D. Kiesewetter, A. Reznik, N. Zhuravleva, D. V. Litvinov, Alexandr S. Rutovich
{"title":"Application of side-illumination fluorescence measurement technique for monitoring of quality of dielectric fluids","authors":"D. Kiesewetter, A. Reznik, N. Zhuravleva, D. V. Litvinov, Alexandr S. Rutovich","doi":"10.1109/EICONRUS.2018.8317124","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317124","url":null,"abstract":"The side-illumination fluorescence spectroscopy was used for early detection of oxidation of the transformer's insulating fluids. Aging of petroleum oil, MIDEL dielectric fluids and their mixtures both in the presence of the catalyst and transformer paper and without them was investigated. A comparison of the obtained optical characteristics of dielectric fluids — fluorescence and transmittance spectrum with the electrical parameters — resistance and tangent of dielectric loss angle were carried out. The explanation of the obtained regularities is given, in particular, the ability to distinguish effects associated with the oxidation of oils from the effects due to the dissolution of moisture and contamination of oil by sludge at the aging process is demonstrated. The possibility of applying the method for measuring the optical attenuation in the dielectric liquids with high transparency is shown.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"59 1","pages":"423-425"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74650791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esteban C. Lopez-Falcon, A. Tchernykh, N. Chervyakov, M. Babenko, Elena Nepretimova, V. Miranda-López, A. Drozdov, G. Radchenko, A. Avetisyan
{"title":"Adaptive encrypted cloud storage model","authors":"Esteban C. Lopez-Falcon, A. Tchernykh, N. Chervyakov, M. Babenko, Elena Nepretimova, V. Miranda-López, A. Drozdov, G. Radchenko, A. Avetisyan","doi":"10.1109/EICONRUS.2018.8317099","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317099","url":null,"abstract":"In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechanism between cloud providers. We provide theoretical analysis and experimental evaluation of our scheme with six real data storage providers. We show how dynamic adaptive strategies not only increase security, reliability, and reduction of data redundancy but allow processing encrypted data. We also discuss potentials of this approach, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"9 1","pages":"329-334"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of trends and problems of technological potential increasing in the Russian industrial sector","authors":"Christina V. Samonova","doi":"10.1109/EICONRUS.2018.8317325","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317325","url":null,"abstract":"This article analyzes the modern trends in the increasing and using of technological potential in the Russian economy. The main factors constraining technological development and increasing the technological backwardness of Russian industry are identified, in particular: systemic industry problems, resource constraints, competitiveness problems, etc. In this work an indicator of capacity utilization was chosen as an objective indicator of the assessment of production opportunities for increasing the technological potential in industry. According to this indicator, the industry is divided into three main groups: underutilized industries, industries with an additional reserve and highly loaded industries.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"90 1","pages":"1265-1267"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73047101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sokolov, O. M. Alimov, L. E. Ivleva, Ekaterina Yu. Vartanova, V. Burlov
{"title":"Using unauthorized access to information based on applets","authors":"S. Sokolov, O. M. Alimov, L. E. Ivleva, Ekaterina Yu. Vartanova, V. Burlov","doi":"10.1109/EICONRUS.2018.8317046","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317046","url":null,"abstract":"The problem of unauthorized access to information on Web sites through the use of malicious code by an attacker leads to undesirable consequences that arise both on the server side and on the users side. This article is devoted to the review and analysis of existing methods for ensuring the information security of automated systems for authentication and distributed networks. The existence of vulnerabilities on most modern Web content management platforms allows an attacker to inject malicious files onto the server or modify existing files. Recently, there has been a large increase in cybercrime, which is a fairly lucrative business for intruders. To avoid the introduction of malicious code on the site, in addition to the above steps, you should use the SCP / SSH / SFTP protocols instead of FTP to download files to the server, which will prevent the passwords from being sent “in the clear”.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"1 1","pages":"128-131"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75578737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tchernykh, M. Babenko, N. Chervyakov, V. Miranda-López, J. M. Cortés-Mendoza, Zhihui Du, P. Navaux, A. Avetisyan
{"title":"Analysis of secured distributed cloud data storage based on multilevel RNS","authors":"A. Tchernykh, M. Babenko, N. Chervyakov, V. Miranda-López, J. M. Cortés-Mendoza, Zhihui Du, P. Navaux, A. Avetisyan","doi":"10.1109/EICONRUS.2018.8317112","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317112","url":null,"abstract":"Cloud data storages are functioning in the presence of the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and technical failures. In this paper, we provide analysis of reliable, scalable, and confidential distributed data storage based on Multilevel Residue Number System (RNS) and Mignotte secret sharing scheme. We use real cloud providers and estimate characteristics such as the data redundancy, speed of data encoding, and decoding to cope with different user preferences. The analysis shows that the proposed storage scheme increases safety and reliability of traditional approaches and reduces data storage overheads by appropriate selection of RNS parameters.