A. I. Miftahova, E. I. Yangirov, E. I. Karaseva, A. I. Yangirov, E. Nikulina, I. Drovnikova
{"title":"Development of a software and hardware solution to identify trends in demand for goods","authors":"A. I. Miftahova, E. I. Yangirov, E. I. Karaseva, A. I. Yangirov, E. Nikulina, I. Drovnikova","doi":"10.21822/2073-6185-2023-50-1-114-122","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-114-122","url":null,"abstract":"Objective. The aim of the research work is to develop a software solution for identifying trends in demand for consumer goods by analyzing big data.Method. To achieve this goal, the work analyzed the current state of development of the Internet retail market in Russia, as well as the technologies and tools for analyzing big data necessary for designing a software and hardware solution. To evaluate the effectiveness of the obtained data processing model, a sample obtained from open sources is used.Result. As a result of the study, a technical solution has been developed that allows analyzing the demand for goods in a given time range based on data from open sources.Conclusion. A software component has been developed to analyze the demand for consumer goods based on order data. The resulting technical solution supports batch processing of data, and the architecture of the infrastructure component allows distributed computing. Testing the tool on a real sample showed the effectiveness of this approach to analyzing consumer demand trends.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128335546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles of construction of a multifunctional intelligent electric energy meter with advanced communication and functional capabilities","authors":"I. A. Magomedov, M. N. Khidivov, A. I. Magomedov","doi":"10.21822/2073-6185-2023-50-1-89-98","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-89-98","url":null,"abstract":"Objective. Development of principles for the construction of a multifunctional intelligent electric energy meter (MSE) with expanded communication and functional capabilities and the construction of MSE based on them for automated systems of commercial accounting of energy consumption (ASKUE).Method. When developing the principles of the construction of the IEE, an analysis of existing electric energy metering devices was carried out and their main disadvantages were identified, which made it possible to improve the characteristics and expand the functionality of metering devices. The operability of the main components of the IEE is confirmed by the results of mathematical and physical modeling, which showed the possibility of improving the metrological characteristics and technical parameters that determine the quantitative, qualitative and cost characteristics of the devices.Result. The principles of the construction of the IEE have been developed, which makes it possible to create IEE with expanded communication and functional capabilities for the ASUE.Conclusion. Using them in ASCUE posvolit: -to build self-adjusting mesh networks based on them, which can be used in the construction of ASCS with increased survivability; -to ensure the exchange of accounting and service information with the ASKUE over the radio channel, PCL modem and RS-485 (CAN) interface, which increases the reliability of obtaining accounting information and integrate the MISEE into existing ASKUE, because it makes it possible to select the appropriate type of specific ASKUE interface or communication interfaces \"counter-ASKUE\";- regulate energy consumption and independent disconnection of the consumer from the network for each subscriber unit (separately for each subscriber) in case of arrears of payments, network overload and unauthorized access to the nodes and blocks of the meter in various ways;- to improve the operating conditions of the meter when organizing electronic payments and increasing the reliability of accounting information due to contactless remote removal of information by means of communication interfaces for each subscriber or by means of an individual remote control (remote control).-to reduce the hardware costs of servicing one subscriber associated with the use of the main units and units of the meter to account for energy consumption for all subscribers, and, as a result, the low cost of electricity metering in recalculation per subscriber.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Tebueva, V. Antonov, M. Kabinyakov, N. Svistunov
{"title":"Algorithm for monitoring the dynamic zone of forest fires by a group of unmanned aircraft","authors":"F. Tebueva, V. Antonov, M. Kabinyakov, N. Svistunov","doi":"10.21822/2073-6185-2023-50-1-140-151","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-140-151","url":null,"abstract":"Objective. The aim of the study is to develop an algorithm for monitoring forest fire zones, carried out by unmanned aerial vehicles (UAVs).Method. The study is based on methods of algorithmic support, methods of analysis and synthesis of automated control systems for technological objects.Result. The technologies and methods for monitoring forest fires are considered, which confirms the relevance of the use of UAVs to perform these tasks. An algorithm for the use of UAV swarms for monitoring forest fire zones is presented. The algorithm includes enlarged stages of decomposition of the global problem, distribution of tasks, application of methods of collective decision-making, etc.Conclusion. The proposed algorithm can be implemented subject to the development of swarm control theory.