Pub Date : 2023-02-02DOI: 10.32362/2500-316x-2023-11-1-7-17
Ju. V. Starichkova, I. E. Rogov, V. S. Tomashevskaya
{"title":"Developing the data management component of an academic discipline program for an educational management information system","authors":"Ju. V. Starichkova, I. E. Rogov, V. S. Tomashevskaya","doi":"10.32362/2500-316x-2023-11-1-7-17","DOIUrl":"https://doi.org/10.32362/2500-316x-2023-11-1-7-17","url":null,"abstract":"","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-78-90
Olga G. Savka, M. N. Gusarova, S. Sumina, Yaroslav O. Knyazev, Denis A. Bezrukov, О.Г. Савка, М.Н. Гусарова, С.В. Сумина, Я.О. Князев, Д.А. Безруков
Objectives. The paper presents and analyzes a model for the formation and evaluation of digital competencies in students. The model is aimed at the implementation of higher education programs for training specialists not directly working in IT, but whose activities are directly related to using ready-made digital products. Digital competences imply an ability to confidently, effectively, and safely select and apply information and communication technologies in various life practices including researching and critically analyzing information, using digital devices and accessing social network functionality, conducting financial and trading transactions, as well as creating digital content. The formation of such digital competences is one of the results of completing higher education programs.Methods. The study is based on a model of digital competence formation having the following four interconnected stages: basic digital competences; personal competences (soft skills); professional digital competences; digital culture.Results. The presented general model for the formation and assessment of student digital competences in higher education programs consists of four interrelated steps, each integral to the process of formation and assessment of the student digital competences, none of which can be excluded without the risk of failing to achieving the specified goals.Conclusions. The model developed in the paper is based on the existing extensive regulatory framework, as well as existing domestic and foreign practices. Relying on expert community opinion (employers, primarily), it accounts for sector- and region-specific features of universities along with specifics of training areas, as well as comprising a list of optimal organizational and methodological conditions for formation of digital competency.
{"title":"Model of formation of digital competences in implementing higher education programs","authors":"Olga G. Savka, M. N. Gusarova, S. Sumina, Yaroslav O. Knyazev, Denis A. Bezrukov, О.Г. Савка, М.Н. Гусарова, С.В. Сумина, Я.О. Князев, Д.А. Безруков","doi":"10.32362/2500-316x-2022-10-6-78-90","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-78-90","url":null,"abstract":"Objectives. The paper presents and analyzes a model for the formation and evaluation of digital competencies in students. The model is aimed at the implementation of higher education programs for training specialists not directly working in IT, but whose activities are directly related to using ready-made digital products. Digital competences imply an ability to confidently, effectively, and safely select and apply information and communication technologies in various life practices including researching and critically analyzing information, using digital devices and accessing social network functionality, conducting financial and trading transactions, as well as creating digital content. The formation of such digital competences is one of the results of completing higher education programs.Methods. The study is based on a model of digital competence formation having the following four interconnected stages: basic digital competences; personal competences (soft skills); professional digital competences; digital culture.Results. The presented general model for the formation and assessment of student digital competences in higher education programs consists of four interrelated steps, each integral to the process of formation and assessment of the student digital competences, none of which can be excluded without the risk of failing to achieving the specified goals.Conclusions. The model developed in the paper is based on the existing extensive regulatory framework, as well as existing domestic and foreign practices. Relying on expert community opinion (employers, primarily), it accounts for sector- and region-specific features of universities along with specifics of training areas, as well as comprising a list of optimal organizational and methodological conditions for formation of digital competency.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-7-19
V. Bakanov
Objectives. The construction of rational plans (schedules) for parallel program execution (PPE) represents a challenging problem due to its ambiguity. The aim of this work is to create methods for developing such plans and specialized software for implementing these methods, which are based on the internal properties of algorithms, primarily on the property of internal (hidden) parallelism.Methods. The main method for developing PPE plans was the construction, analysis, and purposeful transformation of the stacked-parallel form (SPF) of information graphs of algorithms (IGA). The SPF was transformed by transferring operators from tier to tier of the SPF (this event was taken as an elementary step in determining the computational complexity of scenario execution). As a transformation tool, a method for developing transformation scenarios in the scripting programming language Lua was used. Scenarios were created by a heuristic approach using a set of Application Programming Interface (API) functions of the developed software system. These functions formed the basis for a comprehensive study of the parameters of the IGA and its SPF representation for the subsequent construction of a PPE plan applying to a given field of parallel computers.Results. Features of the internal properties of the algorithms