The article examines the specifics of the operation of Russian and European tower cranes. With the development of technology, tower cranes are becoming more and more advanced, equipped with modern automation systems. The lack of understanding of the differences in the operation of tower cranes from different manufacturers and the potential problems associated with this remain unresolved and require study. In this regard, conducting a detailed analysis of the features and differences in the operation of this special equipment will avoid problems in the construction industry, as well as reduce the risk of accidents. As part of the study, a comparison of the characteristics and performance of individual Russian and European tower cranes was conducted, on the basis of which the advantages and disadvantages of this type of equipment were identified. In the course of the work, recommendations were proposed to improve the operation of Russian tower cranes, which will contribute to the creation of more competitive equipment on the Russian market.
Keywords: tower crane, tower crane design, operation, specifics of European and Russian tower cranes, automation system
The purpose of the article is to review various types how to deceive attackers in the network, analyze the applicability and variability of modern deception technologies. The method of investigation - analyzing existing articles in reviewed Russian and foreign sources, aggregating researches, forming conclusions based on the analyzed sources. The review article considers technologies of deception an attacker (Honeypot traps, Honeytoken decoys, moving target defense MTD, Deception platform). The effectiveness of the use of deception in terms of the impact on the mental state of a person is given in the article. The article provides a description of different types of Honeypots, discusses the classification according to the target, place of introduction, level of interaction, location, type of introduction, homogeneity and type of activity. as well as their component parts. Different strategies for using traps in the network are discussed - sacrificial lamb, hacker zoo, minefield, proximity traps, redirection screens, and deception ports. Classification of decoys is given, methods of their application in an organization's network are described, additional conditions that increase the probability of detection of an attacker by using decoys are specified. The basic techniques of the MTD strategy to obfuscate the infrastructure are given. The interaction of these methods with Honeypot and Honeytoken technologies is described. Research that confirms the effectiveness of using MTD in conjunction with traps and decoys is given it he article, the difficulties in using this strategy are pointed out. A description of the Deception platform is given, its distinctive features from conventional traps and decoys are described, and the possibility of its interaction with MTD is given. As a result, the main technologies and strategies to deceive the attacker have been identified and described, their development is pointed, their interaction with attackers and counteraction to them is described.
Keywords: Deception Platform, Honeypot, Honeytoken, Honeynet, MTD
The article proposes a set of anthropomorphic models for assessing the risks of infrastructural destructivism effects. These models are based on one of the approaches to assessing the risks of infrastructural genesis, which consists in assessing the effect of infra-structural destructivism, consisting in the uncontrolled self-destruction of the information infrastructure. In contrast to existing approaches to assessing the indicators of infrastructural destructivism, the article proposes the use of models that take into ac-count multiple inter-object behavioral interactions of processes based on the anthropomorphic approach. The anthropomorphic approach involves the implementation of algorithms for assessing inter-object interactions according to the principles of development of wildlife. The phenomenon of infrastructural destructivism has a practical explanation associated with the fact that under certain conditions, the simultaneous implementation of destructive impacts on infrastructure objects from various sources can lead to both catastrophic changes (that is, to the complete self-destruction of the information infrastructure) and to minimizing the risks of infrastructural genesis. The article introduces the concept of the "health" metric in the infrastructure information security monitoring system, which displays the presence of "negative" behavioral activities of processes and thereby predicts an increase in the probability of the appearance of infra-structure destructiveness effects. Thus, when applying the proposed models, it becomes possible to increase the accuracy of assessing the risks of infrastructure genesis, and therefore ensure a sufficient level of information security.