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128153159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems of information technology support for implementation BIM concepts","authors":"L. Malyavkina, A. G. Savina, D. Savin","doi":"10.21822/2073-6185-2023-50-1-99-113","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-99-113","url":null,"abstract":"Objective. The purpose of the study is to analyze the current level of development of the digital infrastructure of the urban planning sector, to identify the features of information technology support for the implementation of the BIM concept at the stages of the life cycle of the CCS and the functionality presented on the national market of solutions that support BIM technology. Method. Within the framework of the study, the methods of logical, structural, comparative, system analysis were used; modeling and graphical presentation of results.Result. It has been established that in the current period, most companies in the Russian architecture and construction industry are considering the transition to a fully integrated BIM as a long-term development format. An objective obstacle to a quick transition is the complexity of complex IT support for BIM processes and the level of current development of digital infrastructure. It has been established that the priority direction for the development of the IT industry in the context of ensuring the implementation of the BIM concept is the formation of a single ecosystem of Russian BIM software. Along with the need to develop competitive Russian software products, ensuring their interoperability and standardization of data exchange formats are highlighted as the main problems. The key parameters for assigning a software product to the BIM group are determined, the levels of maturity of the BIM data exchange process are identified, and approaches to the organization of exchange processes are considered.Conclusion. The proposed criteria for classifying software products as solutions that support the BIM concept can be used in the formation of functional requirements for the developed import-independent software products. The interpretation of the interoperability reference model in relation to BIM technology can be used to develop the integration capabilities of BIM tools in a single information technology environment of general data, and also become a methodological basis for creating an open national data exchange standard.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121471213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of existing algorithms for classification and clustering of laser reflection points (k-Means, DBSCAN, SVM) to solve territorial planning problems","authors":"D. Gura, O. S. Boltovnina","doi":"10.21822/2073-6185-2023-50-1-75-80","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-75-80","url":null,"abstract":"Objective. The aim of the study is to generalize the experience of using and reveal the features of methods for classifying and clustering images obtained by laser scanning.Method. The study is based on the use of algorithms for recognition, clustering and classification of data obtained using laser scanning.Result. A brief review of existing algorithms used for clustering images obtained by laser scanning has been carried out. The possibility of using sequentially the K-means and DBSCAN algorithms for clustering in relation to objects of various shapes is shown. The possibilities of using algorithms for the classification and clustering of laser reflection points (k-Means, DBSCAN, SVM) in the framework of solving territorial planning problems are analyzed.Conclusion. The use of the presented algorithms makes it possible to form data arrays that, when superimposed on each other subsequently and further processed, make it possible to obtain even more accurate representations of objects and territories in territorial planning documents, and in the future, based on the use of machine learning methods and processing of data matrices available in memory, get more accurate information about objects on the ground.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Yefimov, V. S. Nasedkina, A. Popov, E. A. Rogozin, V. R. Romanova
{"title":"Analysis and features of the functioning of protected automated systems of internal affairs bodies under the influence of threats of unauthorized access","authors":"A. Yefimov, V. S. Nasedkina, A. Popov, E. A. Rogozin, V. R. Romanova","doi":"10.21822/2073-6185-2023-50-1-81-88","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-81-88","url":null,"abstract":"Objective. The purpose of the study is to analyze the features of the functioning of protected automated systems and develop a structural diagram of a typical ATS AS, which includes various structural elements.Method. As a fundamental method of conducting research is the method of system analysis.Result. Based on the developed typical structural diagram of the ATS AS, threats to web servers were identified in accordance with the official website of the FSTEC, and, in accordance with them, potential vulnerabilities (weak points in terms of information security) were identified; a classification of all potentially dangerous threats to the information resource of protected ATS automated systems was developed and presented.Conclusion. The materials of the article can be used to analyze and develop a methodology for quantitatively assessing the risks of information security violations of the web servers of the ATS of the Russian Federation; methods for assessing the level of security of the ATS of the Russian Federation; methods of access of regular users of the RF ATS AS to the information resource of these systems based on semantic analysis.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of personnel management of internal affairs bodies on the basis of system analysis procedures","authors":"A. Rybak, R. M. Danilov","doi":"10.21822/2073-6185-2023-50-1-130-139","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-130-139","url":null,"abstract":"Objective. The purpose of the study is to identify the main causes of the growing shortage of personnel resources of territorial divisions of internal affairs bodies (ATS) and appropriate methods of their elimination.Method. When searching for the causes of the personnel shortage of the ATS, the procedures of system analysis were used, on the basis of which the central problem of the staffing of the ATS was identified, a number of tasks and goals were formulated, for the solution of which additional material resources are not required. Mathematical methods of system dynamics were used to solve most problems.Result. In the work, based on the analysis of the operational situation, regulatory and methodological support of the management activities of the internal affairs bodies, it is concluded that there is a systemic problem: the dynamism of the management system of the internal affairs bodies is disrupted, as a result of which the effectiveness of the management process decreases, leading to an increasing trend of a shortage of ATS units. To solve the identified problems, the authors propose the following technologies: