Т. 2
Permanent URI for this communityhttps://ir.nmu.org.ua/handle/123456789/170209
Browse
19 results
Search Results
- Some of the metrics are blocked by yourconsent settings
Publication Еngineering solutions for the development of satellites with space debris disposal functions(НТУ "ДП", 2024)Plisetska E.I.Space debris contamination has become a critical threat to the safety of modern satellites and future missions. As the number of spacecraft in orbit and collisions between objects grows, more and more fragments appear that can cause new collisions, creating a cascading effect that impairs the normal functioning of orbital objects. Modern engineering solutions are aimed at developing satellites with space debris disposal capabilities, such as autonomous manoeuvring technologies, non-contact orbit reduction systems, methods for capturing unstable objects, and integrated reusable platforms. Various methods effectively capture space debris, including large and unmanageable objects. One of the critical approaches is using robotic manipulators that allow precise interaction with the target due to the high-precision control and adaptability of the systems. Such manipulators can ensure safe gripping even in the presence of rotation or instability of the object, as they can stabilise the load and compensate for external disturbances. - Some of the metrics are blocked by yourconsent settings
Publication Analysis of topical issues of rifle barrel fluting influence on thermal calculation(НТУ "ДП", 2024) ;Ivanenko I. V.Shkut A.P.Designing the barrels of modern weapons—from tank guns and grenade launchers to precision rifles and machine guns—requires comprehensive consideration of the complex thermal and mechanical processes that occur during firing. These processes are associated with extreme heating and pressure conditions, presenting a challenge for designers to accurately analyze the thermodynamic effects on barrel materials. The reliability, durability, and performance of weapons depend on the effective management of these processes, making thermal analysis of barrels an important scientific task. - Some of the metrics are blocked by yourconsent settings
Publication Using service mesh to increase the level of security in microservice environments(НТУ "ДП", 2024) ;Chekushkin N.D.Shevtsova O. S.Microservice architecture has become the basis of modern distributed systems due to its ability to provide flexibility, scalability and simplified management of software components. However, this creates challenges in ensuring reliable protection of connections between services. Using Service Mesh helps solve these issues by automating traffic management and security. The article discusses the main aspects of Service Mesh, its key components, role in ensuring security, advantages for microservice environments, as well as the concept of Ambient Mesh as an ideological continuation of Service Mesh. Microservices architecture is the main paradigm for developing scalable applications in cloud environments. It allows you to break large monolithic programs into separate, independent services that communicate with each other using APIs. One of the most important aspects in such architectures is safe and reliable interaction between services. Standard network mechanisms do not always provide the necessary level of protection and traffic management. Service Mesh technology is actively used to solve these challenges. - Some of the metrics are blocked by yourconsent settings
Publication Knowledge distillation with group convolution mapping layer for plant pest classification(НТУ "ДП", 2024)Khabarlak K.The increasing demand for high-quality food requires efficient monitoring and control of greenhouse environments. One crucial aspect is the detection and classification of plant pests, which can be achieved using deep learning-based computer vision techniques. However, deploying these models on edge devices like Raspberry PI 4 in a stationary greenhouse setup poses significant challenges due to limited computational resources. To address this challenge, we employ knowledge distillation, a technique that transfers knowledge from a large teacher network to a smaller student network. The goal is to retain the accuracy of the teacher network while reducing the complexity of the student network. - Some of the metrics are blocked by yourconsent settings
Publication Security and data protection in brain computer interface systems(НТУ "ДП", 2024)Titova А. М.Sensors that directly measure the electrical activity of the brain are the first component, non-invasive sensors that are attached to the scalp or invasive sensors that are implanted directly into the brain. Electroencephalography (EEG) electrodes, noninvasive sensors, measure electrical potentials generated by neural activity in the cerebral cortex through the scalp. However, invasive sensors such as microelectrode arrays or electrocorticographic (ECoG) electrodes directly measure electrical activity on the surface of the brain or in specific brain regions. Modern BCI signal amplifiers are extremely sensitive and have low intrinsic noise. They can also amplify brain signals thousands of times while preserving their basic functions. - Some of the metrics are blocked by yourconsent settings
Publication On the measurement of the free fall acceleration on the basis of the ATWOOD machine(НТУ "ДП", 2024) ;Tataryntsev H.Gorev V.A well-known laboratory work dedicated to the measurement of the free fall acceleration on the basis of the Atwood machine is widely used in different universities, in particular, in the Dnipro University of Technology. However, in the block moment of inertia and the moment of frictional force in the block axis are neglected, which leads to understated measurement results. The mathematical model which takes into account the above-mentioned parameters of the Atwood machine is given in but in the problem of the free fall acceleration measurement is not considered. So, the aim the work is to investigate the accuracy of the measured results in the framework of the model which takes into account the block moment of inertia and to estimate the average moment of frictional force in the block axis. - Some of the metrics are blocked by yourconsent settings
Publication Мethods of ensuring data protection against brute force cryptographic attacks(НТУ "ДП", 2024)Rudyk O. F.One of the most common threats is brute force attacks. Brute force is a technique used in cybersecurity to crack encrypted messages or passwords by systematically trying all possible combinations until the correct one is found. This method is based on the assumption that the encryption algorithm used is known, but the key or password is unknown. The use of these methods is relevant when solving security aspects of problems in sources using the algorithms described in. In the case of using a brute-force method to decrypt text protected by a symmetric key, the level of complexity of information disclosure can be relatively low, especially if the key is short or not sufficiently complex. If an 8-bit key is used, there are 2^8, or 256, possible keys. Therefore, it will take at most 256 tries to find the correct key, with a 50 percent chance of finding the right key after half of the tries. - Some of the metrics are blocked by yourconsent settings
Publication Іnformation support of automated technology of computer-integrated control of building heating(НТУ "ДП", 2024) ;Olishevskyi I. H.Titov M. G.The development and implementation of automated technologies for controlling heat pump systems, including during the computer-integrated control of the building heating process, allows optimizing the use of energy and resources, as was proved in the second chapter of this dissertation. In turn, the information provision of such technologies allows for accurate zonal control and regulation of temperature in premises and buildings, which optimizes energy consumption and, accordingly, minimizes heating costs. The basis of the developed information support technology for the automated control of building heating using the proposed computer-integrated method of increasing the energy efficiency of the heat pump heating system is based on a model that includes the following procedures and functions. - Some of the metrics are blocked by yourconsent settings
Publication Investigation of the resistance of an infinite parallelepiped circuit(НТУ "ДП", 2024) ;Kryvonis Y.Gorev V.The following problem was proposed in 2016 at the all-Ukrainian Physics Olympiad An infinite circuit is given (see Fig. 1) where the resistance of each horizontal segment is equal to 1 Ω, and the resistance of each vertical segment is equal to 3 Ω. The task was to estimate the general resistance of the given infinite circuit between the terminals A and В. The author solution leads to the result 0,65 0,05 R . However, the problem occurs to calculate the general resistance under consideration with higher accuracy - Some of the metrics are blocked by yourconsent settings
Publication Investigation of the resistance of an infinite rectangular circuit(НТУ "ДП", 2024) ;Kryvonis Y.Gorev V.The following problem was proposed in 2016 at the all-Ukrainian Physics Olympiad An infinite circuit is given (see Fig. 1) where the resistance of each horizontal segment is equal to 1 Ω, and the resistance of each vertical segment is equal to 3 Ω. The task was to estimate the general resistance of the given infinite circuit between the terminals A and В. The author solution leads to the result 0,65 0,05 R . However, the problem occurs to calculate the general resistance under consideration with higher accuracy.