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"98 1","pages":"382-386"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74828379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The compatibility verification of batteries and battery chargers to ripples in battery float charge mode","authors":"Aleksandr D. Kupchinov, N. Smotrov, Yury P. Gusev","doi":"10.1109/EICONRUS.2018.8317189","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317189","url":null,"abstract":"In this paper, it was received a dependence of battery current ripples rms from internal resistance of battery. It was got, that 6-pulse rectifier bridge is a current source in pulsating component. The conclusion is made that addition of L-C filter to battery charger decrease values of current ripples, but in the area of little internal resistances (for example, for AGM type battery) that value can exceed the allowable value. Based on received dependences, it was designed a method of current ripples calculation, that was verificated by experiments with real batteries and battery chargers. The difference between the results of calculation with method using and experiments doesn't exceed 10%. This method allows to check the compatibility of battery and battery charger, based on its catalog parameters.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"54 1","pages":"696-700"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77613595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated control system of fabrics parameters that uses computer vision","authors":"V. Gorbunov, V. Bobkov, Nyan Win Htet, E. Ionov","doi":"10.1109/EICONRUS.2018.8317438","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317438","url":null,"abstract":"This article describes method of automated quality monitoring of the produced fabric. The monitoring system consists of a web camera and micro computer, which allows to determine the geometric dimensions of the spacing between the transverse threads of the fabric. The management of these sizes provides the possibility to control the density of the finished fabric. The described system allows to automate the control of fabric quality. Considered algorithm calculating the distance between the transverse threads based on the microcomputer Raspberry pi and the Python programming language.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"93 1","pages":"1728-1730"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80470683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of the leakage flux of the transformer on the welding current of high frequency resistance spot welding systems","authors":"L. Sakhno, O. Sakhno, Yuri V. Radomsky","doi":"10.1109/EICONRUS.2018.8317070","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317070","url":null,"abstract":"High frequency resistance spot welding systems are considered. They have full-wave centre tapped output rectifiers and three-winding transformer. The leakage flux of three-winding transformer including in the systems, influences on the welding current. For calculation of welding current the three-winding transformer is replaced by two two-winding ones. The mutual influence of the magnetic leakage fields of these two-winding transformers on welding current is investigated. It is shown that welding current depends both on the modulus and the sign of the coupling factor of the magnetic leakage fields of these two-winding transformers. The paper presents the dependences of the welding current from the coupling factor. They can be used for creation of economical transformers.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"35 1","pages":"223-226"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81636101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Anatoliy, F. Yuri, D. G. Vagiz, V. Yana, V. Aleksandr
{"title":"Aggregation process for implementation of application security management based on risk assessment","authors":"P. Anatoliy, F. Yuri, D. G. Vagiz, V. Yana, V. Aleksandr","doi":"10.1109/EICONRUS.2018.8317039","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317039","url":null,"abstract":"This article is devoted to the review and analysis of existing methods of ensuring information security based on risk models. The strengths and weaknesses of the model are investigated on the basis of reliability theory. The article discusses potential obstacle to managing application security effectively and describes five steps for managing security. Create inventory of application and their attributes and evaluating their role in business impact (Create a profile for each application and conduction analysis of date processed in the application). Software vulnerability search (Static Analysis (“white-box”); Dynamic Analysis (“black-box”); Interactive Analysis (“glass-box”); Mobile Application Analysis); Risk assessment and prioritization of vulnerabilities (Setting priorities for applications; Setting priorities for types of vulnerabilities; Setting priorities for the development team; Changing vulnerability priorities and reassessing risks). Elimination of vulnerabilities and minimization of risks (security manager sets priorities and firmed tasks for the development team.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"6 1","pages":"98-101"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81917739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The problem of determining the position of the metal in levitation melting","authors":"A. Ivan, I. Evgeniy, V. Nikolay","doi":"10.1109/EICONRUS.2018.8317211","DOIUrl":"https://doi.org/10.1109/EICONRUS.2018.8317211","url":null,"abstract":"The correctness of using the moving mesh, which is the physical interface of the Comsol Multiphysics, to determine the position of the workpiece relative to the inductor during levitation melting is analyzed. The problem deals with transient modes of efforts, coordinate, velocity. Transient processes are described by ordinary differential equations. This model provides the opportunity to predict the maximum weight of the melting workpiece, the electromagnetic and energy characteristics, depending on the mass of the workpiece. The results are compared between the hydrodynamic calculation of the melted metal with positioning and the arbitrarily given coordinate.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"1 1","pages":"799-802"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84876531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}