that affect the efficiency of SPF transformations were identified during the course of computational experiments. Comparative indices of the computational complexity of obtaining PPE plans and other parameters (including code density, etc.) were obtained for various SPF transformation scenarios. An iterative approach to improving heuristic methods favors developing optimal schemes for solving the objective problem.Conclusions. The developed software system confirmed its efficiency for studying the parameters of hidden parallelism in arbitrary algorithms and rational use in data processing. The approach of using a scripting language to develop heuristic methods (scenarios) for the purposeful transformation of IGA forms showed great flexibility and transparency for the researcher. The target consumers of the developed methods for generating schedules for parallel execution of programs are, first of all, developers of translators and virtual machines, and researchers of the properties of algorithms (for identifying and exploiting the potential of their hidden parallelism). The developed software and methods have been successfully used for a number of years for increasing student competence in data processing parallelization at Russian universities.
{"title":"Computational complexity when constructing rational plans for program execution in a given field of parallel computers","authors":"V. Bakanov","doi":"10.32362/2500-316x-2022-10-6-7-19","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-7-19","url":null,"abstract":"Objectives. The construction of rational plans (schedules) for parallel program execution (PPE) represents a challenging problem due to its ambiguity. The aim of this work is to create methods for developing such plans and specialized software for implementing these methods, which are based on the internal properties of algorithms, primarily on the property of internal (hidden) parallelism.Methods. The main method for developing PPE plans was the construction, analysis, and purposeful transformation of the stacked-parallel form (SPF) of information graphs of algorithms (IGA). The SPF was transformed by transferring operators from tier to tier of the SPF (this event was taken as an elementary step in determining the computational complexity of scenario execution). As a transformation tool, a method for developing transformation scenarios in the scripting programming language Lua was used. Scenarios were created by a heuristic approach using a set of Application Programming Interface (API) functions of the developed software system. These functions formed the basis for a comprehensive study of the parameters of the IGA and its SPF representation for the subsequent construction of a PPE plan applying to a given field of parallel computers.Results. Features of the internal properties of the algorithms that affect the efficiency of SPF transformations were identified during the course of computational experiments. Comparative indices of the computational complexity of obtaining PPE plans and other parameters (including code density, etc.) were obtained for various SPF transformation scenarios. An iterative approach to improving heuristic methods favors developing optimal schemes for solving the objective problem.Conclusions. The developed software system confirmed its efficiency for studying the parameters of hidden parallelism in arbitrary algorithms and rational use in data processing. The approach of using a scripting language to develop heuristic methods (scenarios) for the purposeful transformation of IGA forms showed great flexibility and transparency for the researcher. The target consumers of the developed methods for generating schedules for parallel execution of programs are, first of all, developers of translators and virtual machines, and researchers of the properties of algorithms (for identifying and exploiting the potential of their hidden parallelism). The developed software and methods have been successfully used for a number of years for increasing student competence in data processing parallelization at Russian universities.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-20-27
A. Dhoot, A. Nazarov, I. M. Voronkov
Objectives. The rapid penetration of wireless communication technologies into the activities of both humans and Internet of Things (IoT) devices along with their widespread use by information consumers represents an epochal phenomenon. However, this is accompanied by the growing intensity of successful information attacks, involving the use of bot attacks via IoT, which, along with network attacks, has reached a critical level. Under such circumstances, there is an increasing need for new technological approaches to developing intrusion detection systems based on the latest achievements of artificial intelligence. The most important requirement for such a system consists in its operation on various unbalanced sets of attack data, which use different intrusion techniques. The synthesis of such an intrusion detection system is a difficult task due to the lack of universal methods for detecting technologically different attacks; moreover, the consistent application of known methods is unacceptably long. The aim of the present work is to eliminate such a scientific gap.Methods. Using the achievements of artificial intelligence in the fight against attacks, the authors proposed a method based on a combination of the genetic programming support vector machine (GPSVM) model using an unbalanced CICIDS2017 dataset.Results. The presented technological intrusion detection system architecture offers the possibility to train a dataset for detecting attacks on CICIDS2017 and extracting detection objects. The architecture provides for the separation of the dataset into verifiable and not verifiable elements, with the latter being added to the training set by feedback. By training the model and improving GPSVM training set, better accuracy is ensured. The operability of the new flowchart of the GPSVM model is demonstrated in terms of