10.1109/SmartIndustryCon57312.2023.10110756","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110756","url":null,"abstract":"The purpose of this research is to develop a method for calculating the maximum response time of information protection systems for networks of industrial control systems (ICS) to the impact of a DDoS-attack. This parameter should not exceed the value corresponding to the average time of a successful DDoS attack and can be used when configuring protection systems for ICS networks to minimize the likelihood of a successful DDoS attack or significantly reduce the possible negative consequences of its impact. To achieve the goal, the task of developing a model of an intruder in the preparation and implementation of a DDoS attack was set and solved, based on a stochastic network of this process. The mathematical expectation of the average time of a successful DDoS attack and its dispersion, as well as the dependence of the probability of a successful DDoS attack on its duration in time, are calculated using the method of topological transformation of a stochastic network and the method of two-time approximation. In conclusion, several experiments simulating a DDoS attack were carried out and allowing us to conclude that the real time of the implementation of a successful DDoS attack corresponds to that time calculated with the proposed method.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110821
R. A. Biktashev, A. Martyshkin
The In this article the author substantiates a hardware approach to designing the kernel of real-time multiprocessor operating systems. The author also provides possible options for architectural solutions, and considers the formal representation of control algorithms for interacting processes operating in parallel computing systems when they access a shared resource. The theory of event-driven non-deterministic automata was used for formalization. There were obtained equations that describe the procedures for the process of entering the critical interval and remaining there, taking into account the accepted discipline of ensuring priority and mutual exclusion of incompatible events. The exit of the process from the critical section, which makes it possible to synthesize the control module was examined as well. Modeling of a device for 4 inputs of requests to a shared resource in the VHDL language was executed, the results of experimental studies were also provided.
{"title":"Designing a High-Performance Resource Management Module for Real-Time Multiprocessor Systems","authors":"R. A. Biktashev, A. Martyshkin","doi":"10.1109/SmartIndustryCon57312.2023.10110821","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110821","url":null,"abstract":"The In this article the author substantiates a hardware approach to designing the kernel of real-time multiprocessor operating systems. The author also provides possible options for architectural solutions, and considers the formal representation of control algorithms for interacting processes operating in parallel computing systems when they access a shared resource. The theory of event-driven non-deterministic automata was used for formalization. There were obtained equations that describe the procedures for the process of entering the critical interval and remaining there, taking into account the accepted discipline of ensuring priority and mutual exclusion of incompatible events. The exit of the process from the critical section, which makes it possible to synthesize the control module was examined as well. Modeling of a device for 4 inputs of requests to a shared resource in the VHDL language was executed, the results of experimental studies were also provided.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110823
N. Duc, A. Galimyanov, I. Z. Akhmetov
Differential equations with Cauchy type initial conditions and boundary conditions play a very important role in mathematics, physics and other sciences. In this article, we have developed an artificial neural network (ANN) method for finding solutions to the Cauchy problem for fractional order differential equations (FODEs). The fractional derivative is considered to be of the Riemann-Liouville type. Here, we used a three-layer feedforward neural architecture (one input layer, one hidden layer and one output layer), L-BFGS (Broyden-Fletcher-Goldfarb-Shanno) optimization method to minimize the error function and change the parameters (weights and biases). Illustrative examples demonstrating the accuracy and efficiency of this method are given. Compare the results of the current method with the mathematical results.