Keywords: infrastructure destructiveness, destructive impacts of infrastructure genesis, anthropo-morphic approach, intelligent analysis of event logs, behavioral analysis
The article presents the main stages and recommendations for the development of an information and analytical system (IAS) based on geographic information systems (GIS) in the field of rational management of forest resources, providing for the processing, storage and presentation of information on forest wood resources, as well as a description of some specific examples of the implementation of its individual components and digital technologies. The following stages of IAS development are considered: the stage of collecting and structuring data on forest wood resources; the stage of justifying the type of software implementation of the IAS; the stage of equipment selection; the stage of developing a data analysis and processing unit; the stage of developing the architecture of interaction of IAS blocks; the stage of developing the IAS application interface; the stage of testing the IAS. It is proposed to implement the interaction between the client and server parts based on Asynchronous JavaScript and XML (AJAX) technology. It is recommended to use the open source Leaflet libraries for visualization of geodata. To store large amounts of data on the server, it is proposed to use the SQLite database management system. The proposed approaches can find application in the creation of an IAS for the formation of management decisions in the field of rational management of forest wood resources.
Keywords: geographic information systems, forest resources, methodology, web application, AJAX technology, SQLite, Leaflet, information processing
A comparative analysis of the lighting conditions of school premises was carried out based on design solutions for lighting devices from three Russian lamp manufacturers. All projects were carried out using lighting devices based on recommendations to manufacturers to use their range of lamps to illuminate various school premises. The design was carried out using the DIALux program. Each of the three manufacturers is widely known to specialists and has established itself as a reliable manufacturer of domestic lighting products, ready to offer a full range of lamps for various school premises. A technical and economic comparison of the total present costs for all lighting installations (using the example of one entire school) made it possible to conduct a comparative analysis and determine the most profitable options. An analysis of the current state of the Russian market of lighting devices recommended by manufacturers for classroom lighting has been carried out, their characteristics have been reviewed, and their compliance with current energy efficiency requirements has been assessed. Conclusions and forecasts have been made for the further development of lighting equipment with LEDs for lighting classrooms, based on the need to constantly improve the modern range of lighting devices in terms of their energy efficiency and competitiveness.
Keywords: technical and economic comparison, levelized cost method, comparative analysis, school lighting, lighting device, lighting modeling, energy efficiency
This article examines the security of currently popular corporate instant messaging applications (messengers). A comparative analysis of the security of some solutions for corporate use has been carried out. The main result of the review is the conclusions about the advantages and disadvantages of the considered systems, which can be used by organizations to choose the appropriate solution.
Keywords: Information security, corporate messenger, messaging, internal communications, instant messaging systems, end-to-end encryption
The purpose of this work is to study the applicability of the U-Net architecture for automatically determining the contours of natural skins using the TensorFlow and Keras libraries in Python. A software application has been developed based on methods including OpenCV libraries, as well as a model for implementing a deep convolutional neural network. The dataset for training and testing the network was created using augmentation. Training was carried out using the stochastic gradient descent method after splitting the data sample into training and test images. In the future, the results obtained will be used to create an automated system that will make it possible to determine the contours of the skin and its defects, which in turn will open up the possibility of calculating the useful area of the skin and creating an automated layout of patterns taking into account the identified defects.
Keywords: computer vision, edge detection, natural skin, machine learning, convolutional neural networks, U-Net architecture, deep learning
Wood as a building material has ancient roots and a long history of use. With the development of technology and the desire to live in better environmental conditions, interest in using wood to construct multi-story buildings is growing. This article is devoted to the prospects for the development of wooden multi-story buildings in Russia, in particular with the use of CLT panels, the popularity of which is growing all over the world. Comparative, statistical and logical analyzes were used as research methods. The article discusses modern methods and technologies for the construction of multi-story wooden buildings, including their advantages in terms of ecology, energy efficiency and design, conducts a comparative analysis of buildings made of reinforced concrete and CLT panels, and proposes a technological scheme for the reconstruction of buildings using CLT panels, including adding additional floors. Challenges and prospects for further development of this technology are highlighted, strategic solutions are proposed to reduce the cost of CLT panels
Keywords: clt-panels, wood construction, wooden structures, reconstruction, renovation, high-rise wooden construction
One of the most important points in increasing the conversion component of a web resource is identifying the most attractive places for the site user. To identify these locations, a site user activity data visualization tool was created that provides a visual representation of each user action on a site page.
Keywords: heat map, site, oculograph, fixation, priority area
The proposed work considers two types of neural network models for describing fire risks depending on the size of the population and preventive measures. Neural network models make it possible to consider fire risks integrally, taking into account the type of municipality or separately for each of the three existing types. Based on these models, a response surface for fire risks - population and prevention has been implemented, which allows you to assess the magnitude of risks based on input data to optimize decisions made. For a given value of the standard risk, the dependence of optimal prevention was obtained depending on the number of deposits in the municipality, which makes it possible to guarantee fire risks less than or equal to the standard indicators. The article analyzes and evaluates the effectiveness of preventive measures using neural networks. The input data for training the neural network includes fire data collected in Vietnam and Russia (population, number of fires, number of deaths, number of preventive measures). Based on these indicators, the effectiveness of preventive measures is predicted. Based on the forecasting results, decisions can be made to ensure fire safety in the state. The results obtained indicate the possibility of predicting the absolute value of the effectiveness of preventive work based on quantitative and categorical variables. A relatively large forecast error is associated, on the one hand, with the need to take into account a larger number of input parameters, and on the other hand, with the need to increase the size of the neural network training base. After refining the model, the results obtained allow us to evaluate the effectiveness of preventive measures for provinces and cities.
Keywords: fire safety, preventive measures, neural network, management decision support, prediction model
The public education project ""Dream School"", implemented in support of the federal school overhaul program, attracts students of architectural and design schools in the regions, which will allow them to simultaneously acquire applied competencies in the learning process. During the development of the design project, the need for specialists to conduct a preliminary design analysis was revealed, since one of the five schools did not meet the standards in terms of their spatial planning parameters. It is proposed to carry out the reconstruction of this educational institution. The premises of the dining room and the assembly hall are transferred to the annex block.
Keywords: school design project, school renovation, school recreation, public education project "Dream School", school reconstruction
В статье представляется совершенствование технологии гидроизоляции с помощью инъектирования. Специально для этих технологий разработана полимерцементная композиция для инъекционной гидроизоляции. The article presents the improvement of waterproofing technology by injection. A polymer cement composition for injection waterproofing has been developed specifically for these technologies.
Keywords: technology, production, injection waterproofing, injection method, repair and restoration work, polymer cement composition
The article contains the methodology and results of theoretical and experimental studies of the stress-strain state of a conical radial-beam dome with triangular shell elements. The results obtained by various methods are analyzed and compared. The triangular membrane panel is part of the radial beam dome structure and consists of a support frame and a steel membrane in the shape of a triangle. The shape of the triangle forming the membrane panel can be different and depends on the number of ribs in the radial beam dome. The supporting contour is a compressed-bending element of the dome and is made, as a rule, from a rolled steel profile with a channel section. The membrane is made of thin steel sheet and attached to the upper flange of the channel with self-tapping screws or spot welding. To assess the strength and deformability of a steel membrane sheet, its operation under the action of a uniformly distributed snow load, an unevenly distributed snow load and a concentrated installation load was considered. Several options for nonlinear static calculations in various computer systems are shown.
Keywords: building structures, wooden structures, membrane panel, stress-strain state, radial beam dome, dome, membrane, design, experimental study
The features of the (m,m) implementation scheme of visual cryptography are considered, which differs from the existing ones by the formation of shadow images (shares) of an image containing a secret. The proposed approach is based not on the decomposition of the secret image into shares, but on their step-by-step transformation by multiplication by orthogonal Hadamard matrices. The images obtained during each transformation of the stock are noise-resistant in the data transmission channel.
Keywords: image with a secret, image decomposition, image transformation, orthogonal Hadamard matrices, two-way matrix multiplication, noise-resistant image encoding
The application of orthogonal matrices in information processing and transformation systems is considered. A method is proposed for assessing the results of protective masking of audio information using Walsh-structured quasi-orthogonal Mersenne matrices.
Keywords: orthogonal matrix, message masking, masking/unmasking algorithm, amplitude-frequency response, white noise, root mean square error, signal-to-noise ratio