Scientific works of KubSTUIssues → № 1, 2021/January

Table of contents for # 1, 2021/January

Construction and Architecture

About the conditions of volume sealing filled clay soil

V.V. Denisenko, A.V. Osennyaya, A.P. Pinchuk, A.A. Kolomytsev

Samples of silty loam were tested in a compression device. The number of test cycles was limited by the condition of stabilization of the values of the coefficient of elastic deformation. A technique is proposed for the isolation of elastically deforming water and water participating in inelastic deformation as phases of the aggregate state of the soil. It was found that with an increase in soil density, the volume content of mineral particles and elastically deforming water increases and correlates with the density of the soil skeleton, while the volume content of water involved in inelastic deformation of the sample practically does not change.

Keywords: work of deformation, bound water, volumetric content of elastically deforming water, volumetric content of water involved in inelastic deformation.
973 kB

Efficiency of operation of solar collectors for year-year DHW residential and public buildings in the south of Russia

D.B. Rabotyagov, N.D. Izotov, S.V. Onishchenko, V.T. Ivanchenko, V.V. Klimenko

In the modern world, the amount of consumed energy resources and their cost are steadily increasing. The use of renewable energy sources is not widespread in our country. This paper aims to make sure that it is advisable to use RES for year-round hot water supply of residential and public buildings in the South of Russia using a specific example.

Keywords: renewable energy sources (RES), hot water supply (DHW), solar collector, heliosystem, total solar radiation, economic efficiency.
931 kB

Computer Science, Computer Engineering and Management

An approach to building procedures for detecting and preventing distributed denial-of-service attacks based on SIEM systems

A.R. Ocheredko, D.A. Bachmanov, M.M. Putyato, A.S. Makaryan

A distributed denial of service (DDoS) attack is the most serious cyberattack that affects the availability of critical applications. Attackers identify vulnerabilities in devices connected to the network and use them to implement a flooding attack. These computers are combined into a botnet network to further conduct a DDoS attack on the computer of the alleged victim. In addition, during the preparation of DDOS attacks, attackers also gain access to confidential information on hacked devices. Experts in the field of information security are constantly developing new measures to prevent DDOS attacks, but attackers are also improving the methodology of the attack. Thus, researchers need to understand cyberspace and the techniques used to prevent DDoS attacks. This set of algorithms provides a highly effective method for detecting DDoS attacks using the Splunk SIEM system. We consider two methods to prevent DDoS attacks. The first method uses randomly generated captchas, the second executes a bash script to prevent a DDoS attack by automatically blocking the IP address of a client that sends multiple requests at the same time.

Keywords: cybersecurity, DDoS, SIEM, cyber threats, denial of service, botnet.
1 MB

Methods for analysis of text information in the tasks of Internet content monitoring

A.V. Vlasenko, H.S. Tarasov, T.T. Zangiev, I.I. Mukhtarov

The article discusses the methods used in the automated processing of text information from the point of view of their application in the classification system of text objects. The developed automated system allows you to analyze the text using the specified methods. The study allows us to identify the features of the use of these methods in accordance with the goals of text analysis, also describes the model and approaches to the implementation of an automated classification system.

Keywords: static analysis, semantic analysis, morphological analysis, classification, syntaxic analysis.
665 kB

Analysis of the main types of harmful content on the Internet and approaches to the automation of its detection

A.V. Vlasenko, H.S. Tarasov, I.I. Mukhtarov, O.E. Prokopenko

This article describes the main threats to information security in the network. Various objects that have a destructive informational impact on the state of the individual, society and state are considered. There are also specific articles from the criminal and administrative code of the Russian Federation for illegal actions – for the propaganda of both political and religious extremism, misinformation of the population in order to undermine the authority of the authorities, using various posts on social networks, audio information, etc. Describes the key methods counteraction and possible directions of analysis for automated detection of objects carrying information threats.

Keywords: information security, extremism, information and psychological impact, social networks, monitoring.
1 MB

Development of the architecture of filtering and normalization units in the text information classification system

A.V. Vlasenko, H.S. Tarasov, I.A. Korkh, I.I. Mukhtarov

The article discusses the stages of filtration and normalization in the classification system of text objects. The choice of the mathematical apparatus of filtration is substantiated. The architecture of the filtering subsystem, the filter tuning algorithm and the tasks of the normalization subsystem are described. An example of the work of the iteration-based filtering subsystem is given.

Keywords: filtration, normalization, text information, text analysis methods, stemming.
700 kB

Application of mathematical methods of analysis in the formation of registers of information security incidents for an adaptive security system

V.A. Kucher, M.M. Putyato, A.S. Makaryan, N.V. Zhdanova

This article presents the features of the application of mathematical methods of analysis in the formation of registers of information security incidents for an adaptive security system. The article also provides an overview of the sources of incidents and cyber threats, an overview of various analysis methods, and an overview of statistical mathematical methods for implementation. The relevance of the work lies in the widespread use of adaptive information security systems in enterprises. The practical significance of the work is that the use of mathematical methods of analysis when making a choice at different stages of the development of security systems simplifies and structures the work with data, reduces the risk of errors due to the human factor.

Keywords: cybersecurity, mathematical methods of analysis, incident register, adaptive security system, mathematical statistics, intelligent statistical analysis.
292 kB

Analysis of the existing automated control systems of the apartment equipment

N.D. Izotov, D.B. Rabotyagov, S.V. Onishchenko, V.V. Klimenko, V.T. Ivanchenko

Increasing the energy efficiency of individual and multi-apartment residential buildings is an urgent problem, since in this case, a decrease in the need for energy supply will lead to a decrease in the costs of residents, as well as to a decrease in the productive capacity of energy producing enterprises (TPP, HPP, NPP), thereby, reducing emissions in atmosphere, which contributes to the improvement of the ecological situation.

