NBI Technologies
Latest Publications


TOTAL DOCUMENTS

95
(FIVE YEARS 80)

H-INDEX

1
(FIVE YEARS 1)

Published By Volgograd State University

2658-3593

2021 ◽  
pp. 11-14
Author(s):  
Elena Zenina ◽  

In this work, the author analyzed the texts of normative documents on ensuring electromagnetic compatibility (EMC) of microprocessor relay protection devices (MPS), aimed at creating conditions for ensuring the uninterrupted functioning of power circuits of the electric power complex and their secondary circuits, ensuring the tracking of all processes, collecting information, accounting for electricity and operational control of main technological equipment in real EMO conditions. Controversial issues enshrined in regulatory documents were considered, their relevance was assessed. During the analysis of regulatory documents, it was found that in a number of regulatory documents, both Russian and international, there is a direct indication of the need to ensure electromagnetic compatibility at electric power facilities, however, they provide general methods and recommendations without specifying the list of measured and regulated parameters, do not fix the sequence of actions, tools for measuring and modeling, providing the necessary result. In this regard, the author proposes solutions for introducing electromagnetic compatibility into theory and practicein the electric power industry and bringing regulatory documents to updating and systematization in terms of discussed controversial issues, introducing more accurate and consistent actions and measures during the practical implementation of the methods indicated in the work.


2021 ◽  
pp. 15-18
Author(s):  
Olga Safonova ◽  
◽  
Elena Arepyeva ◽  
Nadezhda Ermakova ◽  
◽  
...  

The active introduction of Orthogonal Frequency Division Multiplexing (OFDM) technology is now beginning to be widely used in wireless transmission systems, television, radio communication, and radio broadcasting. The efficiency of using a dedicated frequency band at a constant high transmission rate allows you to combat interference arising from the transmission of a useful information on the radio channel. A method of improving quality of information transmission in communication systems with orthogonal frequency multiplexing is described. It is shown that with an increase in the number of receiving and transmitting antennas, the noise immunity increases significantly. An experiment was carried out to change the number of receiving-transmitting antennas and the signal-to-noise ratio, and the dependence of the appearance of an error on the number of transmitting antennas was obtained. The work investigated the software model of MIMO OFDM (modulators and demodulators). As a result of the analysis, the dependence of the appearance of the error frequency on the probability of the error was obtained. This showed that the use of OFDM and MIMO places increased demands on channel estimation.


2021 ◽  
pp. 5-10
Author(s):  
Lyudmila Gomazkova ◽  
◽  
Oleg Bezbozhnov ◽  
Osamah Al-Qadi ◽  
Sergey Galich ◽  
...  

The hierarchical network model is the most preferable in the design of computer networks, as it allows you to create a more stable structure of network, rationally allocate available resources, and also provide a higher degree of data protection. In this work, the study of the behavior of the traffic during the transition from one level of the network hierarchy to another, based on the study of the values of the traffic self-similarity degree during this transition. For the study, a simulation model of a computer network with a hierarchical topology was developed using the NS-3 simulator. Also, a window application was developed in the Visual C# programming language. With the help of this application the degree of self-similarity of the traffic was investigated using the files obtained as a result of processing the trace file. Thus, as a result of the study, it can be stated that any changes in the degree of self-similarity of the network traffic when this traffic moves from one level of the hierarchy to another level depends on such a condition as the direction of traffic movement. The initial degree of selfsimilarity of network traffic also effects on the network traffic self-similarity degree.


