首页 > 最新文献

2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)最新文献

英文 中文
Application of side-illumination fluorescence measurement technique for monitoring of quality of dielectric fluids 侧照荧光测量技术在介质流体质量监测中的应用
D. Kiesewetter, A. Reznik, N. Zhuravleva, D. V. Litvinov, Alexandr S. Rutovich
The side-illumination fluorescence spectroscopy was used for early detection of oxidation of the transformer's insulating fluids. Aging of petroleum oil, MIDEL dielectric fluids and their mixtures both in the presence of the catalyst and transformer paper and without them was investigated. A comparison of the obtained optical characteristics of dielectric fluids — fluorescence and transmittance spectrum with the electrical parameters — resistance and tangent of dielectric loss angle were carried out. The explanation of the obtained regularities is given, in particular, the ability to distinguish effects associated with the oxidation of oils from the effects due to the dissolution of moisture and contamination of oil by sludge at the aging process is demonstrated. The possibility of applying the method for measuring the optical attenuation in the dielectric liquids with high transparency is shown.
采用侧照荧光光谱法对变压器绝缘液的氧化进行了早期检测。研究了在催化剂和变压器纸存在和不存在的情况下,石油、midl介电流体及其混合物的老化。将得到的介质流体的光学特性——荧光光谱和透射光谱与电学参数——电阻和介质损耗角正切进行了比较。给出了所得到的规律的解释,特别是证明了在老化过程中区分与油的氧化有关的影响与由于水分溶解和油泥污染引起的影响的能力。指出了将该方法应用于测量高透明度介质液体的光衰减的可能性。
{"title":"Application of side-illumination fluorescence measurement technique for monitoring of quality of dielectric fluids","authors":"D. Kiesewetter, A. Reznik, N. Zhuravleva, D. V. Litvinov, Alexandr S. Rutovich","doi":"10.1109/EICONRUS.2018.8317124","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317124","url":null,"abstract":"The side-illumination fluorescence spectroscopy was used for early detection of oxidation of the transformer's insulating fluids. Aging of petroleum oil, MIDEL dielectric fluids and their mixtures both in the presence of the catalyst and transformer paper and without them was investigated. A comparison of the obtained optical characteristics of dielectric fluids — fluorescence and transmittance spectrum with the electrical parameters — resistance and tangent of dielectric loss angle were carried out. The explanation of the obtained regularities is given, in particular, the ability to distinguish effects associated with the oxidation of oils from the effects due to the dissolution of moisture and contamination of oil by sludge at the aging process is demonstrated. The possibility of applying the method for measuring the optical attenuation in the dielectric liquids with high transparency is shown.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"59 1","pages":"423-425"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74650791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive encrypted cloud storage model 自适应加密云存储模型
Esteban C. Lopez-Falcon, A. Tchernykh, N. Chervyakov, M. Babenko, Elena Nepretimova, V. Miranda-López, A. Drozdov, G. Radchenko, A. Avetisyan
In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechanism between cloud providers. We provide theoretical analysis and experimental evaluation of our scheme with six real data storage providers. We show how dynamic adaptive strategies not only increase security, reliability, and reduction of data redundancy but allow processing encrypted data. We also discuss potentials of this approach, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage.
本文提出了一种异构分布式云环境下的自适应数据存储模型。该系统采用了秘密共享方案和基于冗余剩余数系统(RRNS)的纠错码方法。我们考虑数据的上传、存储和下载。为了尽量减少数据访问,我们在云提供商之间使用数据传输机制。在六个实际的数据存储提供商中对该方案进行了理论分析和实验评估。我们展示了动态自适应策略如何不仅提高安全性、可靠性和减少数据冗余,而且允许处理加密数据。我们还讨论了这种方法的潜力,并讨论了减轻与信息丢失、长时间拒绝访问和信息泄漏相关的机密性、完整性和可用性风险的方法。
{"title":"Adaptive encrypted cloud storage model","authors":"Esteban C. Lopez-Falcon, A. Tchernykh, N. Chervyakov, M. Babenko, Elena Nepretimova, V. Miranda-López, A. Drozdov, G. Radchenko, A. Avetisyan","doi":"10.1109/EICONRUS.2018.8317099","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317099","url":null,"abstract":"In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechanism between cloud providers. We provide theoretical analysis and experimental evaluation of our scheme with six real data storage providers. We show how dynamic adaptive strategies not only increase security, reliability, and reduction of data redundancy but allow processing encrypted data. We also discuss potentials of this approach, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"9 1","pages":"329-334"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of trends and problems of technological potential increasing in the Russian industrial sector 分析俄罗斯工业部门技术潜力增加的趋势和问题
Christina V. Samonova
This article analyzes the modern trends in the increasing and using of technological potential in the Russian economy. The main factors constraining technological development and increasing the technological backwardness of Russian industry are identified, in particular: systemic industry problems, resource constraints, competitiveness problems, etc. In this work an indicator of capacity utilization was chosen as an objective indicator of the assessment of production opportunities for increasing the technological potential in industry. According to this indicator, the industry is divided into three main groups: underutilized industries, industries with an additional reserve and highly loaded industries.