calculation of the profitability of the work of territorial divisions of the Ministry of Internal Affairs of Russia, which allows to assess the necessary and sufficient level of efficiency of the use of all types of resources in the performance of official tasks; development of a methodology for calculating the personnel needs of territorial divisions of the Ministry of Internal Affairs of Russia, taking into account the complexity of their activities, workload and regional characteristics; introduction of a new approach to assessing the activities of divisions The Ministry of Internal Affairs of Russia, based on the separation of the reporting system and the evaluation system, improving personnel policy in terms of making the service in the Department of Internal Affairs more attractive, taking into account the new values of modern society. For each presented task, its own tools and solution technology have been developed.Conclusion. The solution of the identified tasks will ensure the uniformity and \"feasibility\" of the workload of its employees, the transparency of the assessment of their activities, which will increase the motivation for conscientious work. Coupled with the improvement of personnel policy to make the service in the internal affairs bodies properly attractive, the expected synergetic effect will reduce the severity of the problem of personnel shortage.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128112910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of machine learning methods for automated detection of network intrusions","authors":"M. Babicheva, I. A. Tretyakov","doi":"10.21822/2073-6185-2023-50-1-53-61","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-53-61","url":null,"abstract":"Objective. Development of automated network attack detection systems capable of adapting to the ever-changing nature of network attacks and new types of threats. Such systems should be based on machine learning algorithms and models that are able to identify complex dependencies between data in the learning process.Method. To train the models, a sample with signs of normal and abnormal traffic was prepared, and it was thinned and balanced as a result of preliminary statistical analysis. Five machine learning algorithms were selected and tested, both on a training set of features and on a real test set obtained experimentally. Based on the results of the experiments, a random forest classifier was selected, which showed the best results.Result. A model for detecting network intrusions has been developed, which showed a detection accuracy of 0.99 on real traffic.Conclusion. It is shown that a machine learning-based network intrusion detection system can solve the problem of flexible protection that could adapt to the ever-changing nature of network attacks, since one of the most important advantages of machine learning in detecting network intrusions is the ability to learn the signs of attacks and identify cases that are uncharacteristic of those that were observed earlier.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Voevodin, V. S. Chernyaev, D. S. Burenok, I. V. Vinogradov
{"title":"Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation","authors":"V. Voevodin, V. S. Chernyaev, D. S. Burenok, I. V. Vinogradov","doi":"10.21822/2073-6185-2023-50-1-62-74","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-62-74","url":null,"abstract":"Objective. The purpose of the study is to develop a methodology for assessing the security of an automated control system of critical information infrastructure from DDoS attacks. The purpose of the methodology development is to provide the decision–maker with a scientifically sound tool for assessing the risk of implementing a DDoS attack.Method. To achieve the stated goal of the study, simulation modeling based on the Monte Carlo method was used.Result. The expediency of using Monte Carlo simulation to assess the probability of server failure under DDoS attacks is confirmed. It was concluded that the server can be considered as a queuing system, however, the flow of incoming applications under DDoS attacks is not Poisson, so the use of analytical expressions to assess the probability of failure is considered incorrect. The simulation results allow the decision-maker to assess the probability of server failure and make organizational and technical decisions to increase the level of security. Analysis of the simulation results showed the effectiveness of improving server performance by increasing service channels.Conclusion. Thus, the developed methodology will be useful in conducting an information security audit of an organization to justify the amount of its insurance premium in the framework of cyber risk insurance. A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. I. Semilyak, T. É. Sarkarov, D. V. Evdulov, K. Nazarov
{"title":"Optimization of thermoelectric temperature control systems","authors":"A. I. Semilyak, T. É. Sarkarov, D. V. Evdulov, K. Nazarov","doi":"10.21822/2073-6185-2023-50-1-33-41","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-1-33-41","url":null,"abstract":"Objective. The aim of the study is to study the methods of temperature control using the Peltier element in a given temperature range.Method. A heating method is applied using a Peltier element in a temperature control device of a small plate by regulating the current and using a cooling fan to reduce inertia.Result. A technique for controlling the Peltier element to maintain the required temperature is obtained, which is carried out using the PWM method generated by the ATmega2560 processor. The H-bridge on the L6203 integrated circuit switches the current direction and can control the current up to 5A on the Peltier element using a PWM signal.Conclusion. The resulting control algorithm provides an increase in the heating current on the Peltier until the temperature rises to a predetermined high temperature value, and then by changing the direction of the current, a cooling current is created on the Peltier element until the temperature of the copper plate drops to a predetermined low temperature. With repeated repetition of this sequence, the regularity of temperature changes is monitored to study the process of heating and cooling the plate using the Peltier element.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}