the entry of input data and output of data after processing using the training set of the GPSVM model. Numerical analysis based on the results of model experiments on selected quality indicators showed an increase in the accuracy of the results as compared to the known SVM method.Conclusions. Computer experiments have confirmed the methodological correctness of choosing a combination of the GPSVM model using an unbalanced CICIDS2017 dataset to increase the effectiveness of intrusion detection. A procedure for forming a training dataset based on feedback is proposed. The procedure involving the separation of datasets is shown to create conditions for improving the training of the model. The combination of the GPSVM model with an unbalanced CICIDS2017 dataset to collect a sample increases theaccuracy of intrusion detection to provide improved intrusion detection performance as compared to the SVM method.
{"title":"Genetic programming support vector machine model for a wireless intrusion detection system","authors":"A. Dhoot, A. Nazarov, I. M. Voronkov","doi":"10.32362/2500-316x-2022-10-6-20-27","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-20-27","url":null,"abstract":"Objectives. The rapid penetration of wireless communication technologies into the activities of both humans and Internet of Things (IoT) devices along with their widespread use by information consumers represents an epochal phenomenon. However, this is accompanied by the growing intensity of successful information attacks, involving the use of bot attacks via IoT, which, along with network attacks, has reached a critical level. Under such circumstances, there is an increasing need for new technological approaches to developing intrusion detection systems based on the latest achievements of artificial intelligence. The most important requirement for such a system consists in its operation on various unbalanced sets of attack data, which use different intrusion techniques. The synthesis of such an intrusion detection system is a difficult task due to the lack of universal methods for detecting technologically different attacks; moreover, the consistent application of known methods is unacceptably long. The aim of the present work is to eliminate such a scientific gap.Methods. Using the achievements of artificial intelligence in the fight against attacks, the authors proposed a method based on a combination of the genetic programming support vector machine (GPSVM) model using an unbalanced CICIDS2017 dataset.Results. The presented technological intrusion detection system architecture offers the possibility to train a dataset for detecting attacks on CICIDS2017 and extracting detection objects. The architecture provides for the separation of the dataset into verifiable and not verifiable elements, with the latter being added to the training set by feedback. By training the model and improving GPSVM training set, better accuracy is ensured. The operability of the new flowchart of the GPSVM model is demonstrated in terms of the entry of input data and output of data after processing using the training set of the GPSVM model. Numerical analysis based on the results of model experiments on selected quality indicators showed an increase in the accuracy of the results as compared to the known SVM method.Conclusions. Computer experiments have confirmed the methodological correctness of choosing a combination of the GPSVM model using an unbalanced CICIDS2017 dataset to increase the effectiveness of intrusion detection. A procedure for forming a training dataset based on feedback is proposed. The procedure involving the separation of datasets is shown to create conditions for improving the training of the model. The combination of the GPSVM model with an unbalanced CICIDS2017 dataset to collect a sample increases theaccuracy of intrusion detection to provide improved intrusion detection performance as compared to the SVM method.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-52-59
V. Babenko, V. K. Bityukov
Objectives. Battery-powered devices (e.g., wireless sensors, pacemakers, watches and other wrist-worn devices, virtual reality glasses, unmanned aerial vehicles, robots, pyrometers, cars, DC/DC converters, etc.) are widely used today. For such devices, it is highly important to ensure safe primary power supply connection, including protection against reverse polarity. The conventional solution to the reverse polarity problem, involving the use of Schottky diodes during system redundancy or increasing power by combining two or more power supplies in the OR-ing circuit due to a large voltage drop, results in significant power losses at high currents, heat dissipation problems, and an increase in the mass and size of the equipment. For this reason, it becomes necessary to develop efficient batterypowered equipment protection against incorrect reverse polarity connection.Methods. The problem is solved using circuit simulation in the Electronics Workbench environment.Results. When protecting equipment against reverse voltage polarity, it is shown that the minimum level of losses and low voltage drop are provided by “ideal diode” circuit solutions based on discrete components and microcircuits of the “integrated diode” type with external and internal power metal–oxide–semiconductor field-effect transistors (MOSFETs). The circuit simulation of ideal diodes based on p- and n-channel transistors with superior technical parameters allows the characteristics and voltage and power losses in the protected circuits to be specified along with a presentation of the proposed technical solution simplicity. The contemporary component base of protection devices is discussed in terms of efficiency.Conclusions. Examples of equipment for protecting against reverse voltage polarity are given along with circuit solutions based on discrete and integrated components. The simulation of the transfer characteristics of protection devices shows the limit for the minimum input voltage value of around 4 V using a MOSFET transistor.