本文分析了俄罗斯经济中技术潜力增加和利用的现代趋势。确定了制约俄罗斯工业技术发展和技术落后的主要因素,特别是:系统性产业问题、资源约束、竞争力问题等。在这项工作中,选择了产能利用率指标作为评价提高工业技术潜力的生产机会的客观指标。根据这一指标,该行业分为三大类:未充分利用的行业、有额外储备的行业和高负荷行业。
{"title":"Analysis of trends and problems of technological potential increasing in the Russian industrial sector","authors":"Christina V. Samonova","doi":"10.1109/EICONRUS.2018.8317325","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317325","url":null,"abstract":"This article analyzes the modern trends in the increasing and using of technological potential in the Russian economy. The main factors constraining technological development and increasing the technological backwardness of Russian industry are identified, in particular: systemic industry problems, resource constraints, competitiveness problems, etc. In this work an indicator of capacity utilization was chosen as an objective indicator of the assessment of production opportunities for increasing the technological potential in industry. According to this indicator, the industry is divided into three main groups: underutilized industries, industries with an additional reserve and highly loaded industries.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"90 1","pages":"1265-1267"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73047101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using unauthorized access to information based on applets 使用基于applet的未经授权的信息访问
S. Sokolov, O. M. Alimov, L. E. Ivleva, Ekaterina Yu. Vartanova, V. Burlov
The problem of unauthorized access to information on Web sites through the use of malicious code by an attacker leads to undesirable consequences that arise both on the server side and on the users side. This article is devoted to the review and analysis of existing methods for ensuring the information security of automated systems for authentication and distributed networks. The existence of vulnerabilities on most modern Web content management platforms allows an attacker to inject malicious files onto the server or modify existing files. Recently, there has been a large increase in cybercrime, which is a fairly lucrative business for intruders. To avoid the introduction of malicious code on the site, in addition to the above steps, you should use the SCP / SSH / SFTP protocols instead of FTP to download files to the server, which will prevent the passwords from being sent “in the clear”.
攻击者通过使用恶意代码对Web站点上的信息进行未经授权的访问,会导致服务器端和用户端都出现不希望出现的后果。本文致力于审查和分析用于确保身份验证和分布式网络的自动化系统的信息安全的现有方法。大多数现代Web内容管理平台上存在的漏洞允许攻击者将恶意文件注入服务器或修改现有文件。最近,网络犯罪大幅增加,这对入侵者来说是一笔相当有利可图的生意。为了避免网站上引入恶意代码,除了以上步骤外,您应该使用SCP / SSH / SFTP协议而不是FTP将文件下载到服务器,这样可以防止密码被“明文”发送。
{"title":"Using unauthorized access to information based on applets","authors":"S. Sokolov, O. M. Alimov, L. E. Ivleva, Ekaterina Yu. Vartanova, V. Burlov","doi":"10.1109/EICONRUS.2018.8317046","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317046","url":null,"abstract":"The problem of unauthorized access to information on Web sites through the use of malicious code by an attacker leads to undesirable consequences that arise both on the server side and on the users side. This article is devoted to the review and analysis of existing methods for ensuring the information security of automated systems for authentication and distributed networks. The existence of vulnerabilities on most modern Web content management platforms allows an attacker to inject malicious files onto the server or modify existing files. Recently, there has been a large increase in cybercrime, which is a fairly lucrative business for intruders. To avoid the introduction of malicious code on the site, in addition to the above steps, you should use the SCP / SSH / SFTP protocols instead of FTP to download files to the server, which will prevent the passwords from being sent “in the clear”.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"1 1","pages":"128-131"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75578737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of secured distributed cloud data storage based on multilevel RNS 基于多级RNS的分布式云数据安全存储分析
A. Tchernykh, M. Babenko, N. Chervyakov, V. Miranda-López, J. M. Cortés-Mendoza, Zhihui Du, P. Navaux, A. Avetisyan
Cloud data storages are functioning in the presence of the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and technical failures. In this paper, we provide analysis of reliable, scalable, and confidential distributed data storage based on Multilevel Residue Number System (RNS) and Mignotte secret sharing scheme. We use real cloud providers and estimate characteristics such as the data redundancy, speed of data encoding, and decoding to cope with different user preferences. The analysis shows that the proposed storage scheme increases safety and reliability of traditional approaches and reduces data storage overheads by appropriate selection of RNS parameters.
