NBI Technologies最新文献

筛选
英文 中文
Investigation of the Fluid Dynamics of Lubrication in the Gaps of the Gas Distribution Mechanism of the Internal Combustion Engine 内燃机配气机构间隙润滑流体动力学研究
NBI Technologies Pub Date : 2021-09-01 DOI: 10.15688/nbit.jvolsu.2021.1.5
A. Vasilyev, E. Ageev
{"title":"Investigation of the Fluid Dynamics of Lubrication in the Gaps of the Gas Distribution Mechanism of the Internal Combustion Engine","authors":"A. Vasilyev, E. Ageev","doi":"10.15688/nbit.jvolsu.2021.1.5","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2021.1.5","url":null,"abstract":"The method of calculating the fluid dynamics of the lubricant in the gaps is considered on the basis of a generalized mathematical model of the dynamics of the gas distribution mechanism. The results of its use for the drive of the engine exhaust valve are presented. It is shown that the developed methods and algorithms provide a more accurate determination of the dynamic and tribological characteristics of the gas distribution mechanism.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123237999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Client Applications on the Transmission of Mobile Traffic in Communication Networks 客户端应用对通信网络中移动流量传输的影响
NBI Technologies Pub Date : 2021-09-01 DOI: 10.15688/nbit.jvolsu.2021.1.2
Nadezhda Ermakova, Margarita Vodolazkina, L. Gomazkova, Alexey O. Pasyuk, Elena Arepyeva
{"title":"Impact of Client Applications on the Transmission of Mobile Traffic in Communication Networks","authors":"Nadezhda Ermakova, Margarita Vodolazkina, L. Gomazkova, Alexey O. Pasyuk, Elena Arepyeva","doi":"10.15688/nbit.jvolsu.2021.1.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2021.1.2","url":null,"abstract":"The efficiency of traffic transmission through wireless communication networks is currently of considerable interest from a research point of view. This is due to the rapid growth of Internet resources, the convergence of technologies for transmitting heterogeneous traffic, the increased mobility of subscribers of communication networks, as well as the growth in the number of different client applications using mobile data transmission. In this paper, we investigate the impact of the growth of client applications on the transmission of mobile traffic. The study shows that the mobile terminal traffic is stable. It is more variable than a random series, because it consists of frequent reversals, but does not have long-term memory, since the Hurst index ranges from 0.3 to 0.5. The distribution of intervals between the arrival of TCP packets is described by the exponent. The distribution of packet lengths for TCP traffic shows that the bulk of the traffic is carried in long packets (1300–2500 bytes). The immutability of the statistical characteristics of traffic when installing several client applications in comparison with the characteristics obtained in previous studies (with a small number of client applications) indicates the immutability of the quality of service. Therefore, the growth of client applications does not affect the transmission of mobile traffic.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129966740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Impurities in Water Using Nanostructures 利用纳米结构检测水中杂质
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.6
O. Kakorina, I. Kakorin, A. Panchenko
{"title":"Detection of Impurities in Water Using Nanostructures","authors":"O. Kakorina, I. Kakorin, A. Panchenko","doi":"10.15688/nbit.jvolsu.2020.4.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.6","url":null,"abstract":"Saltpeter negatively affects the human body, it contributes to the formation of a dangerous substance in the blood – methemoglobin, which leads to oxygen starvation. An increase in methemoglobin up to 60% leads to a fatal outcome. Also, the excess of saltpeter in water causes poisoning, disorders of the gastrointestinal tract, excretory and endocrine systems, the destruction of tooth enamel and the appearance of caries. Saltpeter can be determined in water by chemical analysis of the liquid, as well as using nanomaterials. These structures have a sufficiently highly developed adsorption surface, this property helps to detect the presence of saltpeter in water, and at the same time to clean it. The results of the studies made it possible to establish that after passing water with an admixture of saltpeter, the concentration of the latter decreased. Thus, the theoretical calculations showing the possibility of saltpeter adsorption by carbon nanotubes were confirmed. The obtained results and the applied methods can be used in conducting complex high-performance water examinations.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134479589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of the Physical and Mechanical Properties of Radio-Absorbing Materials 辐射吸收材料的物理力学性能研究
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.4
A. Vasiliev, A. Afanasiev
{"title":"Investigation of the Physical and Mechanical Properties of Radio-Absorbing Materials","authors":"A. Vasiliev, A. Afanasiev","doi":"10.15688/nbit.jvolsu.2020.4.4","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.4","url":null,"abstract":"The paper studies the physical and mechanical properties of radio-absorbing materials. It is shown that to ensure an effective level of material absorption, it is necessary to introduce carbon fibers in the amount of at least 0.25% by weight.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System for Filtering Unwanted Applications of Internet Resources 过滤因特网资源中不需要的应用程序的系统