{"title":"Artificial Neural Network Method for Solving a Fractional Order Differential Equation with the Cauchy-Type Problem","authors":"N. Duc, A. Galimyanov, I. Z. Akhmetov","doi":"10.1109/SmartIndustryCon57312.2023.10110823","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110823","url":null,"abstract":"Differential equations with Cauchy type initial conditions and boundary conditions play a very important role in mathematics, physics and other sciences. In this article, we have developed an artificial neural network (ANN) method for finding solutions to the Cauchy problem for fractional order differential equations (FODEs). The fractional derivative is considered to be of the Riemann-Liouville type. Here, we used a three-layer feedforward neural architecture (one input layer, one hidden layer and one output layer), L-BFGS (Broyden-Fletcher-Goldfarb-Shanno) optimization method to minimize the error function and change the parameters (weights and biases). Illustrative examples demonstrating the accuracy and efficiency of this method are given. Compare the results of the current method with the mathematical results.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110735
V. Bogatyrev, S. Bogatyrev, Victor V. Sivov
High reliability and fault tolerance of computer systems at high performance and low delays of executing the required functions are achieved by consolidating the data processing and storage resources through the use of cluster systems. Ensuring the reliability of cluster architecture computer systems while accelerating their reconfiguration after failures is accompanied by replication and migration of virtual machines. A approach is proposed for the justification of building a computer system with a cluster architecture, composed of duplicated computer nodes. Studies aimed at increasing the readiness of the cluster to timely execution of real-time requests while ensuring a stationary service traffic mode have been carried out. The work of duplicate nodes in load balancing mode and duplicate calculations is considered. In the first mode, requests are evenly distributed among the functional nodes (servers). In the second mode, replicas of the request are created, each of which is executed on one node of the backup system. For control, the calculation results are compared at check points. If there is a mismatch, a repeat calculation is possible.
{"title":"Reliability of a Cluster of Duplicated Computer Systems with the Criticality of Functional Requests to Waiting","authors":"V. Bogatyrev, S. Bogatyrev, Victor V. Sivov","doi":"10.1109/SmartIndustryCon57312.2023.10110735","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110735","url":null,"abstract":"High reliability and fault tolerance of computer systems at high performance and low delays of executing the required functions are achieved by consolidating the data processing and storage resources through the use of cluster systems. Ensuring the reliability of cluster architecture computer systems while accelerating their reconfiguration after failures is accompanied by replication and migration of virtual machines. A approach is proposed for the justification of building a computer system with a cluster architecture, composed of duplicated computer nodes. Studies aimed at increasing the readiness of the cluster to timely execution of real-time requests while ensuring a stationary service traffic mode have been carried out. The work of duplicate nodes in load balancing mode and duplicate calculations is considered. In the first mode, requests are evenly distributed among the functional nodes (servers). In the second mode, replicas of the request are created, each of which is executed on one node of the backup system. For control, the calculation results are compared at check points. If there is a mismatch, a repeat calculation is possible.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110795
N. Borgest, Sergei A. Vlasov, D.S Glibotsky
This article discusses the creation of an application with augmented reality technology, in order to improve the process of training skilled professionals in the field of aircraft engineering among students of higher education institutions. The application allows students to study and test their knowledge about the main aircraft units located in the aircraft class of the Department of Aircraft Construction and Design. This project is an Android-based application with the recognition of details on real objects (aircraft units) arranged in the class. The following tools and technologies have been used to create the application: Blender 3D for modeling objects, Unity 3D for creating the application interface and Vuforia Engine as a developer's toolkit.
{"title":"Development and Application of an Application with Augmented Reality Technology for Training Future Aircraft Designers","authors":"N. Borgest, Sergei A. Vlasov, D.S Glibotsky","doi":"10.1109/SmartIndustryCon57312.2023.10110795","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110795","url":null,"abstract":"This article discusses the creation of an application with augmented reality technology, in order to improve the process of training skilled professionals in the field of aircraft engineering among students of higher education institutions. The application allows students to study and test their knowledge about the main aircraft units located in the aircraft class of the Department of Aircraft Construction and Design. This project is an Android-based application with the recognition of details on real objects (aircraft units) arranged in the class. The following tools and technologies have been used to create the application: Blender 3D for modeling objects, Unity 3D for creating the application interface and Vuforia Engine as a developer's toolkit.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121626973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110721
Anastasia Iakovleva, M. Zhukova, Tatyana Strekaleva
The article shows the problem of cyber fatigue of the specialists investigating information security incidents. The cause of the problem is the increase in the number of warnings and events generated and logged daily by a protection system. This volume of information is processed using automation tools; nevertheless, it cannot do without human participation. The essence of the issue lies in the fact that specialists do not have a common algorithm for conducting investigations and a roadmap for building a timeline of events. Therefore, it is necessary to change and supplement the existing approach to the work with incidents by unifying the process of identifying the stages of development of a computer incident during an investigation. To do this, the paper studies the issue of algorithmization and describes typical approaches to handling information security incidents. We propose an algorithm that allows processing an information security incident: to obtain information about the access point to the system, the development of an incident in the system, and the general profile of the attacker. In addition, it is assumed that the algorithm can be used for educational purposes to train specialists who work with incidents in order to form and develop basic practical skills by applying this in a case-oriented approach.