Keywords: equipment control automation systems, smart home, internal microclimate.
351 kB

Information technology and document management in a global challenges

E.I. Kashirina, A.S. Smirnova

The results of the strategy and policy of Kuban State Technological University in the period of digital transformation are presented. Some advantages in providing access to information in a remote format are analyzed. The main solutions for the use of electronic materials are highlighted. The single digital environment of the university on the basis of modern information and telecommunication technologies, created to support organizational and managerial activities and the educational process, is considered.

Keywords: information and telecommunications technologies, automated systems, strategy, online access, information environment.
600 kB

Synthesis of a modified PID-controller under the conditions of multi-mode operation noisy object

E.A. Shakhray, V.F. Lubentsov, E.V. Lubentsova

The problem of attenuation of noise in the measured signal using a nonlinear link is considered. The characteristic of the link approximates the dead zone with saturation, which is a modification of the controller. The obtained results of the study of the system allow us to note the attenuation of the noise, which does not lead to a decrease in the control accuracy. In the transient mode, the same time (not exceeding 26 minutes) is provided for reaching the set value of the controlled variable at different noise levels in the error channel. In addition, it is found that when a nonlinear continuous function approximating the dead zone is introduced into the system, no reconfiguration of the PID-controller is required for systems with varying noise levels.

Keywords: controller, dead zone, approximating nonlinear function, external noise, transient and steady-state modes.
246 kB

Application of global navigation satellite systems in road transport as one of the ways to ensure road safety

D.Yu. Lotnikova, V.V. Nagorny

Safety is the number one priority for the road transport industry. Solving the problems of today with the help of tomorrow’s technologies, the use of global navigation satellite systems in road transport as one of the ways to ensure road safety. Implementing technological innovations using global navigation satellite systems will naturally modernize the industry and make it safer in the short term.

Keywords: global navigation systems, road transport, safety, resource saving, efficiency.
200 kB

Difficulties and prospects of “Green logistics”

D.Yu. Lotnikova

In today’s highly competitive environment, Green Logistics issues are getting a lot of attention. As it is an important part of supply chain management and plays an important role in improving the transportation system. Logistics facilitates the delivery of products and services as needed and requested by the client. It serves as an important factor in the growth of trade and commerce in the economy as it helps in economic transactions. We define logistics as “the process of planning, implementing and controlling efficient, cost-effective flow and storage of raw materials, work in progress, finished goods and related information from point of origin to point of consumption.

Keywords: Green logistics, ecology, conservation, supply chains, best available technology.
198 kB

A genetic approach to the solution of the problem of formation of the examinations schedule in higher educational institutions

V.A. Chastikova, A.S. Bahtin

This article proposes an approach to solving the problem of scheduling examinations in higher education institutions based on genetic algorithms. In the given mathematical model, the schedule is presented in the form of a matrix, the elements (cells) of which carry information about a specific exam, or about the absence of any of them. In the terminology of genetic algorithms, the solution to the problem (chromosome) is the schedule matrix, respectively, the genome is the location of the exam cell in it. The fitness function (fitness function) reflects the criteria for optimal scheduling and penalties for the presence of unacceptable genes. Genetic operators are implemented taking into account the specifics of the problem and the given mathematical model of the exam schedule. In the scheme of the crossing-over operator, the choice of parents is based on the principles of outbreeding, the process of exchange of random genes between parent chromosomes is regulated by the coefficient of gene transfer from the parent with the best fitness. The mutation operator performs random “mixing” of a certain number of genes of the selected chromosome; the selection operator uses the tournament selection model. The article provides explanations for the specific features of the practical application of the genetic algorithm in the framework of the problem of forming the schedule of exams in universities.

Keywords: exam schedule, genetic algorithm, crossover, mutation, selection, heuristic algorithm, fitness function.
1 MB

Research of efficiency of the Harris hawks algorithm in the global optimization problem

V.A. Chastikova, P.A. Merkulov

This article presents a study of the Harris hawk heuristic algorithm related to multi-agent methods of swarm intelligence, using the example of solving the problem of global optimization of multi-parameter functions with a complex landscape. An application has been developed in the C # programming language that illustrates the work of the method in a convenient graphical interface. As a result of the experiments, the optimal set of algorithm parameters was found, which ensures the effective operation of the method for the problem of global optimization of multiextremal functions. The accuracy and speed of the algorithm were selected as performance criteria. In conclusion, it should be noted that the Harris hawk algorithm is robust to input data, since it performs equally well both on functions of small dimensions and on large ones.

Keywords: Harris hawks algorithm, heuristic algorithm, swarm intelligence, global optimization.
1 MB

Electrical engineering

Experimental studies of a two-inlet generator set

Ya.M. Kashin, L.E. Kopelevich, A.V. Samorodov, V.A. Kim, I.A. Gorbunov, M.S. Khristoforov

The article discusses a two-input generator set and an experimental stand for its study. The article presents the experimental characteristics of a full-scale model of a two-input generator set in comparison with the results of mathematical modeling. A feature of the two-input generator set considered in the article is the possibility of its effective use, for example, as a converter of mechanical energy of rotation (wind energy) supplied to the mechanical input of a machine, and DC electric energy (solar light energy converted by photoelectric converters into DC electricity current). At present, the process of expanding the use of renewable energy sources is observed all over the world, which is directly related to the priority direction of the development of the electric power industry. The expanded use of renewable energy sources presupposes the parallel operation of renewable energy converters with an external three-phase network, which, in turn, requires synchronization of the output parameters of these devices with the parameters of the external network.

Keywords: experiment, generator, full-scale model, alternative energy, renewable energy sources.
557 kB
© 2013—2021 “KubSUT” FSBEI HE. All rights reserved