云数据存储在存在与信息丢失、长期拒绝访问、信息泄露、阴谋和技术故障相关的机密性、完整性和可用性风险的情况下运行。本文分析了基于多级剩余数系统(multi - level residual Number System, RNS)和Mignotte秘密共享方案的可靠、可扩展、机密的分布式数据存储。我们使用真实的云提供商,并估计数据冗余、数据编码速度和解码等特征,以应对不同的用户偏好。分析表明,该存储方案通过合理选择RNS参数,提高了传统方法的安全性和可靠性,降低了数据存储开销。
{"title":"Analysis of secured distributed cloud data storage based on multilevel RNS","authors":"A. Tchernykh, M. Babenko, N. Chervyakov, V. Miranda-López, J. M. Cortés-Mendoza, Zhihui Du, P. Navaux, A. Avetisyan","doi":"10.1109/EICONRUS.2018.8317112","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317112","url":null,"abstract":"Cloud data storages are functioning in the presence of the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and technical failures. In this paper, we provide analysis of reliable, scalable, and confidential distributed data storage based on Multilevel Residue Number System (RNS) and Mignotte secret sharing scheme. We use real cloud providers and estimate characteristics such as the data redundancy, speed of data encoding, and decoding to cope with different user preferences. The analysis shows that the proposed storage scheme increases safety and reliability of traditional approaches and reduces data storage overheads by appropriate selection of RNS parameters.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"98 1","pages":"382-386"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74828379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The compatibility verification of batteries and battery chargers to ripples in battery float charge mode 电池浮充模式下电池与电池充电器对波纹的兼容性验证
Aleksandr D. Kupchinov, N. Smotrov, Yury P. Gusev
In this paper, it was received a dependence of battery current ripples rms from internal resistance of battery. It was got, that 6-pulse rectifier bridge is a current source in pulsating component. The conclusion is made that addition of L-C filter to battery charger decrease values of current ripples, but in the area of little internal resistances (for example, for AGM type battery) that value can exceed the allowable value. Based on received dependences, it was designed a method of current ripples calculation, that was verificated by experiments with real batteries and battery chargers. The difference between the results of calculation with method using and experiments doesn't exceed 10%. This method allows to check the compatibility of battery and battery charger, based on its catalog parameters.
本文得到了电池电流纹波rms与电池内阻的依赖关系。结果表明,六脉冲整流桥是脉动元件中的电流源。在电池充电器中加入L-C滤波器可以降低电流纹波值,但在内阻较小的区域(如AGM型电池),该值会超过允定值。基于接收到的依赖关系,设计了一种计算电流脉动的方法,并通过实际电池和电池充电器的实验进行了验证。用该方法计算的结果与实验结果相差不超过10%。此方法允许检查电池和电池充电器的兼容性,根据其目录参数。
{"title":"The compatibility verification of batteries and battery chargers to ripples in battery float charge mode","authors":"Aleksandr D. Kupchinov, N. Smotrov, Yury P. Gusev","doi":"10.1109/EICONRUS.2018.8317189","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317189","url":null,"abstract":"In this paper, it was received a dependence of battery current ripples rms from internal resistance of battery. It was got, that 6-pulse rectifier bridge is a current source in pulsating component. The conclusion is made that addition of L-C filter to battery charger decrease values of current ripples, but in the area of little internal resistances (for example, for AGM type battery) that value can exceed the allowable value. Based on received dependences, it was designed a method of current ripples calculation, that was verificated by experiments with real batteries and battery chargers. The difference between the results of calculation with method using and experiments doesn't exceed 10%. This method allows to check the compatibility of battery and battery charger, based on its catalog parameters.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"54 1","pages":"696-700"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77613595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated control system of fabrics parameters that uses computer vision 采用计算机视觉的织物参数自动控制系统
V. Gorbunov, V. Bobkov, Nyan Win Htet, E. Ionov
This article describes method of automated quality monitoring of the produced fabric. The monitoring system consists of a web camera and micro computer, which allows to determine the geometric dimensions of the spacing between the transverse threads of the fabric. The management of these sizes provides the possibility to control the density of the finished fabric. The described system allows to automate the control of fabric quality. Considered algorithm calculating the distance between the transverse threads based on the microcomputer Raspberry pi and the Python programming language.
