{"title":"Methods and algorithms of intellectual support in making managerial decisions in the implementation of security alarm tasks at objects of special importance","authors":"O. V. Tolstykh, O. V. Isaev","doi":"10.21822/2073-6185-2023-50-4-139-147","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-139-147","url":null,"abstract":"Objective. Currently, there is a problem of developing low-cost and functional SOTC controllers with support for algorithms for controlling the totality of elements of life support systems and subsystems of HMB OOV, for example, access control and management systems (ACS), as well as the possibility of integrating the proposed SOTC solutions into existing HMB facilities. This article proposes circuit engineering and software approaches to the organization of promising STS implemented on the basis of programmable microcontrollers. Method. To achieve this goal, a systematic approach has been applied, and obtaining a quantitative assessment of the probabilistic characteristics of detecting an intruder is based on the use of mathematical modeling methods. Result. A completed circuit design for a special-purpose COTS controller has been developed, capable of solving highly specialized tasks in OOV, and also characterized by an obvious balance of functional characteristics and cost indicators. Conclusion. The developed SOTS based on universal microcontrollers makes it possible to ensure ease of implementation of security complexes and, if necessary, change the composition of the modules used to transform the intended purpose of the OTS device while maintaining the parametric indicators of the quality of the information system, helps to optimize control and automation processes at OOV in conditions of minimizing costs.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"62 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139603231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of methods for neutralizing «Zero-day» threats","authors":"A. I. Dubrovina, M. H. Alcordi","doi":"10.21822/2073-6185-2023-50-4-93-100","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-93-100","url":null,"abstract":"Objective. The purpose of this study is to develop and analyze methods for neutralizing «zero-day» threats in order to increase the level of cybersecurity and protection of information systems. Method. In this article, a behavioral analysis of the threat is used. The characteristic features of the zero-day exploit behavior have been studied. The threat model is based on solving the tasks of timely detection and neutralization of the threat. Result. The actual problem of information systems security - the threat of «zero-day» is considered. The review of existing neutralization methods and discussion of effective new approaches were carried out. It has been revealed that the main vulnerability is outdated threat signatures. Threat detection is based on a study of the behavior of software a comparison with the previous day tracking is possible mainly by analyzing log files taken from an automated workplace. Conclusion. The content of this work emphasizes the importance of developing methods to neutralize «zero-day» threats in order to avoid the centralized spread of vulnerability and infection of a large number of automated workplaces, which can lead to the suspension of production processes within a large enterprise.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"70 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139606883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. O. Efimov, I. I. Livshits, M. O. Meshcheryakov, E. A. Rogozin, V. R. Romanova
{"title":"On certain aspects of standardization and operating conditions of automated systems","authors":"A. O. Efimov, I. I. Livshits, M. O. Meshcheryakov, E. A. Rogozin, V. R. Romanova","doi":"10.21822/2073-6185-2023-50-4-101-108","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-101-108","url":null,"abstract":"Objective. In this paper, the main aspects of the operating conditions of the AS are considered, as well as the issues of standardization of the stages of the life cycle of the AS (creation, commissioning, maintenance, etc.) at the state level. In this subject area, the technological features of building an AS based on various technical architectures are briefly considered, since both foreign processors based on x86-64 architectures and processors of domestic development based on the Advanced RISC Machine architecture are currently applicable. The use of various components of the AS requires additional study in terms of ordering the composition and configuration of specific SPI. Since each processor has a multi-level architecture, this fact objectively complicates the possibilities for full security testing and detection of all vulnerabilities. Method. In the course of the work, the threats and vulnerabilities of individual components of the AS from the point of view of intentional and unintentional threats are considered. The information on the main state standards applied to ensure the protection of information in the AS at the present time is summarized. Result. The main features of the operating conditions of the AS are considered and it is determined that the vulnerabilities of the components are due to the imperfection of the procedures for developing and covering testing of hardware and software. It is determined that in order to protect information in the AS, it is necessary to build a multi-level protection system with state accreditation. Conclusion. Proposals are presented for the application of state standardization for the protection of information in the AS, taking into account the current and prospective threat landscape, including taking into account the design features (undeclared capabilities) of the components. Overcoming threats is possible with the creation of a multi-level information protection system with state accreditation.