The article discusses the issues associated with the preparation of hot water in individual apartment heating systems that use a secondary plate heat exchanger of the boiler. The drawbacks of this approach are highlighted, including delays in hot water supply, the need to drain water from the pipeline, the inability to regulate temperature and flow rate, as well as the lack of recirculation capabilities. As an alternative, a system with a storage tank and a plate heat exchanger is proposed, which ensures stable water temperature, adjustable flow rate, resource savings, and the possibility of recirculation. Based on experimental studies, the heat transfer coefficient for heat exchangers with profiled and flat plates has been determined. Calculations of the required heat exchanger area are provided, depending on the type of plates, the volume of the storage tank, and its charging time, which allows for the optimization of hot water supply system design.
Keywords: plate heat exchanger, storage tank, heat transfer coefficient
This study examines the control of the cooling fan speed as an effective means of reducing emissions of volatile organic compounds during three-dimensional layer-by-layer printing. The high extrusion temperatures used in modern high-speed printers lead to emissions of harmful volatile organic compounds, which poses health risks in poorly ventilated rooms. A mathematical model has been developed to establish a quadratic relationship between the fan speed and the volumetric air flow, which directly affects the deposition of volatile organic compounds on the melt surface. The experimental setup uses relay control of the motor current and proportional-integral-differentiating speed control, ensuring rapid stabilization of the air flow with minimal overshoot. From the analysis of transient characteristics, including motor current, fan speed, airflow velocity, and power consumption, it is shown that precise control of fan speed creates stable and predictable airflow movement, significantly reducing emissions of volatile organic compounds. In addition, the results show that integrating the feedback of the volatile organic compounds sensor in real time with the control of the extrusion rate can offer an even more adaptive and effective strategy for reducing emissions. This research lays the foundation for safer and more efficient 3D printing processes with layer-by-layer deposition modeling through improved temperature and emission management.
Keywords: volatile organic compounds, three-dimensional printing, adaptive control, layer-by-layer deposition, regulation
The article develops calibration methods to improve accuracy and reduce operating costs of robotic systems in warehouse logistics. Special attention is given to the use of laser sensors and offset parameters, enabling the robot's position to adapt to changing conditions. The methodology includes the stages of initialization, orientation, and final verification, which help minimize deviations and reduce the need for manual adjustments. This approach ensures consistent operational accuracy and lowers operating costs through automated and adaptive robot calibration settings.
Keywords: robot calibration, warehouse automation, laser sensor, offset, positioning accuracy, robotic system, adaptive calibration, automatic calibration, collaborative robot, cobot
When designing engineering protection, it is necessary to use modern and progressive technologies. The technical decisions made must comply with the fundamentals of design - economic and operational efficiency. This article discusses the methods and principles of operation necessary for hazard assessment and the development of effective measures to prevent and reduce risks in the design, selection of optimal solutions and recommendations for the development of engineering protection projects. A section of a public highway of local significance in the Krasnodar Territory was selected during the survey. The materials of engineering and geological studies of the slope were used as initial data, which included reconnaissance route observations, engineering and geological workings with soil sampling, and determination of the physico-mechanical characteristics of the soils.
Keywords: engineering protection, surveys, design, stability, reconstruction, soil, landslide slope
Currently, key aspects of software development include the security and efficiency of the applications being created. Special attention is given to data security and operations involving databases. This article discusses methods and techniques for developing secure applications through the integration of the Rust programming language and the PostgreSQL database management system (DBMS). Rust is a general-purpose programming language that prioritizes safety as its primary objective. The article examines key concepts of Rust, such as strict typing, the RAII (Resource Acquisition Is Initialization) programming idiom, macro definitions, and immutability, and how these features contribute to the development of reliable and high-performance applications when interfacing with databases. The integration with PostgreSQL, which has been demonstrated to be both straightforward and robust, is analyzed, highlighting its capacity for efficient data management while maintaining a high level of security, thereby mitigating common errors and vulnerabilities. Rust is currently used less than popular languages like JavaScript, Python, and Java, despite its steep learning curve. However, major companies see its potential. Rust modules are being integrated into operating system kernels (Linux, Windows, Android), Mozilla is developing features for Firefox's Gecko engine and StackOverflow surveys show a rising usage of Rust. A practical example involving the dispatch of information related to class schedules and video content illustrates the advantages of utilizing Rust in conjunction with PostgreSQL to create a scheduling management system, ensuring data integrity and security.