本文介绍了生产织物质量自动监控的方法。监控系统由网络摄像机和微型计算机组成,可以确定织物横向螺纹之间间距的几何尺寸。这些尺寸的管理提供了控制成品织物密度的可能性。该系统可实现织物质量的自动化控制。基于树莓派微机和Python编程语言的横向线程间距计算算法。
{"title":"Automated control system of fabrics parameters that uses computer vision","authors":"V. Gorbunov, V. Bobkov, Nyan Win Htet, E. Ionov","doi":"10.1109/EICONRUS.2018.8317438","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317438","url":null,"abstract":"This article describes method of automated quality monitoring of the produced fabric. The monitoring system consists of a web camera and micro computer, which allows to determine the geometric dimensions of the spacing between the transverse threads of the fabric. The management of these sizes provides the possibility to control the density of the finished fabric. The described system allows to automate the control of fabric quality. Considered algorithm calculating the distance between the transverse threads based on the microcomputer Raspberry pi and the Python programming language.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"93 1","pages":"1728-1730"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80470683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Influence of the leakage flux of the transformer on the welding current of high frequency resistance spot welding systems 变压器漏磁对高频电阻点焊系统焊接电流的影响
L. Sakhno, O. Sakhno, Yuri V. Radomsky
High frequency resistance spot welding systems are considered. They have full-wave centre tapped output rectifiers and three-winding transformer. The leakage flux of three-winding transformer including in the systems, influences on the welding current. For calculation of welding current the three-winding transformer is replaced by two two-winding ones. The mutual influence of the magnetic leakage fields of these two-winding transformers on welding current is investigated. It is shown that welding current depends both on the modulus and the sign of the coupling factor of the magnetic leakage fields of these two-winding transformers. The paper presents the dependences of the welding current from the coupling factor. They can be used for creation of economical transformers.
考虑了高频电阻点焊系统。它们有全波中心抽头输出整流器和三绕组变压器。系统中三绕组变压器的漏磁对焊接电流的影响。为了计算焊接电流,将三绕组变压器改为两个两绕组变压器。研究了两绕组变压器漏磁场对焊接电流的相互影响。结果表明,焊接电流与两绕组变压器漏磁场的模量和耦合系数的符号有关。本文介绍了耦合系数对焊接电流的依赖关系。它们可用于制造经济型变压器。
{"title":"Influence of the leakage flux of the transformer on the welding current of high frequency resistance spot welding systems","authors":"L. Sakhno, O. Sakhno, Yuri V. Radomsky","doi":"10.1109/EICONRUS.2018.8317070","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317070","url":null,"abstract":"High frequency resistance spot welding systems are considered. They have full-wave centre tapped output rectifiers and three-winding transformer. The leakage flux of three-winding transformer including in the systems, influences on the welding current. For calculation of welding current the three-winding transformer is replaced by two two-winding ones. The mutual influence of the magnetic leakage fields of these two-winding transformers on welding current is investigated. It is shown that welding current depends both on the modulus and the sign of the coupling factor of the magnetic leakage fields of these two-winding transformers. The paper presents the dependences of the welding current from the coupling factor. They can be used for creation of economical transformers.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"35 1","pages":"223-226"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81636101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aggregation process for implementation of application security management based on risk assessment 基于风险评估实现应用程序安全管理的聚合过程
P. Anatoliy, F. Yuri, D. G. Vagiz, V. Yana, V. Aleksandr
This article is devoted to the review and analysis of existing methods of ensuring information security based on risk models. The strengths and weaknesses of the model are investigated on the basis of reliability theory. The article discusses potential obstacle to managing application security effectively and describes five steps for managing security. Create inventory of application and their attributes and evaluating their role in business impact (Create a profile for each application and conduction analysis of date processed in the application). Software vulnerability search (Static Analysis (“white-box”); Dynamic Analysis (“black-box”); Interactive Analysis (“glass-box”); Mobile Application Analysis); Risk assessment and prioritization of vulnerabilities (Setting priorities for applications; Setting priorities for types of vulnerabilities; Setting priorities for the development team; Changing vulnerability priorities and reassessing risks). Elimination of vulnerabilities and minimization of risks (security manager sets priorities and firmed tasks for the development team.