2021 ◽  
pp. 19-26
Author(s):  
Yana Chumburidze ◽  
◽  
Tatiana Omelchenko ◽  

Data loss as a result of threats or natural disasters can lead not only to huge financial losses, but also damage the reputation of the company. The most effective way to protect data from loss is backup. The purpose of the study is to select the most appropriate method of data backup and develop a software tool based on it. We discussed the main methods of data backup such as full backup, incremental backup, differential backup, reverse incremental backup and synthetic backup. We identified the following criteria to determine the most appropriate backup method: backup speed, restore speed, backup repository, reliability, network workload, redundancy. We performed a comparative analysis based on the selected criteria to reveal that the most appropriate method of data backup is reverse incremental backup. A functional model, architecture and interface of the software tool have been designed. The main purpose of the software tool is to implement the method of reverse incremental backup to prevent information loss. The conformity of the backup data obtained as a result of performing a reverse backup to the current state of the system is considered to be the achievement of the goal. We conducted a series of experiments that showed that the backup copy corresponds to the current state of the system.


2021 ◽  
pp. 35-42
Author(s):  
Konstantin Smirnov ◽  
◽  
Vladimir Akatyev ◽  
Yulia Amelchenko ◽  
◽  
...  

The paper reflects various aspects of the use of X-ray investigation methods, their advantages and application in forensic science of the phase composition of metals, paint and varnish coatings and paintwork materials, fragments of explosive devices. Practical examples of X-ray diffraction analysis application for thin film specimens made on the basis of paints containing alkyd varnish, pigments, fillers and solvents of various colour range have been examined. Influence of true physical broadening, on lines of diffractograms taken for samples exposed to shock wave action was also studied. It was found that this broadening is directly connected with influence of microstrains and fine dispersion of mosaic structure blocks. Based on the obtained X-ray diffraction analysis data, the dislocation density was calculated by three methods. Based on summarized experimental and literature data, the dependence of microstrains on the explosive weight was plotted, which can be used as a reference standard for comparison in expert studies of samples exposed to shock-wave impact.


2021 ◽  
pp. 27-34
Author(s):  
Irina Zaporotskova ◽  
◽  
Evgeniy Dryuchkov ◽  
Maria Chesheva ◽  
Daria Zvonareva ◽  
...  

The problem of modification of boron-carbon nanotubes (BCNT) by functional groups is relevant in connection with the intensive development of the nano industry, in particular, nano- and microelectronics. For example, a modified nanotube can be used as an element of a sensor device for detecting microenvironments of various substances, in particular metals included in salts and alkalis. The paper discusses the possibility of creating a high-performance sensor using single-layer boron-carbon nanotubes as a sensitive element, the surface of which is modified with a functional nitro group -NO2. Quantum-chemical studies of the process of attaching a nitro group to the outer surface of a single-layer boron-carbon nanotube (BCNT) of type (6, 6) were carried out, which proved the possibility of modifying the BCNT and the formation of a bond between the group -NO2 and the carbon atom of the surface of the nanotube. The results of computer simulation of interaction of surface-modified boron-carbon nanotube with alkali metal atoms (lithium, sodium, potassium) are presented. The sensory interaction of the modified boron-carbon nanosystem with the selected metal atoms was investigated, which proved the possibility of identifying these atoms using a nanotubular system that can act as an element of the sensor device. When reacting with alkali metal atoms in the “BСNT+NO 2” complex, the number of basic carriers increases, due to the transfer of electron density from metal atoms to modified BСNT. The results presented in this paper were obtained using the molecular cluster model and the calculated DFT method with exchange-correlation functionality B3LYP (valence-split basis set 6-31G).


2021 ◽  
pp. 22-26
Author(s):  
Tatyana Ermakova ◽  
◽  
Vasily Vasiliev ◽  
Vladimir Akatyev ◽  
◽  
...  

In the production of experimental studies related to the modeling of the behavior of human soft tissues in such widespread types of forensic examinations as forensic ballistic, tracological, forensic examination of cold and throwing weapons, forensic medical-use bioimitators. Human corpses, animal carcasses, and their living individuals are used as such objects, but in recent decades, with the development of chemistry and chemical technology, various artificial substitutes have become increasingly widespread – colloidal systems based on gelatin, soap, mixtures of petroleum petrolatum, as well as specialized compositions. Among the main advantages of using soft tissue substitutes are the following: visibility of the results obtained, availability of synthetic materials, uniformity of structure, reproducibility of experimental results with a statistically reliable amount, as well as, if necessary, the possibility of varying mechanical parameters for physical modeling of the characteristics of human biological tissues within the framework of an expert experiment. The paper proposes a technology for obtaining a reusable synthetic compound that allows modeling the properties of human soft tissues. The synthetic compound provides the transfer of general patterns of morphology of the formed gunshot injuries, similar to gunshot wounds on biological materials.


