{"title":"Correction of the optimal regulator based on solving the inverse problem of optimal stabilization with vector control","authors":"V. V. Nikulin, P. A. Mishin, P. A. Mishina","doi":"10.21822/2073-6185-2023-50-3-124-131","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-124-131","url":null,"abstract":"Objective. The problem of designing controllers that implement a given programmed movement of a controlled object and the problem of determining the movement of a dynamic system are two main problems in classical control theory. This article discusses the solution of direct and inverse optimal stabilization problems. The state vector is assumed to be completely available for measurement.Method. Based on the optimality ratio linking the weight coefficients of the quadratic quality functional and the optimal gain matrix, which closes the control object, it is proposed to use a numerical method for determining the functional matrices. Mathematical models of autonomous fully controlled objects were used for the study, the formation of which was carried out randomly, in particular, according to the normal distribution law.Result. The initial stage of the solution is associated with modal synthesis, the result of which is a proportional regulator that provides stabilization of the control object by the location of the poles of the synthesized system. The next step is to determine the weighting coefficients of the functional by numerically solving the optimality ratio. The final stage is the solution of the direct optimal stabilization problem, which is based on the Lagrange variational problem. As a result, the optimal regulator is calculated, which, when switched on in a closed system instead of a modal one, reduces the duration of the transient process.Conclusion. The proposed approach of the authors allows minimizing to a certain extent the transients of the adjusted control system.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"56 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of client applications on Blockchain","authors":"O. D. Okladnikova, A. V. Bukov, N. N. Zhukov","doi":"10.21822/2073-6185-2023-50-3-132-141","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-132-141","url":null,"abstract":"Objective . The article discusses issues related to the process of developing client Web applications for IT projects, which are based on the principles of decentralized network technology - blockchain. The authors explore practical ways to implement the user authorization process and its interaction with the blockchain network through a client application. Method . The MetaMask browser extension was chosen as a research tool, which allows you to develop, test and run your own software modules. Result . In the course of the study, the analysis of MetaMask tools was carried out, the processes associated with the start of work were considered both from the point of view of the developer and from the point of view of the wallet user. Understanding the organization of these processes will allow users to form the necessary knowledge in the development of client applications built on blockchain. Conclusion . The program code templates developed by the authors can be used as standard ones in the development of client applications in the decentralized Ethereum network. The advantage of the proposed solutions lies in the use of simple software structures that allow the formation of basic principles.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Malware Analysis","authors":"D. A. Elizarov, A. V. Katkov","doi":"10.21822/2073-6185-2023-50-3-66-71","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-66-71","url":null,"abstract":"Objective . Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. The main task is to analyze malware to assess threats and timely detection and take action. Method . For analysis, you should use an isolated environment with a customized environment and software. Result . This paper describes the process of creating an isolated stand for malware analysis and conducted a practical analysis of the malware.bin file taken from the cyberdefenders.org educational resource. Network interfaces are configured to prevent impact to the network that connects the two virtual machines. As a result of the analysis of the techniques and features used in this malware, it was revealed that it belongs to the Dridex family of banking Trojans. To obtain information from this family, you can use the AppGate Lab Dridex Toolkit. Conclusion . Based on the analysis performed using static and dynamic methods, detection rules can be developed for further identification of malware.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"286 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. U. Mentsiev, T. G. Aigumov, E. M. Abdulmukminova
{"title":"Analysis and training of a traffic sign recognition neural network model","authors":"A. U. Mentsiev, T. G. Aigumov, E. M. Abdulmukminova","doi":"10.21822/2073-6185-2023-50-3-118-123","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-118-123","url":null,"abstract":"Objective . The purpose of the research is to develop and train a neural network model based on convolutional neural networks for effective recognition of road signs in images. Method . Deep learning methods were used, namely convolutional neural networks, which allow you to automatically extract image characteristics and train on a large data set. The research methodology included the following steps: collecting and preparing a variety of road sign data, creating and training a neural network model based on convolutional layers, applying data augmentation methods to improve model performance, and evaluating the model’s effectiveness on a test data set. Result . A neural network model is developed that can classify various types of road signs based on input images with high accuracy. The model was trained on diverse and high-quality data, allowing it to generalize and recognize road signs in different lighting conditions and camera angles. The use of data augmentation techniques significantly increased the model’s performance and improved its generalization ability. Conclusion . The study highlights the importance of using diverse and high-quality data to train a model and applying data augmentation techniques to improve its performance. The study confirms the effectiveness of using neural networks, especially convolutional neural networks, for the task of recognizing road signs in images.