Keywords: Rust programming language, memory safety, RAII, metaprogramming, DBMS, PostgreSQL
This paper presents a highly technical implementation of an ECG-based biometric identification system utilizing deep learning models for both verification and closed-set identification. We propose a dual-model architecture comprising a Siamese neural network for one-to-one verification and a deep convolutional neural network (CNN) for one-to-many classification. The methodology includes comprehensive signal preprocessing, data augmentation to simulate physiological variability, and feature extraction tailored to ECG characteristics. Experimental evaluation on benchmark ECG datasets demonstrates the effectiveness of the proposed system. The Siamese network achieves high verification accuracy with low equal error rates, while the CNN classifier attains state-of-the-art identification accuracy (exceeding 98% on average) across enrolled subjects. Key performance metrics—accuracy, precision, recall, and F1-score—indicate robust performance, outperforming several existing biometric methods. The results highlight the viability of ECG-based authentication in real-world applications.
Keywords: biometric authentication, electrocardiogram (ECG), siamese neural network, convolutional neural network, qrs complex, signal processing
In this paper, a star sensor tracking method without a star library based on the angular distance chain algorithm is proposed to solve the problem that traditional star sensors rely on a fixed star library and need to be configured to work with multiple units in the tracking mode. This method achieves star map matching by dynamically generating angular distance chains, avoiding the dependence on the global star library. Experiments show that the recognition time of the algorithm in the tracking mode is reduced to milliseconds, and the maximum pose determination error is no more than 0.035°, which proves its effectiveness and reliability. The study provides key technical support for the development of low-cost and lightweight star sensors that are suitable for scenarios such as deep space exploration and near-Earth satellite clusters.
Keywords: angular distance chain algorithm, star sensor without star library, star map recognition, tracking mode, orientation, dynamic matching, deep space exploration
The article proposes to strengthen the upper chord of the triangular spacer system with fiberglass. The material used for strengthening shows high efficiency in increasing the strength of the wooden element for the 1st group of limit states. The material proposed for strengthening does not lead to a change in the original decorative expressiveness of wooden structures, and maintains the service life.
Keywords: spacer structure, upper chord, glued laminated board element, modulus of elasticity, volumetric weight, geometric characteristics, bending moment, longitudinal compressive force, structural reinforcement, composite material
The article presents the method of multiple initial connections aimed at enhancing the information security of peer-to-peer virtual private networks. This method ensures the simultaneous establishment of several initial connections through intermediate nodes, which complicates data interception and minimizes the risks of connection compromise. The paper describes the algorithmic foundation of the method and demonstrates its application using a network of four nodes. An analysis of packet routing is conducted, including the stages of packet formation, modification, and transmission. To calculate the number of unique routes and assess data interception risks, a software package registered with the Federal Service for Intellectual Property was developed. The software utilizes matrix and combinatorial methods, providing high calculation accuracy and analysis efficiency. The proposed method has broad application prospects in peer-to-peer networks, Internet of Things systems, and distributed control systems.
Keywords: multiple initial connections, peer-to-peer network, virtual private network, information security, data transmission routes, intermediate nodes, unique routes
The article presents an algorithm for establishing a secure connection for peer-to-peer virtual private networks aimed at enhancing information security. The algorithm employs modern cryptographic protocols such as IKEv2, RSA, and DH, providing multi-level data protection. The developed algorithm structure includes dynamic generation and destruction of temporary keys, reducing the risk of compromise. The proposed solution is designed for use in corporate network security systems, Internet of Things system, and distributed systems.
Keywords: virtual Private Network, peer-to-peer network, cryptographic protocols, RSA, Diffie-Hellman, IKEv2, secure connection, multi-layer protection, information security, distributed systems
This article examines the vulnerability associated with storing image files in the cache on the device's hard disk in unencrypted form. The nature of this problem and the possible consequences of its exploitation, including leakage of confidential data, abuse of information received and risks to corporate information systems, are being investigated. The main attention is paid to the method of protection against this vulnerability, which is based on the use of masking techniques using orthogonal matrices.. The developed prototype of the messenger is presented, in which this method is implemented: images are transmitted and stored in the file system in masked form, the unmasking process is carried out directly in the messenger application itself.
Keywords: information security, messenger, messaging, communications, instant messaging systems, encryption, orthogonal matrices
This article provides an overview of existing structural solutions for in-line robots designed for inspection work. The main attention is paid to the analysis of various motion mechanisms and chassis types used in such robots, as well as to the identification of their advantages and disadvantages in relation to the task of scanning a longitudinal weld. Such types of robots as tracked, wheeled, helical and those that move under the influence of pressure inside the pipe are considered. Special attention is paid to the problem of ensuring stable and accurate movement of the robot along the weld, minimizing lateral displacements and choosing the optimal positioning system. Based on the analysis, recommendations are offered for choosing the most appropriate type of motion and chassis to perform the task of constructing a 3D model of a weld using a laser triangulation sensor (hereinafter referred to as LTD).
Keywords: in-line work, inspection work, 3D scanning, welds, structural solutions, types of movement, chassis, crawler robots, wheeled robots, screw robots, longitudinal welds, laser triangulation sensor
The purpose of the article is to review various types how to deceive attackers in the network, analyze the applicability and variability of modern deception technologies. The method of investigation - analyzing existing articles in reviewed Russian and foreign sources, aggregating researches, forming conclusions based on the analyzed sources. The review article considers technologies of deception an attacker (Honeypot traps, Honeytoken decoys, moving target defense MTD, Deception platform). The effectiveness of the use of deception in terms of the impact on the mental state of a person is given in the article. The article provides a description of different types of Honeypots, discusses the classification according to the target, place of introduction, level of interaction, location, type of introduction, homogeneity and type of activity. as well as their component parts. Different strategies for using traps in the network are discussed - sacrificial lamb, hacker zoo, minefield, proximity traps, redirection screens, and deception ports. Classification of decoys is given, methods of their application in an organization's network are described, additional conditions that increase the probability of detection of an attacker by using decoys are specified. The basic techniques of the MTD strategy to obfuscate the infrastructure are given. The interaction of these methods with Honeypot and Honeytoken technologies is described. Research that confirms the effectiveness of using MTD in conjunction with traps and decoys is given it he article, the difficulties in using this strategy are pointed out. A description of the Deception platform is given, its distinctive features from conventional traps and decoys are described, and the possibility of its interaction with MTD is given. As a result, the main technologies and strategies to deceive the attacker have been identified and described, their development is pointed, their interaction with attackers and counteraction to them is described.
Keywords: Deception Platform, Honeypot, Honeytoken, Honeynet, MTD
The development, research and construction of devices that speed up the process of interaction between various modules (for example, telemetry and remote control systems), and in general, hybrid communication systems of a digital city that include a variety of systems used in an Intelligent Building is an urgent problem. One of these devices presented in the article is the optimal multi–frequency modem developed. In addition to the developed modem, the article presents examples of the development of similar types of devices and systems by both Russian and foreign researchers. At the same time, the authors proved that the use of the proposed modem provides a gain in spectral and energy efficiency in comparison with analogues. The proposed approach can be used to organize high-speed data transmission over frequency-limited communication channels based on new wired technologies of the digital subscriber line standard, as well as wireless systems.
Keywords: telemetry and remote control system, intelligent building, digital city hybrid communications system, modem, multi-frequency modulation, digital subscriber line, optimal finite signal, modulator, demodulator, wireless communication system
This article examines the use of a dual-circuit closed-loop system for pulsation combustion of solid fuel in agricultural services. The results of research on gas self-oscillations during wood waste combustion in a Helmholtz resonator-type installation are presented. It has been established that with certain geometric characteristics of the installation, a significant sound pressure level (up to 165 dB) can be achieved in the combustion chamber while maintaining a low noise level (up to 65 dB), which contributes to increased combustion efficiency and meets environmental requirements. Potential applications of this technology are proposed, including agricultural waste utilization, drying of agricultural products, and heating of greenhouse complexes and livestock facilities.
Keywords: Pulsation combustion, Helmholtz resonator, solid fuel, agricultural waste, energy efficiency, biomass utilization, agro-industrial complex.