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.1
A. Babenko, Yulia Bahracheva, Arina Alеeva
{"title":"System for Filtering Unwanted Applications of Internet Resources","authors":"A. Babenko, Yulia Bahracheva, Arina Alеeva","doi":"10.15688/nbit.jvolsu.2020.4.1","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.1","url":null,"abstract":"Currently, the role of the Internet in the life of society is growing, and the state’s view of it is changing. Increasingly, the content posted on the Web goes beyond the laws of individual countries, their social norms, and the political lines of the authorities. Besides, Internet has a significant impact on intellectual property and telecommunications, jeopardizing the economic interests of many industries. These trends have contributed to the need to filter some types of content, and have caused disputes about the permissible limits of state intervention in the functioning of the network. Content filtering systems and methods were analyzed, and their applicability for each of the information leakage channels was determined: blocking by IP address, blocking by DNS record, blocking by URL, filtering by text content, filtering by extensions and file types, filtering search results. The project of a software package for filtering Internet traffic in the C# programming language was developed and its functionality was described. As a result of the experiments carried out by the filtering system, the following results were obtained: the correctness of filtering by DNS record, the correctness of filtering by URL were successfully checked, reports on identified blocked sites in the filtering log were generated. Thus, the successful conduct of experiments allows us to assert that the software package of content filtering of Internet traffic performs the tasks assigned to it.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116319942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Method for Conducting an Audit of the Information Security System 资讯安全系统稽核方法之发展
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.3
P. Zaporotskov
{"title":"Development of a Method for Conducting an Audit of the Information Security System","authors":"P. Zaporotskov","doi":"10.15688/nbit.jvolsu.2020.4.3","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.3","url":null,"abstract":"Information processes, as well as information resources, manage information of varying degrees of importance for the enterprise. In this regard, the protection of such information is one of the most important procedures in the field of state security, the importance of which is growing every year. The problem of information security – the reliable provision of its safety and the established status of use – is one of the most important problems of our time. The paper considers the existing standards in the field of information security audit. The author has developed an innovative model of audit of the information security system based on the comparison of demand measures of order no. 21 of the FSTEC of Russia and ways of implementation in the subsystem of the information system of personal data protection, the recommendations for inspections of specific measures of protection and used technology audit technical means. The developed method is tested on the example of conducting an audit in “Lama” LLC company. The choice was made to establish the compliance of the organization’s personal data protection system with the requirements of order no. 21 of the FSTEC of Russia. Recommendations have been developed to eliminate the existing shortcomings and inconsistencies by re-equipping the anti-virus protection subsystem and the subsystem of inter-network shielding and protection of communication channels.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129642699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digitalization of Enterprises and Electronic Certification of Equipment of Hazardous Production Facilities 企业数字化与危险生产设施设备电子认证
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.4
A. Kadyrova
{"title":"Digitalization of Enterprises and Electronic Certification of Equipment of Hazardous Production Facilities","authors":"A. Kadyrova","doi":"10.15688/nbit.jvolsu.2020.3.4","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.4","url":null,"abstract":"Stable trouble-free operation of industrial enterprises with hazardous production facilities largely depends on the reliable operation of the main (technological) equipment, which is ensured by timely inspections, technical services and repairs within automated control systems for the maintenance and repair of equipment of hazardous production facilities. In this regard, the electronic certification of equipment or otherwise the creation of electronic repair and maintenance passports is the most important part of the work on the creation of a digital enterprise. The creation of repair and maintenance certificates of equipment is due to the need for digitalization and coverage of the entire life cycle of the equipment: from installation to its decommissioning. The repair and operational passport of equipment of hazardous production facilities is a source of information on all parameters of operation: technical maintenance, repairs, causes and duration of downtime, replacement of components and parts, modernization and movement of equipment, financial costs, analytical conclusions on various cross-sections. The article discusses and analyzes the requirements of regulatory documents for operational documentation, the order of systematization of information on technical equipment during the entire period of its operation. The principles of structuring the equipment of hazardous production facilities are proposed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Developing Recommendations for Improving the Security of Information Systems 制定建议的方法,以提高信息系统的安全性