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"23 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139606976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the Effectiveness of Programs Optimization Methods for Parallel Computing Systems with GPU","authors":"A. Y. Bezruchenko, V. A. Egunov","doi":"10.21822/2073-6185-2023-50-4-59-74","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-59-74","url":null,"abstract":"Objective. The paper defines the relevance of the task of increasing the efficiency of software, which in this case is understood as reducing the operating time of the designed software in the process of solving computationally complex problems. Method. As an example of such a task, the implementation of the singular value decomposition by the Jacobi method is used. This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. The paper discusses methods for improving the efficiency of software for target computing architectures using CUDA. Result. The existing analytical models for evaluating the effectiveness of computer programs are described. The influence of various optimizations, such as optimization of data transfers, use of the unified memory system, the number of threads, memory access patterns, and a number of others on the efficiency of the resulting software is considered. The process of optimizing the SVD implementation program is described, the results of computational experiments are presented. Conclusion. As the number of threads increases, performance may increase more than the number of threads. Impact of memory access pattern: When the memory access sequence is optimal, performance improves noticeably. Adjusting the share of memory used for L1 cache and shared memory does not have a significant impact on performance","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"23 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of parallel one-dimensional interpolators in C++","authors":"F. V. Abilova, M. Abilov, E. V. Selimkhanov","doi":"10.21822/2073-6185-2023-50-4-37-50","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-37-50","url":null,"abstract":"Objective. The purpose of this article is to research and develop interpolators in the C++ programming language, including linear, quadratic and cubic interpolators, as well as a one-dimensional RBF interpolator. The main tasks are the use of the GSL library, the Lagrange interpolation polynomial, OpenMP, and comparative analysis with the SciPy library. The experiments are aimed at evaluating the effectiveness and applicability of various interpolation methods. Method. The work uses the GSL and Eigen libraries to implement interpolators and optimize computational processes. Linear, quadratic, and cubic interpolators are used to compare performance, and a one-dimensional RBF interpolator is being developed. The Lagrange interpolation method and parallel computing using OpenMP and SIMD are also used to improve efficiency. Result. The results of the research include the successful development and implementation of various interpolation methods in C++. Particular attention is paid to the analysis of the performance and accuracy of each method. Through a comparative analysis with the SciPy library, the authors identify the advantages and disadvantages of various interpolators. The main result is the practical applicability of these methods in the context of specific interpolation problems. Conclusion. The study made it possible to make sure that the implementation of interpolators in the C ++ language has some significant advantages compared to using the SciPy library. In particular, C++ allows for more precise and faster control over calculations, which is especially important in tasks related to numerical interpolation methods. The GSL and Eigen libraries provide powerful tools for optimization and high performance computing, which allows you to achieve high efficiency when implementing interpolation in C ++.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"20 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Shalimov, A. V. Tsybenko, I. N. Goglev, S. A. Loginova
{"title":"Study of the tightness of single seams of LOGICBASE™ / ECOBASE™ PVC membranes in engineering waterproofing systems","authors":"V. Shalimov, A. V. Tsybenko, I. N. Goglev, S. A. Loginova","doi":"10.21822/2073-6185-2023-50-4-203-209","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-203-209","url":null,"abstract":"Objective. Currently, engineering waterproofing systems with polymer waterproofing membranes are widely used at various construction structures. At the same time, the usage of polymer membranes implies the operation of break welds, the strength of which should be no less than the strength of the waterproofing material itself. The purpose of the study is to evaluate the water resistance of single seams (without test channels, welded by manual or automatic equipment) for LOGICBASE™ / ECOBASE™ grade V-SL polymer membranes at a pressure of 1 MPa. Method. Testing of waterproofing seams for water resistance is carried out according to the requirements of GOST EN 1928-2011, method B. The GESTER model GT-C26B hydrostatic pressure testing device is used as a test installation. LEISTER welding equipment of Varimat V2 (automatic equipment) and Triac AT (manual/hand equipment) models was used for welding samples. The width of the weld was at least 30 mm. Result. At a hydrostatic head pressure of 1 MPa, within 24 hours from the start of the test, there were no traces of water penetration in the samples, which indicates that the seams are completely waterproof. Conclusion. Single seams of LOGICBASE™/ECOBASE™ engineered waterproofing PVC membranes are completely sealed at 1 MPa water pressure.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140501393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods for assessing the level of security of software of automated systems of internal affairs bodies and directions for their improvement","authors":"I. Drovnikova, A. Popova","doi":"10.21822/2073-6185-2023-50-4-85-92","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-85-92","url":null,"abstract":"Objective. The purpose of the article is to analyze existing methods and procedures used to assess the level of software security of automated systems, based on a study of scientific literature, international and industry standards of the Russian Federation on information security of automated systems, guidelines and methodological documents of the Federal Service for Technical and Export Control Russia, as well as departmental orders on the protection of information from unauthorized access at informatization facilities of internal affairs bodies. Method. To achieve this goal, the method of system analysis of approaches used in assessing the level of software security in automated systems was used. Result. The results of an analysis of the main approaches to assessing the level of software security in automated systems are presented. The expediency of combining the considered approaches to carry out a quantitative assessment of the level of software security at informatization facilities of internal affairs bodies in real time, taking into account vulnerabilities in the software used, is substantiated. Conclusion. The results obtained can be used to generate indicators of the level of software security in automated systems of internal affairs bodies and to develop methods for their calculation taking into account the time factor.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Gatiev, B. M. Yazyev, Yu. P. Ivanova, S. Klyuev