{"title":"Protection of battery-powered devices against accidental swap of power supply connections.","authors":"V. Babenko, V. K. Bityukov","doi":"10.32362/2500-316x-2022-10-6-52-59","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-52-59","url":null,"abstract":"Objectives. Battery-powered devices (e.g., wireless sensors, pacemakers, watches and other wrist-worn devices, virtual reality glasses, unmanned aerial vehicles, robots, pyrometers, cars, DC/DC converters, etc.) are widely used today. For such devices, it is highly important to ensure safe primary power supply connection, including protection against reverse polarity. The conventional solution to the reverse polarity problem, involving the use of Schottky diodes during system redundancy or increasing power by combining two or more power supplies in the OR-ing circuit due to a large voltage drop, results in significant power losses at high currents, heat dissipation problems, and an increase in the mass and size of the equipment. For this reason, it becomes necessary to develop efficient batterypowered equipment protection against incorrect reverse polarity connection.Methods. The problem is solved using circuit simulation in the Electronics Workbench environment.Results. When protecting equipment against reverse voltage polarity, it is shown that the minimum level of losses and low voltage drop are provided by “ideal diode” circuit solutions based on discrete components and microcircuits of the “integrated diode” type with external and internal power metal–oxide–semiconductor field-effect transistors (MOSFETs). The circuit simulation of ideal diodes based on p- and n-channel transistors with superior technical parameters allows the characteristics and voltage and power losses in the protected circuits to be specified along with a presentation of the proposed technical solution simplicity. The contemporary component base of protection devices is discussed in terms of efficiency.Conclusions. Examples of equipment for protecting against reverse voltage polarity are given along with circuit solutions based on discrete and integrated components. The simulation of the transfer characteristics of protection devices shows the limit for the minimum input voltage value of around 4 V using a MOSFET transistor.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-70-77
A. B. Samokhin
Objectives. Integral equations have long been used in mathematical physics to demonstrate existence and uniqueness theorems for solving boundary value problems for differential equations. However, despite integral equations have a number of advantages in comparison with corresponding boundary value problems where boundary conditions are present in the kernels of equations, they are rarely used for obtaining numerical solutions of problems due to the presence of equations with dense matrices that arise that when discretizing integral equations, as opposed to sparse matrices in the case of differential equations. Recently, due to the development of computer technology and methods of computational mathematics, integral equations have been used for the numerical solution of specific problems. In the present work, two methods for numerical solution of two-dimensional and three-dimensional integral equations are proposed for describing several significant classes of problems in mathematical physics.Methods. The method of collocation on non-uniform and uniform grids is used to discretize integral equations. To obtain a numerical solution of the resulting systems of linear algebraic equations (SLAEs), iterative methods are used. In the case of a uniform grid, an efficient method for multiplying the SLAE matrix by vector is created.Results. Corresponding SLAEs describing the considered classes of problems are set up. Efficient solution algorithms using fast Fourier transforms are proposed for solving systems of equations obtained using a uniform grid.Conclusions. While SLAEs using a non-uniform grid can be used to describe complex domain configurations, there are significant constraints on the dimensionality of described systems. When using a uniform grid, the dimensionality of SLAEs can be several orders of magnitude higher; however, in this case, it may be difficult to describe the complex configuration of the domain. Selection of the particular method depends on the specific problem and available computational resources. Thus, SLAEs on a non-uniform grid may be preferable for many two-dimensional problems, while systems on a uniform grid may be preferable for three-dimensional problems.
