Kuban State Technological University
Author list of organization
List of articles written by the authors of the organization
-
ENERGY-LOADING OF DISKS IN FRICTION PAIRS OF “DISC-PAD” OF BRAKING DEVICES IN VEHICLES (part two)
DescriptionIn the materials of the article we mention the regularities of changes in the volume and surface solid temperature gradients and self-ventilated brake discs and illustrate their impact on the main operating parameters of the friction pairs of disk-to-pad brakes of the A 172 bus; the relationship between thermo-physical parameters of polished and matte surfaces with areas of brake discs of various types. The influence of the type of tests on the pairs of loaded with energy friction disk and pad brakes of the vehicle. We have set the intensity of heat exchange processes from the surfaces of the brake discs of various types. It is shown that this leads to increased surface temperature gradient. The volume and the surface temperature gradients of the brake discs were determined with the involvement of the hypothesis of summation of temperatures on the surface when you post the generated electric currents. It was found that in the surface layer of the working surface of a solid brake disc at its pulse heating under the influence of the temperature of the flash nucleate cracks due to the thermal fatigue of the material of the disk. The features of the design of the brake discs were considered as well. On the basis of the calculation and the experimental data we have shown a correlation between the emissivity of brushed and polished surfaces and their areas in the disk-to-pad brakes when using solid and self-ventilated discs
-
EFFECT OF ELECTROMAGNETIC FIELD LOW FREQUENCIES IN THE TECHNOLOGY OF DRYING MANGOES AND PAPAYAS
DescriptionThe intensity of drying process depends on the speed of movement of the moisture inside the object and the speed of its removal from the surface. To accelerate the drying process, temperature gradient is often regulated, which causes large power consumption. Currently, they are different methods in used for intensifying the process of drying of plant material which are physical, mechanical, chemical and electrical method. Data of literature review show a lack of data on the impact of synergies of lower frequency on the efficiency of drying plant material. Accelerating the drying process of fruit can be achieved by combining low – temperature of drying with a synergistic lower frequency of electromagnetic field. The results of the studies on the development of technologies to accelerate the drying process of mango and papaya fruit are presented in this article. The role of the electromagnetic field, on the intensification of the drying process and on the inhibition of the microflora of mango and papaya, during drying is studied. Effect of the synergistic electromagnetic fields of different frequencies leading to the death of microorganisms, as well as the drying rate of mango and papaya fruit is analyzed. The optimal technological parameters of low frequency electromagnetic field on drying of mango and papaya fruit are determined. Biochemical changes of mango and papaya fruit during drying are given. Technological parameters of the powder mango and papaya obtained by combining low temperature treatment with the synergy of low frequencies are described
-
Description
This article describes the results of networks anomalies detection system based on modular adaptive approach practical implementation. The list of specific modules used in the practical implementation of IPS, their architecture, algorithms, software, organizational and technical support determined at technical working design based on the results of the audit, evaluation and risk analysis. In the general list of modules (subsystems) we may include: intrusion detection and prevention (IPS / IDS) subsystems; monitoring, data collection, and event correlation, administration and management subsystem and others. We have demonstrated the specificity of formation requirements for the basic mechanisms of the subsystems in terms of development and implementation of specific architecture with some examples, plus practically implemented structure of system modules, as well as organizational and technical support system functioning
-
Description
In the article we have allocated a number of poorly formalized functional tasks that significantly affect the efficiency of the operation of distributed information-analytical systems. The scheme has been developed for the iterative process, which in addition to the automation of the delivery process and the exchange of information between information systems based on grid integration, also includes funds for applied modeling situations on the basis of available information, developing alternatives, multi-criteria decision problems using techniques scenarios and peer review. Obtained during the evaluation of the effectiveness results allow us to control and manage the operation of distributed information-analytical systems with specific problems, as well as to conduct simulations and analytical processing of the results
-
MODEL OF INFORMATION EXPOSURE IN SOCIAL NETWORKS
DescriptionOn the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
-
MODEL OF INFORMATION SECURITY FOR CONTROL PROCESSES OF COMPUTER NETWORKS
DescriptionIn order to improve the security of information transfer we have offered one of the possible approaches to modeling process control computer networks with elements of intelligent decision support. We proceed from the graph model of network nodes which are network devices with software control agents, and arcs are logical channels of information exchange between the equipment computer systems. We built an addressless sensing technology which ensures the completeness of monitoring of all network equipment. To classify the computer networks state we provided a method for calculating the values of reliability. Development of signal mismatch triggers the control cycle as a result of which the adjustment of the state of network equipment. For existing tools we proposed adding network control expert system consists of a knowledge base, inference mechanism and means of description and fill in the knowledge base
-
PROVIDING INFORMATION SECURITY OF DATA-PROCESSING NETWORK WITH USE OF INTELLIGENT SYSTEM
DescriptionThe article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
DescriptionThe article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
DIAGNOSTIC OF ANOMALIES IN DATA-PROCESSING NETWORKS WITH USE OF VARIETY OF INFORMATION EXCHANGE
DescriptionThe work is devoted to searching efficient detection methods of anomalous state in data networks. There is a structure of modern informational attacks detecting system. There are short review and analysis of information system network security facilities. Two main technologies of attack detection are described: anomaly detection and misuse detection. It is shown that every detection of anomalies is based on assumption that anomalous behavior is deflection from normal profile of behavior. It is hard to implement this technology, although there is some progress when expert system, fuzzy logic and so on are used for this purpose. Action patterns or symbols assets which describe anomaly activity are used as attack signature in misuse detection method. Author offers to use benefits of both methods for solving the problem
-
SYSTEMS OF REMOVING NETWORK ANOMALIES AND METHODS OF CREATION THEIR ARCHITECTURE
DescriptionDifferent stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered