开放存取 开放存取  受限制的访问 ##reader.subscriptionAccessGranted##  受限制的访问 订阅存取

卷 10, 编号 3 (2023)

封面

完整期次

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

NANOTECHNOLOGY

Prospects of Solar Energy: The Role of Modern Solar Technologies in the Production of Hydrogen

Rakhimov R., Yermakov V.

摘要

This article explores the prospects of using solar energy for hydrogen production as an alternative energy source. The author discusses the limitations of hydrogen energy, including the economic inefficiency of hydrogen production. The main objective of the study is to increase profitability and address the environmental and energy issues associated with hydrogen production. The use of modern heliotechnologies and heliomaterials is proposed to optimize the hydrogen production process. The article also examines technological problems related to hydrogen combustion in the presence of nitrogen and emphasizes the need for further research to create environmentally safe and economically efficient hydrogen energy. The issue of hydrogen’s environmental cleanliness is discussed, and the necessity of using environmentally clean and conditionally clean energy sources for hydrogen production is noted. In conclusion, the article emphasizes that hydrogen has the potential to become a clean energy source through the development of heliomaterials science, which requires further research and technological improvements for its commercialization.

Computational nanotechnology. 2023;10(3):11-25
pages 11-25 views

A possible mechanism of the optical quantum tunneling effect in photocatalysts based on nanostructured functional ceramics

Rakhimov R.

摘要

The article examines the proposed mechanism of optical tunneling effect, which explains the property of functional ceramics to convert solar energy into pulses in the infrared range. It is suggested that the incident radiation is absorbed by ceramic particles, exciting lattice vibrations known as phonons. As phonons accumulate, they transition to a higher energy state, generating infrared photons. The key role is played by the presence of a rising edge of the radiation pulse, which determines the wavelength of the pulses regardless of the wavelength of the infrared energy carrier. As a result, the infrared energy “tunnels” into mediums that are typically opaque to infrared radiation. This mechanism, based on the vibrational nature of ceramics and the wave properties of radiation, explains the unique ability of functional ceramics to convert energy into pulsed radiation with a specific wavelength. The proposed model has a wide range of applications in various fields, including industry, energy, and agriculture.

Computational nanotechnology. 2023;10(3):26-34
pages 26-34 views

CYBERSECURITY

The Development of the Load Balancer and the Parallel Module for Managing Associatively Protected Map Databases

Vershinin I.

摘要

In the modern world, where information security and big data processing are key aspects of many industries, the importance of effectively managing and ensuring the reliability of cartographic databases is growing. These databases serve as the foundation for a wide range of applications, including geographic information systems, transportation management, environmental modeling, and urban planning. With the increase in the volume of geodata and the expansion of their use in various industries and science, the requirements for processing speed, accessibility and, above all, the security of this data are increasing. Poor management or security vulnerabilities can lead to significant losses, both economically and socially. The article is devoted to the development of a load balancer and a parallel module for managing associatively protected cartographic databases. The work includes a description and analysis of the use of the PostgreSQL DBMS with the Npgsql and PostGIS extensions for working with associatively protected spatial data. The article presents a method of parallel programming using the TPL library of the C# language. Testing of the developed module revealed optimal operating conditions, showing an increase in performance depending on the configuration of the nodes. The results of the study can serve as the basis for further optimization and development of systems for processing and managing large volumes of associatively protected geodata.

Computational nanotechnology. 2023;10(3):35-43
pages 35-43 views

MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS

The Development of a Multi-channel Mass Service System with Limited Queuing Using the Parallel Library of the .NET Platform

Antonova P.

摘要

Modern business and industry are often faced with the need to effectively manage and optimize the processes of servicing the flow of requests. In the light of this need, the paper considers the principles of developing a multi-channel mass service system with limited queueing, implemented on the .NET platform using the C# programming language. Particular attention is paid to high-performance data processing and parallel computing. The article offers architectural solutions for the realization of a multi-channel mass service system and discusses the basic components of the system, including the queue, processing channels and mechanisms for managing applications. The scientific novelty of the presented work lies in the integration of Parallel Framework into the development process of a multi-channel mass service system with limited queueing, which allows to optimize resource allocation and reduce waiting time in the system. The paper presents code examples which demonstrate aspects of multi-threading implementation and the use of competitive collections for efficient queue request management. Opportunities for further development of multi-channel mass-maintenance systems on .NET platform are considered, taking into account constantly changing requirements and technological capabilities.

Computational nanotechnology. 2023;10(3):44-50
pages 44-50 views

Application of the Theory of Petri Nets in the Development of Simulation Models of Business Processes Based on the IDEF3 Methodology

Petrosov D.

摘要

The relevance of developing simulation models of business processes is due to the need to improve the quality of analysis of the subject area by conducting computational experiments on the developed models in popular notations. To describe technological features, the IDEF3 methodology is often used, which belongs to the IDEF family of methodologies, which has become widespread among specialists in the field of analytics, modeling and business process reengineering, both in foreign and domestic practice of analysis and modeling of various subject areas. The use of the mathematical apparatus of the theory of Petri nets is proposed as a tool for creating simulation models. This tool has a wide range of extensions that allow you to implement all the features of the IDEF3 notation. For this purpose, the study proposes an approach that describes the rules for creating simulation models of business processes that allow modeling of all existing notation objects. The development of software additions to existing CASE tools based on the proposed approach will make it possible to create simulation models of business processes directly in the process of developing domain models, as well as to use intelligent methods of structural-parametric synthesis of simulation models based on the elemental base of work units and the specified behavior of the synthesized model process. As a means of intelligent structural-parametric synthesis, genetic algorithms adapted to solving the problem of structural-parametric synthesis can be used, the operation of which is also modeled using the theory of Petri nets, which allows the use of one mathematical apparatus within the framework of all solved problems of creating simulation models of business processes.

Computational nanotechnology. 2023;10(3):51-63
pages 51-63 views

ELEMENTS OF COMPUTING SYSTEMS

Algorithm for Assessing the Effectiveness of the Process of Making Changes in Automated, Information and Telecommunication Systems

Naumchik N.

摘要

The purpose of the research. The article discusses the problem of efficient use of computational resources. Describes the hardware prefetching mechanism. The purpose of the study is to find a solution that provides the ability to evaluate the quantitative use of the memory area in a computer program. This, in turn, is necessary to improve the efficiency of using the hardware capabilities of the computer. Results. As a result of the study, the author comes to the conclusion that the desired solution is an algorithm for determining the intensity of access to data structures in a computer program. The article presents the terminology that explains the name of the indicators used in the algorithm, describes the mathematical model for calculating the indicator and its limitations. A system of equations expressing the range of values of the data access intensity indicator was formulated. A three-dimensional model and two two-plane graphs were constructed to obtain a complete picture of the perception of the range of values. A detailed description of the algorithm and the presented mathematical model of the final and intermediate calculations allow us to develop an automated solution for certain tools (for example, compilers) used in the development of a computer program. The author concludes that the obtained indicator provides a quantitative representation of the use of shares of information (data areas) in a computer program for the subsequent assessment of the effectiveness of the computer program and the data structures used. Based on the results of the assessment, decisions can be made on the conformity / non conformity of the proposed solution and the need to modify the computer program or the data structures used.

Computational nanotechnology. 2023;10(3):64-71
pages 64-71 views

MANAGEMENT IN ORGANIZATIONAL SYSTEMS

Modeling of the Choice of Solutions to Management Tasks when Extinguishing a Fire in Underground Structures

Anikin S., Danilov M., Denisov A., Korolev P.

摘要

The article deals with the problem of the theoretical foundations of management in organizational systems. The modeling of the choice of managerial alternatives for extinguishing a fire in underground structures is presented based on the comparison of real and forecast values by the fire extinguishing manager (ranking the conditions for choosing managerial alternatives), while ranking the conditions for choosing managerial alternatives is carried out using a graphoanalytic approach. The solution of the tasks set during the planning of actions is shown by modeling GERT networks. An urgent issue is and remains the possibility of choosing a decisive direction, taking into account the comparison of real and forecast results of fire extinguishing actions, in the case when the criteria of the current situation may be a variety of possible acceptable options. Results. An approach to the selection of management alternatives for fire extinguishing in underground structures has been developed based on the comparison of real and forecast values by the fire extinguishing manager based on the results of the application of the network planning method and the method of graphical evaluation and analysis of systems, a comprehensive analysis of the solution of the problem based on the identification of boundary conditions of fire extinguishing has been developed, a model for solving management problems during combat operations to extinguish a fire has been developed. The application of the developed model is relevant not only for the analysis of potential scenarios for planning and implementing combat operations to extinguish a fire in underground structures, but also for modeling the process of managing an organizational fire extinguishing system in boundary conditions of fire extinguishing in underground structures of high extent and area. This work is intended for those who make managerial decisions and manage forces and means when extinguishing fires.