{"title":"Methods and effective algorithms for solving multidimensional integral equations","authors":"A. B. Samokhin","doi":"10.32362/2500-316x-2022-10-6-70-77","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-70-77","url":null,"abstract":"Objectives. Integral equations have long been used in mathematical physics to demonstrate existence and uniqueness theorems for solving boundary value problems for differential equations. However, despite integral equations have a number of advantages in comparison with corresponding boundary value problems where boundary conditions are present in the kernels of equations, they are rarely used for obtaining numerical solutions of problems due to the presence of equations with dense matrices that arise that when discretizing integral equations, as opposed to sparse matrices in the case of differential equations. Recently, due to the development of computer technology and methods of computational mathematics, integral equations have been used for the numerical solution of specific problems. In the present work, two methods for numerical solution of two-dimensional and three-dimensional integral equations are proposed for describing several significant classes of problems in mathematical physics.Methods. The method of collocation on non-uniform and uniform grids is used to discretize integral equations. To obtain a numerical solution of the resulting systems of linear algebraic equations (SLAEs), iterative methods are used. In the case of a uniform grid, an efficient method for multiplying the SLAE matrix by vector is created.Results. Corresponding SLAEs describing the considered classes of problems are set up. Efficient solution algorithms using fast Fourier transforms are proposed for solving systems of equations obtained using a uniform grid.Conclusions. While SLAEs using a non-uniform grid can be used to describe complex domain configurations, there are significant constraints on the dimensionality of described systems. When using a uniform grid, the dimensionality of SLAEs can be several orders of magnitude higher; however, in this case, it may be difficult to describe the complex configuration of the domain. Selection of the particular method depends on the specific problem and available computational resources. Thus, SLAEs on a non-uniform grid may be preferable for many two-dimensional problems, while systems on a uniform grid may be preferable for three-dimensional problems.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-42-51
A. V. Smirnov
Objectives. The selection of a method for solving multi-objective optimization problems has many practical applications in diverse fields. The present work compares the results of applying different methods to the selected classes of problems by solution quality, time consumption, and various other criteria.Methods. Five problems related to the multi-objective optimization of analog and digital filters, as well as multistep impedance-matching microwave transformers, are considered. One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.Results. The computer experiments demonstrated the capability of GDE3 to solve all considered problems. MSPS and PSO showed significantly inferior results than to GDE3 for two problems. In one problem, MSSQP could not be used to reach acceptable decisions. In the other problems, MSPS, MSSQP, and PSO reached decisions comparable with GDE3. The time consumption of the MSPS and PSO algorithms was much greater than that of GDE3 and MSSQP.Conclusions. The GDE3 algorithm may be recommended as a basic method for solving the considered problems. Algorithms minimizing scalar objective function may be used to obtain several elements of the Pareto set. It is necessary to investigate the impact of landscape features of individual quality indices and scalar objective functions on the extreme search process.