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"193 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of the upper hemisphere of a critical information infrastructure facility","authors":"I. A. Loskutov, V. A. Repenko","doi":"10.21822/2073-6185-2023-50-3-100-109","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-100-109","url":null,"abstract":"Objective . Structuring of publicly available information regarding the protection of the upper hemisphere of CII objects. Method . The following methods of scientific cognition are used: systematization, description, analysis, deduction. The article consists of three sections. First, an analysis of the current state of the issue of the need for protection from UAVs is carried out. Accounting is not only military infrastructure, but also civil. In addition, for analysis, the separation of drone attacks is carried out in order to physically destroy the CII object / its part or attack the technical component. In the second part of the work, the analysis of the regulatory framework of Russia and the EU countries is carried out. The greatest emphasis is placed on domestic legislation and the identification of problem areas in relation to the research topic. In the third part of the work, a draft of proposals for the protection of CII objects from threats emanating from UAVs is presented. To do this, the analysis of drone varieties is carried out, the requirements for the system of protection and search for intruders are determined. Result . The article investigates the problems of protecting CII objects from drone attacks. A constant increase in UAV attacks on civilian and military infrastructure was noted, problems of the regulatory framework of Russia in the direction were identified, a proposal for the protection of the upper hemisphere was developed. Conclusions . The conducted research is of an overview nature. The materials presented in the paper can serve as a basis for further research in the direction and for the development of relevant regulatory documents.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"9 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additional functions and additional boundary conditions in heat conduction problems for multilayer bodies","authors":"R. M. Klebleev","doi":"10.21822/2073-6185-2023-50-3-92-99","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-92-99","url":null,"abstract":"Objective . The purpose of the study is to develop a technique for obtaining an analytical solution to the thermal conductivity problem for a 2-layer plate under boundary conditions of the 1st kind. Method . The research method is based on the integral method. In this case, an additional function (DF), additional boundary conditions (ABC) and local coordinate systems are introduced. The DF describes the temperature over time at one of the points of the twolayer system. Its use reduces the partial differential equation to an ordinary equation. DKUs allow you to perform equations on boundaries. Result . It is shown that satisfying the equations on the boundaries leads to their fulfillment inside the domain. Note that additional boundary conditions are satisfied for any other method of obtaining analytical solutions. The only difference is that they are not accepted as conditions subject to separate consideration. An additional function is also a quantity that is determined by any other method of obtaining a solution. The only difference is that it is not singled out for separate consideration. Conclusion . It can be stated that the introduction of an additional function and additional boundary conditions does not distort the original formulation of the problem and is only a means to significantly simplify the process of obtaining an approximate analytical solution and the final expression for it.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting the number of identified information security vulnerabilities based on the theory of “Gray Systems”","authors":"A. O. Efimov, S. A. Mishin, E. A. Rogozin","doi":"10.21822/2073-6185-2023-50-3-72-82","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-72-82","url":null,"abstract":"Objective . The aim of the work is to assess the possibility of applying the theory of “gray systems” to build a methodology for predicting the number of identified vulnerabilities in conditions of uncertainty of influencing factors and lack of initial data, including a comparative analysis of the results of this prediction obtained using traditional and improved models of the theory of “gray systems”, as well as machine learning models. Method . The paper describes a technique for constructing a “gray model” for predicting the number of identified vulnerabilities based on the theory of “gray systems”. The initial data for forecasting is information obtained from the CVE (Common Vulnerabilities and Exposures) vulnerability database. In the course of the study, the results of forecasting obtained using the developed “gray model” and the linear regression model implemented on the basis of the scikit-learn library and the Python programming language are analyzed. Result . The use of a linear regression model and models based on the theory of “gray systems” to predict the number of identified vulnerabilities allows you to get close forecast values. According to data obtained from the CVE vulnerability database, information on 7,015 identified vulnerabilities was published for the 1st quarter of 2023. The forecast obtained on the basis of the traditional model of the theory of “gray systems” turned out to be the closest to the published value. It should be noted that the forecast of the “gray model” is based only on the values of the initial data and does not depend on the circumstances arising in the field of information security, which is a limitation in the use of the proposed methodology. Conclusion . The results of the study indicate the possibility of applying the theory of “gray systems” for short-term forecasting of the number of detected vulnerabilities. The application of the developed methodology makes it possible to carry out the specified forecasting with a limited number of initial data.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136232470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. V. Evdulov, D. A. Magomedov, R. M. Magomedov, K. A. Shikhabidov