2021 ◽  
pp. 12-15
Author(s):  
Elena Zenina ◽  

In the modern conditions of the development of the electric power complex, relay protection and automation devices play a special role related to protection against possible damage resulting from violations of normal operating modes, both of individual elements and the entire power system as a whole. This, in turn, directly affects the reliable and stable functioning of the main power elements and electrical equipment. Damage to the power part of the equipment of an electric grid complex can be caused by changes in the main parameters of the normal mode: a change (increase) in currents leads to overloads and, in the limit, to short circuits, a decrease in voltage leads to an avalanche of voltage and disruption of the operation of electric motors connected to the damaged section, and an increase in voltage leads to overvoltages in certain sections. In addition, violations associated with a decrease in the transmitted active power lead to a change in frequency, and a violation of the reactive power balance leads to a change in voltage in certain sections, which generally leads to noncompliance with the power balance and loss of stable operation of the power system. The main reasons for failures in operation, false and excessive triggering of microprocessor relay protection devices are considered. The main ways of solving the problem of electromagnetic compatibility in the electric power industry are identified. A solution is proposed to improve the reliability of the operation of microprocessor relay protection devices and the way of development of the problem of electromagnetic compatibility in the electric power industry is shown.


2021 ◽  
pp. 16-21
Author(s):  
Viktor Lobyzov ◽  
◽  
Vadim Shevtsov ◽  

The Internet of Things is a new trend in the development of information technologies, actively spreading as interconnected functional nodes that by default have the means to ensure interaction directly with each other, or with the external environment. The development of such networks is a phenomenon that can radically change the world economy, as well as social processes. As a result of the application of this layer of information technologies, the need for direct human control over actions and operations will be eliminated. One of the most common household examples is a “smart home” – a computer network of interconnected devices using various data transfer protocols with the ability to access this network from an external network. So, thanks to IoT, it is possible to configure devices in the house by remote access. The paper deals with the main security methods against attacks and threats of IIoT devices. The information infrastructure was analyzed, an idea of the architecture of IIoT systems was obtained, and the information transmission path was identified. An analysis of the IIoT regulatory framework governing security, architecture and data exchange in IIoT systems has been carried out, documents governing the Industrial Internet of Things have been identified. The best communication protocol has been identified. Subsequently, the threats of the protocol were selected, and possible means and methods of protection were identified. For IIoT gateways, the concept of a hardware-software complex was presented as a prototype, and a comparison was made with existing solutions.


2021 ◽  
pp. 5-11
Author(s):  
Yulia Bakhracheva ◽  
◽  
Aleksej Panin ◽  
Arina Aleeva ◽  
◽  
...  

For every company that develops modern Internet projects, one of the most important tasks is to ensure the necessary level of information protection in its web project. When an Internet project developing company consistently protects its information system, it creates a reliable and secure environment for its activities on the World Wide Web. Damage, leakage, lack and theft of information from the site will inevitably lead to a decrease in the level of trust in the organization as a whole, as well as to problems with the law, which is always a loss for each company. For example, there may be losses from the bad reputation of the developer, the lack of customers, the costs of resuming the stable operation of an Internet project based on the WordPress content management system, or the loss of important information contained in the system. In the paper, an algorithm of the software complex was developed, which includes three main blocks: data acquisition and backup creation, processing of information about the system, and the use of protection mechanisms. A software package has been developed to ensure the security of web projects based on CMS WordPress.


Sign in / Sign up

Export Citation Format

Share Document