{"title":"Comparison of algorithms for multi-objective optimization of radio technical device characteristics","authors":"A. V. Smirnov","doi":"10.32362/2500-316x-2022-10-6-42-51","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-42-51","url":null,"abstract":"Objectives. The selection of a method for solving multi-objective optimization problems has many practical applications in diverse fields. The present work compares the results of applying different methods to the selected classes of problems by solution quality, time consumption, and various other criteria.Methods. Five problems related to the multi-objective optimization of analog and digital filters, as well as multistep impedance-matching microwave transformers, are considered. One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.Results. The computer experiments demonstrated the capability of GDE3 to solve all considered problems. MSPS and PSO showed significantly inferior results than to GDE3 for two problems. In one problem, MSSQP could not be used to reach acceptable decisions. In the other problems, MSPS, MSSQP, and PSO reached decisions comparable with GDE3. The time consumption of the MSPS and PSO algorithms was much greater than that of GDE3 and MSSQP.Conclusions. The GDE3 algorithm may be recommended as a basic method for solving the considered problems. Algorithms minimizing scalar objective function may be used to obtain several elements of the Pareto set. It is necessary to investigate the impact of landscape features of individual quality indices and scalar objective functions on the extreme search process.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-60-69
V. Kapustin, I. Li, N. E. Kozhevnikova, E. F. Khudaigulova
Objectives. Triple barium–strontium–calcium carbonates of various grades are widely used for depositing oxide coatings on cathodes of electrovacuum devices. Of all types of cathodes used in electrovacuum devices, oxide cathodes are among the most common, due to combining efficiency, durability, operation at relatively low temperatures, and a relatively low cost. The aims of this work were to: create a technology for the synthesis of triple barium–strontium–calcium carbonates with nonequilibrium phase compositions that comprise the triple carbonate proper and a pure barium carbonate phase; develop a quality control procedure for such a carbonate for using it as a component of the cathode material for microwave devices; study how the electronic structure of barium oxide crystallites is affected by doping microimpurities from other phases of the cathode material.Methods. The study used precision X-ray diffraction analysis and electron spectroscopy.Results. A technology was developed for the co-precipitation of triple barium–strontium–calcium carbonates from their nitrate salts. Under optimal precipitation conditions, this produces triple carbonate powders with nonequilibrium phase compositions. Electron spectroscopy showed that the parameters of the electronic structure of the crystallites are significantly affected by doping impurities of calcium, strontium, and nickel in barium oxide crystallites formed by heat treatment of triple carbonates.Conclusions. Calcium and strontium have a synergistic effect on the doping of barium oxide with the two other chemical elements. As well as efficiently controlling the quality of the nonequilibrium phase composition of triple carbonates, which is formed during the synthesis of triple carbonates by the titration method, precision X-ray diffraction analysis can be used to efficiently control the processes of agglomeration of nanoparticles or recrystallization of nanostructured phases formed during the synthesis of triple carbonates.
{"title":"Technology of synthesis and electronic structure of triple barium–strontium–calcium carbonates for cathodes of microwave devices","authors":"V. Kapustin, I. Li, N. E. Kozhevnikova, E. F. Khudaigulova","doi":"10.32362/2500-316x-2022-10-6-60-69","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-60-69","url":null,"abstract":"Objectives. Triple barium–strontium–calcium carbonates of various grades are widely used for depositing oxide coatings on cathodes of electrovacuum devices. Of all types of cathodes used in electrovacuum devices, oxide cathodes are among the most common, due to combining efficiency, durability, operation at relatively low temperatures, and a relatively low cost. The aims of this work were to: create a technology for the synthesis of triple barium–strontium–calcium carbonates with nonequilibrium phase compositions that comprise the triple carbonate proper and a pure barium carbonate phase; develop a quality control procedure for such a carbonate for using it as a component of the cathode material for microwave devices; study how the electronic structure of barium oxide crystallites is affected by doping microimpurities from other phases of the cathode material.Methods. The study used precision X-ray diffraction analysis and electron spectroscopy.Results. A technology was developed for the co-precipitation of triple barium–strontium–calcium carbonates from their nitrate salts. Under optimal precipitation conditions, this produces triple carbonate powders with nonequilibrium phase compositions. Electron spectroscopy showed that the parameters of the electronic structure of the crystallites are significantly affected by doping impurities of calcium, strontium, and nickel in barium oxide crystallites formed by heat treatment of triple carbonates.Conclusions. Calcium and strontium have a synergistic effect on the doping of barium oxide with the two other chemical elements. As well as efficiently controlling the quality of the nonequilibrium phase composition of triple carbonates, which is formed during the synthesis of triple carbonates by the titration method, precision X-ray diffraction analysis can be used to efficiently control the processes of agglomeration of nanoparticles or recrystallization of nanostructured phases formed during the synthesis of triple carbonates.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.32362/2500-316x-2022-10-6-28-41