{"title":"Research of thermoelectric null-thermostat","authors":"O. V. Evdulov, D. A. Magomedov, R. M. Magomedov, K. A. Shikhabidov","doi":"10.21822/2073-6185-2023-50-3-6-13","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-6-13","url":null,"abstract":"Objective . The purpose of the study is to develop and study the design of a thermoelectric null-thermostat, characterized by low power consumption, in which high accuracy of temperature stabilization of the reference junctions of differential thermocouples is achieved by placing them directly near the water-ice interface. Method . The study was carried out on an experimental model of a thermoelectric null-thermostat. To study heat transfer processes, visual observation of the movement of the ice-water interface in the null-thermostat chamber was carried out. Temperature values were recorded at the lower and upper bases of the chamber, as well as at the hot and cold junctions of the thermoelectric module (TEM) using thermocouples. Result . The dependences of the change in temperature of the upper and lower base of the working chamber, as well as the phase boundary over time, the duration of time for complete ice penetration on the TEM supply current, and the temperature difference, respectively, between the surface of the cold junction of the TEM and the lower base of the working chamber were obtained , the surface of the hot junction of the thermal module and the upper base of the working chamber. Conclusion . It has been established that the speed of movement of the phase boundary strongly depends on the value of the supply current of the thermoelectric battery, which corresponds to the heat flow at the upper and lower base of the working chamber. As follows from the data presented, the change in temperature of the upper base is more noticeable than the lower one. At a current of 2, 4 and 6 A, the speed of movement of the phase boundary is 0.007 m/h, 0.01 m/h and 0.013 m/h, respectively. In this case, the duration of complete melting of ice, corresponding to the duration of operation of the null thermostat, when the TEM supply current changes from 2 to 7 A, is reduced from 1,91⋅10 4 s to 1,38⋅10 4 .","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"117 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical aspects of the development of solar energy refrigeration technology on solid sorbents","authors":"Y. V. Shipulina, M. F. Rudenko, V. N. Sainova","doi":"10.21822/2073-6185-2023-50-3-37-45","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-37-45","url":null,"abstract":"Objective . The purpose of the study is a scientific review of the stages of development of refrigeration technology with sorption action on solid sorbents and an assessment of the current state of development of such household equipment in relation to the use of solar energy. Method . The dynamics of the development of solar energy refrigeration equipment based on sorption thermotransformers, the working vapors of which are solid sorbents and ozone-safe refrigerants, are analyzed. The beginning of development comes from the creation of periodic installations operating from the thermal energy of traditional energy carriers: hot water, burning of hydrocarbon or organic fuels, electric energy, and cooling with water and air and ends with modern refrigeration units operating from the energy of solar radiation and the daily temperature difference of the environment. Result . The peculiarities of making technical decisions underlying the design of the main devices of solar energy refrigeration units are noted. Circuit designs and operating principles of installations and their devices used to improve operating efficiency are described. The main trends in research conducted by scientists to improve the operation of solar energy thermal transformers of cyclic action are considered. Conclusion . This article may be useful to young scientists, engineers and designers for the design and development of innovative autonomous thermal transmitters and refrigeration units for cooling and short-term storage of products and medicines, obtaining food ice, air conditioning, operating independently from solar energy. Such installations are easy to manufacture and operate.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"30 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using biometric data to protect information","authors":"K. N. Vlasov, O. V. Tolstykh, O. V. Isaev","doi":"10.21822/2073-6185-2023-50-3-46-56","DOIUrl":"https://doi.org/10.21822/2073-6185-2023-50-3-46-56","url":null,"abstract":"Objective . An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the possibility of combining them. Method . The method for assessing and comparing biometric authentication methods and solutions is based on practical experience and regulatory and technical documentation on the use of biometric data for information security purposes. It is necessary to complicate the possibility of unauthorized access to information. At the same time, improving the system should not worsen the comfort of a legitimate user when trying to access. The remaining tasks are to reduce entry time and simplify the system. Result . An assessment of biometric authentication methods and solutions was carried out and a solution was proposed for the development of biometric authentication systems to protect against unauthorized access, the key criteria in which were the complexity of hacking, user comfort, login time and simplification of the system. Conclusion . The optimal solution in the development of biometric authentication systems would be to use multi-factor authentication using dynamic parameters of the access subject. A modern biometric authentication system should be installed taking into account the level of security required at the time.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"36 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}