{"title":"Information Security Incident Handling Regulation","authors":"Anastasia Iakovleva, M. Zhukova, Tatyana Strekaleva","doi":"10.1109/SmartIndustryCon57312.2023.10110721","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110721","url":null,"abstract":"The article shows the problem of cyber fatigue of the specialists investigating information security incidents. The cause of the problem is the increase in the number of warnings and events generated and logged daily by a protection system. This volume of information is processed using automation tools; nevertheless, it cannot do without human participation. The essence of the issue lies in the fact that specialists do not have a common algorithm for conducting investigations and a roadmap for building a timeline of events. Therefore, it is necessary to change and supplement the existing approach to the work with incidents by unifying the process of identifying the stages of development of a computer incident during an investigation. To do this, the paper studies the issue of algorithmization and describes typical approaches to handling information security incidents. We propose an algorithm that allows processing an information security incident: to obtain information about the access point to the system, the development of an incident in the system, and the general profile of the attacker. In addition, it is assumed that the algorithm can be used for educational purposes to train specialists who work with incidents in order to form and develop basic practical skills by applying this in a case-oriented approach.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110720
E. Kuimov, Natalia Vetrova, S. Meshkov
A model of current transfer in resonant tunnel structures has been developed to develop applications for nonlinear elements of RFID tags. Unlike the previous models of this class, the developed model exhibits manifestations of interelectronic interaction. The expected work in the model is distinguished by high accuracy in the initial section (average relative deviation within 1%), low requirements for computing resources (reduced time complexity of the calculation by more than 400 times compared to traditional approaches), and the absence of coefficients without theoretical estimates, which makes it promising for high accuracy in TCAD systems for designing a new generation microwave device.
{"title":"Model of the Initial Section of RTD’s CVC for RFID Tags","authors":"E. Kuimov, Natalia Vetrova, S. Meshkov","doi":"10.1109/SmartIndustryCon57312.2023.10110720","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110720","url":null,"abstract":"A model of current transfer in resonant tunnel structures has been developed to develop applications for nonlinear elements of RFID tags. Unlike the previous models of this class, the developed model exhibits manifestations of interelectronic interaction. The expected work in the model is distinguished by high accuracy in the initial section (average relative deviation within 1%), low requirements for computing resources (reduced time complexity of the calculation by more than 400 times compared to traditional approaches), and the absence of coefficients without theoretical estimates, which makes it promising for high accuracy in TCAD systems for designing a new generation microwave device.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1109/SmartIndustryCon57312.2023.10110797
Adil I. Burumbaev, V. Kuanishev, N. Barbin
The distilled water investigation has been undertaken by means of the descriptive and correlation method analysis backed by the Statistica and Matlab software. The conclusion has been made that further investigation to study chemical properties of water and water solutions is needed. The paper presents a method exploring the water properties measuring results by means of the professional water quality measurement meter WMM-97 at the temperature of 21°С and water pH (pH of the media corresponded to the State Standards 58144 5.0-6.6). The distilled water electro conductivity has been measured within a one-week time-period (the electro conductivity being in compliance with the State Standards 58144, less than 0,43 mCm/m), the indicators being registered each second.
{"title":"Statistical Analysis Methods of the Data Obtained by Water Electro Conductivity Measurement","authors":"Adil I. Burumbaev, V. Kuanishev, N. Barbin","doi":"10.1109/SmartIndustryCon57312.2023.10110797","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110797","url":null,"abstract":"The distilled water investigation has been undertaken by means of the descriptive and correlation method analysis backed by the Statistica and Matlab software. The conclusion has been made that further investigation to study chemical properties of water and water solutions is needed. The paper presents a method exploring the water properties measuring results by means of the professional water quality measurement meter WMM-97 at the temperature of 21°С and water pH (pH of the media corresponded to the State Standards 58144 5.0-6.6). The distilled water electro conductivity has been measured within a one-week time-period (the electro conductivity being in compliance with the State Standards 58144, less than 0,43 mCm/m), the indicators being registered each second.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}