S. Manko, V. Lokhin, D. Sekou
Objectives. The article substantiates the relevance of the creation and the prospects of application of multi-agent robotic systems for elimination of consequences of emergency situations. The purpose of this work was to test the practical feasibility of algorithms for controlling a group of autonomous robots when performing multi-stage missions.Methods. The theses of the finite automata theory in planning actions of a multi-agent system, methods of automatic control in organizing a goal-directed movement of robots, and methods of computer vision in searching and analyzing debris geometry were used.Results. The principles of development, architecture, and composition are described for the software and algorithms of a prototype of the multi-agent robotic system created at RTU MIREA as part of integrated research for the creation of tools and methods of group control of robots. The multi-stage task of searching and removing debris in the process of eliminating the consequences of emergency situations is analyzed. A proposed algorithm for planning the actions of robotic agents determines the time sequence of the mission stages. Tasks are allocated among the performing robots according to assessments of their suitability. The autonomous functioning of robotic agents is determined by commands coming from the group control level, as well as an a priori embedded knowledge base with scenario models of appropriate actions. Compensation of local environmental uncertainties in the process of robot movement is based on a comprehensive analysis of visual and navigation information. Along with the main elements of the multi-agent system, the developed infrastructure of hardware and software for visual navigation and wireless communication is described.Conclusions. The results of the experimental studies demonstrated the efficiency of the developed approaches to the creation of intelligent technologies for group control of autonomous robots on the example of debris search and removal tasks. The feasibility of the multi-agent robotic system is demonstrated by the development and integration of a number of information management and infrastructure subsystems.
{"title":"Prototype multi-agent robotic debris removal system: principles of development and experimental studies","authors":"S. Manko, V. Lokhin, D. Sekou","doi":"10.32362/2500-316x-2022-10-6-28-41","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-6-28-41","url":null,"abstract":"Objectives. The article substantiates the relevance of the creation and the prospects of application of multi-agent robotic systems for elimination of consequences of emergency situations. The purpose of this work was to test the practical feasibility of algorithms for controlling a group of autonomous robots when performing multi-stage missions.Methods. The theses of the finite automata theory in planning actions of a multi-agent system, methods of automatic control in organizing a goal-directed movement of robots, and methods of computer vision in searching and analyzing debris geometry were used.Results. The principles of development, architecture, and composition are described for the software and algorithms of a prototype of the multi-agent robotic system created at RTU MIREA as part of integrated research for the creation of tools and methods of group control of robots. The multi-stage task of searching and removing debris in the process of eliminating the consequences of emergency situations is analyzed. A proposed algorithm for planning the actions of robotic agents determines the time sequence of the mission stages. Tasks are allocated among the performing robots according to assessments of their suitability. The autonomous functioning of robotic agents is determined by commands coming from the group control level, as well as an a priori embedded knowledge base with scenario models of appropriate actions. Compensation of local environmental uncertainties in the process of robot movement is based on a comprehensive analysis of visual and navigation information. Along with the main elements of the multi-agent system, the developed infrastructure of hardware and software for visual navigation and wireless communication is described.Conclusions. The results of the experimental studies demonstrated the efficiency of the developed approaches to the creation of intelligent technologies for group control of autonomous robots on the example of debris search and removal tasks. The feasibility of the multi-agent robotic system is demonstrated by the development and integration of a number of information management and infrastructure subsystems.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-21DOI: 10.32362/2500-316x-2022-10-5-73-91
V. Krutov, A. S. Sigov