{"title":"Creep of a closed cylindrical tank at hydrostatic pressure","authors":"M. S. Gatiev, B. M. Yazyev, Yu. P. Ivanova, S. Klyuev","doi":"10.21822/2073-6185-2023-50-4-184-190","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-184-190","url":null,"abstract":"Objective. When constructing the resolving relations of the theory of shells, the validity of the basic assumptions about the material of the structure under consideration is assumed, which is considered homogeneous, isotropic and viscoelastic, i.e. obeying the Maxwell-Gurevich law. The subject to study is a polymer cylindrical shell, rigidly clamped at the base and subject to internal hydrostatic pressure. Method. The problem is reduced to an inhomogeneous differential equation of the fourth degree with respect to the displacement of the middle surface w along the z axis. Since the closed form representation of the solution to this equation is extremely difficult, the search for it is presented numerically, in particular, using the grid method. The creep strain components ε*x, ε*θ, γ*xθ were determined as a linear approximation of the velocity by the Runge-Kutta method. Result. In the process of calculating the shell using moment theory, it was found that as a result of shell creep, tangential stresses increased by more than 12 percent. Conclusion. The proposed technique makes it possible to simulate changes in the mechanical properties of the shell (for example, indirect heterogeneity) caused by the influence of physical fields.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"18 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Zaitsev, M. V. Shamarov, R. A. Zhlobo, E. O. Ivchenko
{"title":"Calculation of a heat exchanger using heat pipes in the exhaust air heat recovery system","authors":"A. S. Zaitsev, M. V. Shamarov, R. A. Zhlobo, E. O. Ivchenko","doi":"10.21822/2073-6185-2023-50-4-17-25","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-17-25","url":null,"abstract":"Objective. The purpose of the work is to develop practical recommendations for the design and manufacture of a heat exchanger using heat pipes, which could find widespread use in heating, ventilation and air conditioning systems at facilities for various purposes. Method. The research is based on methods of thermodynamic analysis, full-scale and computational modeling of processes and objects of refrigeration and cryogenic technology, air conditioning and life support systems. Result. The implementation of the practical recommendations studied in the work on the use and design of heat exchangers using heat pipes in ventilation, heating and air conditioning systems will provide significant savings in energy spent on heating and/or cooling the air supplied to the room served by the HVAC system. To reduce heat loss in a building, it is rational to maintain air balance and compensate for the exhaust air with an organized influx of outside air, to heat which the heat of the removed exhaust air is utilized. Conclusion. Compared to a heat exchanger based on a glycol recuperator, a regenerator using heat pipes is less energy-intensive, requires virtually no maintenance, and is also more energy efficient due to the absence of a pumping device that requires electricity in the design. At the same time, the ability to completely separate the supply and exhaust ventilation flows of the regenerator on heat pipes is preserved, which is extremely in demand in medical institutions, due to the need to comply with strict sanitary standards.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"17 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization method of investment package based on Markowitz portfolio theory","authors":"A. D. Baydalin","doi":"10.21822/2073-6185-2023-50-4-51-58","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-4-51-58","url":null,"abstract":"Objective. The aim of the study is to implement and evaluate the optimization method based on the Markowitz portfolio theory. Method. The model is built using the Python programming language and the necessary libraries. Also, to solve the problem, the principles of financial theory were used - the calculation of the risk of the purchased asset, portfolio diversification and the principle of optimality. These principles form the basis of financial theory and help you make informed decisions related to investment, financing, and risk management. Result. A model of the program has been compiled, which accepts historical data on changes in the value of shares of different companies as input. After that, the optimal portfolio is calculated and displayed in the terminal of the user-investor. Markowitz portfolio theory helps to determine the optimal portfolio that provides the maximum return for a given level of risk or the minimum risk for a given return. The optimal portfolio is tangent to the risk-free asset curve and is the best choice for the investor, given his preferences. Conclusion. The method of forming an investment portfolio developed by Harry Markowitz, aimed at the optimal choice of assets, proceeds from the required ratio of profitability/risk. The ideas formulated by him form the basis of modern portfolio theory. Portfolio theory Markowitz defines an efficient set, which is all possible portfolios with different combinations of assets that provide the same level of risk. Investors can choose portfolios from this set depending on their personal goals and limitations. The variety of assets in a portfolio helps reduce the overall level of risk and improve the risk-reward ratio.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"18 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}