The gas balance control automated systems in the gas transmission networks is an organizational and technical systems that manage in accordance with the accepted criteria. Tasks of the automated systems of gas balance...
The gas balance control automated systems in the gas transmission networks is an organizational and technical systems that manage in accordance with the accepted criteria. Tasks of the automated systems of gas balance are the following: gas parameters control during its transportation, costs minimization for maintaining the gas balance, gas leaks and losses prevention. To improve management efficiency, it is advisable to develop new and improve existing management algorithms, use new approaches to setting goals. The article discusses an approach based on the development of a gas transmission network computer model and the implementing in it a system of virtual sensors it, that measure the following gas volumes to eliminate the imbalance, depending on the factors-causes: stock in the main gas pipeline, consumption for own needs and the costs of correcting the imbalance. In the approach, imbalance-eliminating decisions based on the criterion of minimizing the volumes passing through these virtual sensors are considered.
The paper considers quasi-orthogonal Mersenne matrices structured according to Walsh. The differences between the system of orthogonal Mersenne-Walsh functions and classical Walsh functions are shown. Two- and four-le...
The paper considers quasi-orthogonal Mersenne matrices structured according to Walsh. The differences between the system of orthogonal Mersenne-Walsh functions and classical Walsh functions are shown. Two- and four-level (modularly two-level) Mersenne-Walsh matrices are considered. Estimates of their use in image compression and masking and protective encoding of digital audio data are given.
The paper studies a practical implementation of a hardware and software complex for analyzing and collecting data from open packets of Wi-Fi networks (IEEE 802.11 a/b/g/n standard). The main technological limitations ...
The paper studies a practical implementation of a hardware and software complex for analyzing and collecting data from open packets of Wi-Fi networks (IEEE 802.11 a/b/g/n standard). The main technological limitations of such systems are given and the principal architectures for their creation are proposed, including examples of hardware and software configurations. Examples of operation of such systems and requirements for business applications are given.
The article describes intelligent technologies used in the design of an information system for controlling the polymer waste processing into useful technical products. The basis of the system is a configurable informa...
The article describes intelligent technologies used in the design of an information system for controlling the polymer waste processing into useful technical products. The basis of the system is a configurable information model that includes a database of characteristics of polymer waste and a knowledge base of the processes of their recycling into technical products (containers, packing materials, etc.). The knowledge base is built using a production-frame model for the representation of unformalized knowledge about the polymers compatibility, the quantitative ratio of the components of a composite mixture, waste processing methods to obtain a homogeneous mixture with specified properties (strength, resistance to aggressive substance, etc.). The result of the functioning of the system is the formation of a technological map of the production of a technical product, including information about the formulation and synthesis process of the polymer composition, specifications of the hardware design and the values of the technological modes of the production stages. Testing of the system according to the LLC “Plastic processing plant named after “Komsomolskaya Pravda” on the basis of the Polymer Ecology Training Center of SPSIT confirmed its operability and the possibility of use at polymer industry enterprises. The use of the system allows you to reduce the time spent on solving the problem of reconfiguration of production and selection of compositions, reduce defects and improve the consumer characteristics of products.
An algorithm for designing oil recycling processes is presented, characterized in that it is applicable to various types of oil recycling processes, taking into account modern technologies, which makes it possible to ...
An algorithm for designing oil recycling processes is presented, characterized in that it is applicable to various types of oil recycling processes, taking into account modern technologies, which makes it possible to increase design efficiency by implementing the main stages of design - selection and layout of technological equipment and piping, forming a digital information model and design documentation in a single computer environment. The criteria for assessing the quality of the digital information model and the project documentation formed on its basis are given.
AI is one of the most popular field of technologies nowadays. Developers implement these technologies everywhere forgetting sometimes about its robustness to unobvious types of traffic. This omission can be used by at...
AI is one of the most popular field of technologies nowadays. Developers implement these technologies everywhere forgetting sometimes about its robustness to unobvious types of traffic. This omission can be used by attackers, who are always seeking to develop new attacks. So, the growth of AI is highly correlates with the rise of adversarial attacks. Adversarial attacks or adversarial machine learning is a technique when attackers attempt to fool ML systems with deceptive data. They can use inconspicuous, natural-looking perturbations in input data to mislead neural networks without inferring into a model directly and often without the risk to be detected. Adversarial attacks usually are divided into three primary axes - the security violation, poisoning and evasion attacks, which further can be categorized on “targeted”, “untargeted”, “whitebox” and “blackbox” types. This research examines most of the adversarial attacks are known by 2023 relating to all these categories and some others.
Human Resource Management (HRM) has introduced significant changes over the past several decades when analyzing the essential role of the Human Resource Department (HRD) in an organization. HR systems support organiza...
Human Resource Management (HRM) has introduced significant changes over the past several decades when analyzing the essential role of the Human Resource Department (HRD) in an organization. HR systems support organizational structure management, data archiving, strategic staff development planning, commercial organization management, and management of emerging multinational corporations. Therefore, properly implemented HR software helps businesses save time and money. This paper examines the Human Resources system implementation concept, its role within organizations, and considerations for implementing an HR solution.
The use of neural networks for the processing of one- and two-dimensional data is examined in this research. The activating function being crucial to network performance, is frequently disregarded. This function is ty...
The use of neural networks for the processing of one- and two-dimensional data is examined in this research. The activating function being crucial to network performance, is frequently disregarded. This function is typically one of the non-adaptive functions. Adaptive sigmoid or ReLU functions are frequently employed but they have drawbacks as they alter the overall outcomes when data from a single, small area is adapted. Using flexible quadratic B-spline functions with free nodes is suggested in this study.
The technology and the economy basement have changed dramatically since digital transformation has spread widely. The Total Quality Management approach holds fast but some new features appear in connection to digital ...
The technology and the economy basement have changed dramatically since digital transformation has spread widely. The Total Quality Management approach holds fast but some new features appear in connection to digital instruments, services, processes, products, theirs quality characteristics and assessment methodology. Many of them were invented during the development of the information technology industry in 20th century. Yet some of them are totally new and were created in last years, for example, user experience and user interface technology approach. We plan to publish a new textbook - “Quality in digital economy”. We would like to present its content and discuss its focus points in advance in order to make it more complete and up to date.
Among all cybersecurity techniques, intrusion detection systems are the first and effective defense line for network and system. However, to develop an accurate, robust intrusion detection system with decent generaliz...
Among all cybersecurity techniques, intrusion detection systems are the first and effective defense line for network and system. However, to develop an accurate, robust intrusion detection system with decent generalizability, challenges like limited labeled data, balancing between detection rates and false alarms need to be overcome. We propose an effective and efficient approach, in which the multi-class intrusion classification was performed by Multi-task Learning (MTL). A hard parameter sharing MTL model is utilized for the multi-class attack detection, in which uncertainty-based loss optimization is utilized to boost model performance and compute the best weights for each task. Comparisons of the proposed approach with single task learning (STL) models are conducted, and the results validate its balanced performance on different traffic. Moreover, when it comes to the capability to identify rare intrusions with limited samples, MTL model can out-perform other powerful STL models like DNN, CNN, RNN and LSTM.
暂无评论