Objectives. In many laboratories around the world, work is underway in the field of domain engineering of ferroelectrics. For a number of years, RTU MIREA has been conducting research on the creation of a high-performance technology for the formation of ferroelectric photonic and phononic crystals. The technology is characterized by a short duration of the technological cycle and provides the necessary depth of spatially periodic domain inversion. The key element of the technology is the combined effect of a uniform electric field and interfering high-frequency elastic waves that create a temperature grating. The technology is universal in relation to ferroelectrics of varying degrees of acoustic transparency, which is achieved by using highly dissipative liquid electrodes of a certain thickness. In this case, the energy of elastic waves practically does not penetrate into the ferroelectric, so the manifestation of undesirable effects is excluded. The purpose of this review article is to analyze the results of work carried out at RTU MIREA in the field of technology for the formation of ferroelectric regular domain structures (RDSs) during the period from 2008 to the present.Methods. Provisions of the theory of propagation, refraction and interference of elastic waves in condensed media are used, in particular, the Newtonian model of a liquid as applied to shear waves, as well as computer simulation. When considering the main stages of the Double Pulse heterothermal technology for the formation of RDSs, methods of analysis and synthesis were applied.Results. The possibility of forming not only micro-, but also submicron RDSs is shown. Recommendations are given on the choice of the type and specific properties of liquid electrodes, the angles between the direction of propagation of interfering waves, and their frequency. It is shown, in particular, that the use of highly dissipative ionic liquids as liquid electrodes creates favorable conditions for the formation of an RDS with a short period at room temperature. Thus, on shear waves with electrodes based on LiPF6-PC at a frequency of 300 MHz, RDS with a period of about 2 цт can be created. The main technological parameters are determined both for the case of the action of longitudinal elastic waves and for the case of shear waves with horizontal polarization. The results are applicable to ferroelectrics such as lithium niobate, potassium titanyl phosphate, and lead zirconate titanate.Conclusions. The proposed and studied methods are focused on the mass production of devices based on RDSs, in particular, on the manufacturing of optical parametric oscillators, acoustoelectronic devices, as well as terahertz wave generators and second harmonic oscillators. The technology has a short duration of the technological cycle, comparable to the polarization switching time in the used ferroelectric.
{"title":"Technology for the creation of ferroelectric regular domain structures using interfering elastic waves","authors":"V. Krutov, A. S. Sigov","doi":"10.32362/2500-316x-2022-10-5-73-91","DOIUrl":"https://doi.org/10.32362/2500-316x-2022-10-5-73-91","url":null,"abstract":"Objectives. In many laboratories around the world, work is underway in the field of domain engineering of ferroelectrics. For a number of years, RTU MIREA has been conducting research on the creation of a high-performance technology for the formation of ferroelectric photonic and phononic crystals. The technology is characterized by a short duration of the technological cycle and provides the necessary depth of spatially periodic domain inversion. The key element of the technology is the combined effect of a uniform electric field and interfering high-frequency elastic waves that create a temperature grating. The technology is universal in relation to ferroelectrics of varying degrees of acoustic transparency, which is achieved by using highly dissipative liquid electrodes of a certain thickness. In this case, the energy of elastic waves practically does not penetrate into the ferroelectric, so the manifestation of undesirable effects is excluded. The purpose of this review article is to analyze the results of work carried out at RTU MIREA in the field of technology for the formation of ferroelectric regular domain structures (RDSs) during the period from 2008 to the present.Methods. Provisions of the theory of propagation, refraction and interference of elastic waves in condensed media are used, in particular, the Newtonian model of a liquid as applied to shear waves, as well as computer simulation. When considering the main stages of the Double Pulse heterothermal technology for the formation of RDSs, methods of analysis and synthesis were applied.Results. The possibility of forming not only micro-, but also submicron RDSs is shown. Recommendations are given on the choice of the type and specific properties of liquid electrodes, the angles between the direction of propagation of interfering waves, and their frequency. It is shown, in particular, that the use of highly dissipative ionic liquids as liquid electrodes creates favorable conditions for the formation of an RDS with a short period at room temperature. Thus, on shear waves with electrodes based on LiPF6-PC at a frequency of 300 MHz, RDS with a period of about 2 цт can be created. The main technological parameters are determined both for the case of the action of longitudinal elastic waves and for the case of shear waves with horizontal polarization. The results are applicable to ferroelectrics such as lithium niobate, potassium titanyl phosphate, and lead zirconate titanate.Conclusions. The proposed and studied methods are focused on the mass production of devices based on RDSs, in particular, on the manufacturing of optical parametric oscillators, acoustoelectronic devices, as well as terahertz wave generators and second harmonic oscillators. The technology has a short duration of the technological cycle, comparable to the polarization switching time in the used ferroelectric.","PeriodicalId":282368,"journal":{"name":"Russian Technological Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}