Computational nanotechnology. 2023;10(3):72-82
pages 72-82 views

MATHEMATICAL AND SOFTWARE OF COMPUTЕRS, COMPLEXES AND COMPUTER NETWORKS

Determination of Parameters of Hidden Threats of Early Detection in Information Systems for Machine Learning Tasks

Zolotukhina M., Zykov S.

摘要

The purpose of the analysis is to identify new signs in which there is a probability of the presence of components of hidden threats in the system or a forecast of possible states of inactivity of system modules. The diversity of the software used and the problems that arise at the same time are described. The study is carried out under the conditions of creating a simulation model in Anylogic used to determine fault criteria. The detected dependencies are confirmed by output data in the form of graphs. Certain dependencies and features are a contribution for future research and publications, and the data are also applicable to the knowledge base being developed. The created query processing model showed the dependence of the characteristics of the input parameters on the time and noise of the data stream. The analysis also confirms the presence of a malfunction in the data processing flow. The existing solutions for detecting attacks are based on the introduction of software and hardware and on measures of a general nature of protection. In order to establish a hidden threat, such schemes may and will work effectively, but in conditions of long-term hidden threats, an assessment of the situation at different levels is needed, an analysis of signs of all stages of the malfunction state, the use of a predictive model and it is not enough to use disparate means of protection in the form of software, antiviruses, etc. Research in the field of finding dependencies and parameters for predicting cyberattacks on information systems is relevant due to the increasing complexity and frequency of cyberattacks. This allows you to promptly warn about possible threats, take measures to protect information systems, minimize economic losses and develop analytical capabilities in the field of cybersecurity. This direction retains its stability and uniqueness in the field of process research, namely the ability to learn and carry out in-depth analysis of parametric data. implementation of anomaly search within the intrusion detection system.

Computational nanotechnology. 2023;10(3):83-91
pages 83-91 views

Analysis and Selection of the Optimizer Mode for Obtaining the Optimal Plan for the Execution of a Query in the ORACLE DBMS

Unkovskaia G.

摘要

The relevance of this topic is related to the widespread use of Oracle database management systems (DBMS) in many industries where data volumes are extremely large, which requires high system performance, reliability and fault tolerance. The gradual increase in the number of users and the increasing amount of information processed in conditions of limited resources leads to the need for optimization to achieve stable results and reduce performance incidents. In Oracle, no matter what actions are performed on the data, an optimizer is involved, whose task is to determine the optimal query execution plan. The purpose of this study is to analyze the principles of the optimizer modes, compare them, determine the advantages and disadvantages of each of them, as well as the degree of influence of various factors on the construction of an optimal query execution plan for each of the optimizer modes. Simulations have shown that response time, overhead, and runtime stability can be improved by applying the correct optimizer mode. The result of the study is to provide recommendations for choosing the optimizer mode for a specific case.

Computational nanotechnology. 2023;10(3):92-100
pages 92-100 views

METHODS AND SYSTEMS OF INFORMATION PROTECTION, INFORMATION SECURITY

Relational Database of Cartographic Scenes with Associative Protection

Vershinin I.

摘要

This research paper presents the new approach to data organization and protection in relational databases of cartographic scenes. The proposed approach uses associative steganography, which combines the principles of steganography and cryptography to protect information. The proposed technique is based on the processing and storage of cartographic information in vector format, as well as on the use of SQL servers to organize data protection. The structure and properties of relations in a relational database are described in detail, including different types of objects and map layers, methods of their representation and encoding. Particular attention is paid to the structure of data representation, protection measures, including randomization of records and use of association-protected storage format for certain attributes. The paper includes a discussion of the differences between an associative-protected full-object map schema database and a point-object database, and presents an analysis of vectorization errors and their relationship to raster data quality. This research is of interest to specialists in the field of geographic information systems, cryptography, information security, as well as to all those who work with processing and protection of cartographic data.

Computational nanotechnology. 2023;10(3):101-108
pages 101-108 views

The Thermographic Face Model Appliance for Identification and Authentication

Belov N., Korzhuk V.