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.3
N. Golovacheva
{"title":"Methods of Developing Recommendations for Improving the Security of Information Systems","authors":"N. Golovacheva","doi":"10.15688/nbit.jvolsu.2020.3.3","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.3","url":null,"abstract":"With the advent of information technologies, information systems have been widely used in organizations and enterprises. The use of information systems allows optimizing the workforce, automating all or part of business processes. However, the use of information systems requires the development of an information security system to minimize malicious attacks. To reduce the likelihood of malicious attacks, there are a large number of software and hardware-based information security tools. The complexity of computing the distribution of the components of information systems complicates the process of creating and configuring protection systems, the number of threats to security are increasing every year. For a timely response to information security incidents, including attacks, it is necessary to use information system security assessment tools to reduce the risks of security breaches. InfoWath statistics show the growth trend of various types of attacks, both from an external attacker and from an internal one. Therefore, one of the most important tasks is to correctly determine the security of information systems. The paper implements a mathematical model for assessing the security of an information system based on the selected methods. The architecture of the software package for assessing the security of the information system is formed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Interaction Monitoring System with IoT Devices Connected 连接物联网设备的网络交互监控系统
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.2
Gleb Demyanov, N. Sadovnikova
{"title":"Network Interaction Monitoring System with IoT Devices Connected","authors":"Gleb Demyanov, N. Sadovnikova","doi":"10.15688/nbit.jvolsu.2020.4.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.2","url":null,"abstract":"The Internet of Things is a concept of a computer network of physical objects equipped with built-in technologies for interacting with each other or with the external environment, considering the organization of such networks as a phenomenon that can restructure economic and social processes, eliminating the need for human participation from part of actions and operations. IoT technology has had a significant impact on the development of information technology and other industries. According to Forbes, the Internet of Things market is expected to reach $520 billion in 2021, up from $235 billion in 2017, indicating a continued growth in demand for such devices in the future. Gartner Research also estimates that the number of devices connected to the Internet will reach 25 billion by 2021, up from 8.4 billion in 2017. Network with IoT devices connected is an indispensable prey for intruders. There are many ways to attack IoT devices. In this article, the authors have identified several methods of protection. Among them, network interaction monitoring through the analysis is highlighted. The paper also describes how to apply this method in practice.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Interaction of Carbon Dioxide with Modified Functional Groups of Nanotubes 二氧化碳与纳米管修饰官能团相互作用的研究
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.4.5
L. Kozhitov, I. Zaporotskova, N. Boroznina, S. Boroznin, V. Akatiev
{"title":"Investigation of the Interaction of Carbon Dioxide with Modified Functional Groups of Nanotubes","authors":"L. Kozhitov, I. Zaporotskova, N. Boroznina, S. Boroznin, V. Akatiev","doi":"10.15688/nbit.jvolsu.2020.4.5","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.4.5","url":null,"abstract":"The article presents a theoretical study of the possibility of interaction of one of the most common substances in nature – carbon dioxide – with modified functional carboxyl and amine groups of carbon nanotubes and borocarbon nanotubes of the BC5 type. The article analyzes the results of the interaction and provides a comparative analysis of the efficiency of the sorption interaction of a nanosystem with a carbon dioxide molecule. The performed studies prove the implementation of a weak physical sorption interaction between a nanosystem consisting of a carbon nanotube, a boundary-modified amine group, and a carbon dioxide molecule. This allows us talking about a possible sensory interaction that will allow using such a complex to detect a micro amount of a substance-carbon dioxide. Based on this, it can be concluded that modified carbon nanotubes can be elements of sensors for determining the quality of indoor air, act as probes for cantilevers of atomic force microscopes and other devices. Recommendations are given for further use of the results as a basis for creating a highly sensitive new-generation sensor device for detecting micro-quantities of substances.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信