本文致力于回顾和分析现有的基于风险模型的信息安全保障方法。基于可靠性理论,分析了该模型的优缺点。本文讨论了有效管理应用程序安全性的潜在障碍,并描述了管理安全性的五个步骤。创建应用程序及其属性的清单,并评估它们在业务影响中的角色(为每个应用程序创建概要文件,并对应用程序中处理的数据进行分析)。软件漏洞搜索(静态分析(“白盒”);动态分析(“黑盒”);互动分析(“玻璃盒”);移动应用分析);漏洞的风险评估和优先排序(为应用程序设置优先级;为漏洞类型设置优先级;为开发团队设定优先级;改变脆弱性优先级和重新评估风险)。消除漏洞和最小化风险(安全管理人员为开发团队设置优先级和确定任务)。
{"title":"Aggregation process for implementation of application security management based on risk assessment","authors":"P. Anatoliy, F. Yuri, D. G. Vagiz, V. Yana, V. Aleksandr","doi":"10.1109/EICONRUS.2018.8317039","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317039","url":null,"abstract":"This article is devoted to the review and analysis of existing methods of ensuring information security based on risk models. The strengths and weaknesses of the model are investigated on the basis of reliability theory. The article discusses potential obstacle to managing application security effectively and describes five steps for managing security. Create inventory of application and their attributes and evaluating their role in business impact (Create a profile for each application and conduction analysis of date processed in the application). Software vulnerability search (Static Analysis (“white-box”); Dynamic Analysis (“black-box”); Interactive Analysis (“glass-box”); Mobile Application Analysis); Risk assessment and prioritization of vulnerabilities (Setting priorities for applications; Setting priorities for types of vulnerabilities; Setting priorities for the development team; Changing vulnerability priorities and reassessing risks). Elimination of vulnerabilities and minimization of risks (security manager sets priorities and firmed tasks for the development team.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"6 1","pages":"98-101"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81917739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The problem of determining the position of the metal in levitation melting 确定金属在悬浮熔化中的位置的问题
A. Ivan, I. Evgeniy, V. Nikolay
The correctness of using the moving mesh, which is the physical interface of the Comsol Multiphysics, to determine the position of the workpiece relative to the inductor during levitation melting is analyzed. The problem deals with transient modes of efforts, coordinate, velocity. Transient processes are described by ordinary differential equations. This model provides the opportunity to predict the maximum weight of the melting workpiece, the electromagnetic and energy characteristics, depending on the mass of the workpiece. The results are compared between the hydrodynamic calculation of the melted metal with positioning and the arbitrarily given coordinate.
分析了利用Comsol Multiphysics的物理接口——运动网格来确定工件在悬浮熔化过程中相对于电感器的位置的正确性。该问题涉及功、坐标、速度的瞬态模式。瞬态过程用常微分方程来描述。该模型提供了根据工件质量预测熔化工件的最大重量、电磁和能量特性的机会。将计算结果与任意给定坐标下熔化金属的流体力学计算结果进行了比较。
{"title":"The problem of determining the position of the metal in levitation melting","authors":"A. Ivan, I. Evgeniy, V. Nikolay","doi":"10.1109/EICONRUS.2018.8317211","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317211","url":null,"abstract":"The correctness of using the moving mesh, which is the physical interface of the Comsol Multiphysics, to determine the position of the workpiece relative to the inductor during levitation melting is analyzed. The problem deals with transient modes of efforts, coordinate, velocity. Transient processes are described by ordinary differential equations. This model provides the opportunity to predict the maximum weight of the melting workpiece, the electromagnetic and energy characteristics, depending on the mass of the workpiece. The results are compared between the hydrodynamic calculation of the melted metal with positioning and the arbitrarily given coordinate.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"1 1","pages":"799-802"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84876531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1