摘要

The subject of this study pertains to the continued exploration of identity identification algorithms utilizing thermogram data of individuals. The novelty of this research lies in the development of a biometric thermographic model for facial recognition, capable of incorporating quasi-static points that remain unchanged over time and unaffected by external factors. Additionally, this work provides experimental confirmation of the proposed Method. Within the scope of this study, the investigated model primarily focuses on the capacity to generalize key facial areas and determine the variability weights of these areas for everyone, regardless of when the thermogram of the user’s face was captured. Furthermore, this study train algorithms that have undergone testing in previous works by the authors, as well as within the current research, forming part of the developed software and hardware complex designed to validate the concept of identifying quasi-static areas. The primary outcomes of this research reveal that the developed hardware and software complex corroborates the applicability of the algorithm based on Siamese convolutional neural networks for resolving the problem of user identification via facial thermography. This algorithm successfully competes with other biometric identification methods, including those utilizing 2D facial images. Moreover, experimental results affirm the effectiveness of isolating quasi-static regions, with an 86.41% accuracy rate in correctly identifying features identified using the developed neural network. Concerning the task of amalgamating results obtained from two identification algorithms, the stacking method based on the logistic regression algorithm emerges as the most effective. This approach yields low error rates of the first and second kinds, amounting to 6.61 and 5.63%, respectively. Furthermore, in the comparative analysis of identification algorithms based on 2D images of users’ faces, the FaceNet algorithm is deemed the most effective. This algorithm boasts high identification accuracy, even in the presence of alterations in appearance and lighting conditions. FaceNet proves especially advantageous when working with 2D facial images, significantly enhancing performance in user identification tasks based on images captured within the visible spectrum. The f-measure metric for this algorithm, trained on data from the YouTube Face DataBase, stands at 0.94. The practical significance of these research findings lies in their potential application within access control and monitoring systems to enhance the reliability of person-based authentication processes. The effective utilization of the methods presented here holds value in the realm of processing thermographic images for the purpose of identity verification, relying on the quasi-static features of the user’s facial thermogram. Such applications can be especially valuable in scenarios necessitating identification, even amidst fluctuations in facial expressions, appearance changes (such as makeup application), or variations in environmental conditions.

Computational nanotechnology. 2023;10(3):109-120
pages 109-120 views

Associative Protection of Numerical Information in Text Documents Using the Parallel Framework Library on the .NET Platform

Gibadullin R., Vershinin I.

摘要

The paper discusses the development and analysis of an application designed to protect numeric data in text files using an associative data protection mechanism. The application, based on the .NET platform and using the Parallel Framework library, was tested in detail to evaluate the effectiveness of multithreaded data processing and the use of regular expressions to extract numeric information from text. The results showed that the application of parallel processing can significantly increase performance, achieving twice the speedup on a multi-core hardware platform. At the same time, the paper highlights and analyzes some of the challenges and limitations associated with parallel processing, including user interface locking, the need for thread safety, and the peculiarities of working with regular expressions in multithreaded mode. Possible directions for further improvement of the application are discussed. The conducted research is of practical value for the development of parallel data processing methods in the context of information protection.

Computational nanotechnology. 2023;10(3):121-129
pages 121-129 views

NANOMATERIALS

Investigation of the Properties of Functional Ceramics Synthetized by the Modified Carbonate Method

Rakhimov R., Pankov V., Yermakov V., Rashidov Z., Rakhimov M., Rashidov K.

摘要

This article explores the properties of functional ceramics synthesized using a modified carbonate method. The authors propose and develop new methods of ceramic technology to scale up the process of obtaining ceramic nanocomposites. The study describes a synthesis method for ceramic composite powders based on the use of carbonates as starting components. The production and investigation of nanocomposite materials are considered important steps in the development of advanced technologies. The developed ceramic material has the ability to generate pulsed radiation in the far-infrared range, which finds application in various fields, including medicine, engineering, sterilization, low-temperature drying, and agricultural product processing. The potential of this material is also noted for use in optical materials, catalysts, electronics, and other areas.

Computational nanotechnology. 2023;10(3):130-143
pages 130-143 views

Identification and Extraction of Electrophysical Parameters for Solar Cell Models by Experimental Data

Dolgopolov M., Chipura A., Shishkin I.

摘要

The article summarizes the methodology of identification and extraction of electrophysical characteristics of solar cells for various models based on experimental data and equivalent one-, two-, three-diode circuits. A technique based on computer modeling in the Wolfram Mathematica analytical system and in the Mathcad computer algebra system is proposed. The technique allows to compare theoretical and experimental data and deal with different models in both directions – from experiment to theory and vice versa. Experimental work was also carried out to create solar cells based on porous silicon with antireflection coatings (ZnS, DyF3, ZnS + DyF3) and with SiC/Si heterojunctions. Measurements of the I-V and P-V of experimental photoconverters, as well as their surface resistances from the sides of phosphorus and boron doping on the formation of the p-n-junction, were carried out. The main purpose of the study is to develop a methodology for optimizing solar cells and to present modeling and analysis methods that can be used in the development of photobetaconverters to ensure maximum power.

Computational nanotechnology. 2023;10(3):144-160
pages 144-160 views
##common.cookie##