по
Electronics and Machinery
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Peer-review process > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial Board > Council of Editors
Journals in science databases
About the Journal
MAIN PAGE > Back to contents
Publications of Iureva Radda Alekseevna
Software systems and computational methods, 2022-1
Maltseva N.K., Popova V.O., Syrov A.A. - The search for baseline events for assessing the safety of nuclear refueling operations at nuclear power plants pp. 1-8

DOI:
10.7256/2454-0714.2022.1.19323

Abstract: The relevance of the topic of the safety of nuclear refueling operations is associated with the specificity of exploitation of RBMK units. One of the most hazardous, from the perspective of accidents at modern nuclear power plants, is the process of nuclear fuel reloading. The operations on rearrangement of fuel cartridges entail the risk of fuel damage, and thus, the likelihood of the release of radioactive substances exceeding the permissible limits. The process of reloading RBMK, if the reactor is at full capacity, consists of the vast number of complex operations characterized by a range parameters. Non-observance of the criteria for carrying out operations, or if the parameter values exceed permissible limits, with high probability leads to an accident. This article explores the possibility of application of formalized approach towards determination of the baseline events that may cause accidents for the purpose of the development of essential protection instruments. The formal approach would allow detecting the excessiveness in protection instruments on the existing blocks, as well as revealing the accident situations that cannot be prevented using these protection instruments. The author formulated systemic approach towards comprehensive assessment of the accident rate of structurally complex systems. Adaptation of this method relative to REM allows systematizing the search for baseline vents that entail uncontrolled situations, as well as optimizing the protection instruments that would ultimately enhance reliability of the system, simplify the exploitation process, and reduce the time of operating cycle of the controller for processing of the protection.
Cybernetics and programming, 2018-4
Iureva R.A., Vedernikov K.A., Timko A.S., Perezyabov O.A. - Modern wireless technologies: problems of application for modernization of systems for the in-line diagnostics of gas pipelines pp. 68-73

DOI:
10.25136/2644-5522.2018.4.27242

Abstract: Currently, the main method of monitoring of operating gas pipelines laid by the ground, has become in-line diagnostics, carried out by scanning their inner surface. The use of automated cyber-physical systems of non-destructive testing of gas pipelines will increase the level of man-made safety. The article discusses the types of wireless technologies, analyzes the effectiveness of using WFi technology to modernize the process of non-destructive testing of the pipeline in real time. A hypothesis is put forward on the operation of the pipeline as a waveguide for wireless data transmission. To solve this problem, the methods of data transfer theory, graph theory, analytical and simulation modeling are used. The scientific novelty consists in choosing and justifying the choice of using the method of transmitting data from non-destructive testing results over a wireless link in real time based on the analysis of transmitted data and existing technologies, as well as upgrading the design of the cyber-physical system for in-line diagnostics of the gas pipeline laid underground.
Cybernetics and programming, 2017-5
Iureva R.A., Timko A.S., Vedernikov K.A., Maltseva N.K. - On the Question about Wireless Data Transfer Technology in Telediagnostic System Line Construction pp. 46-53

DOI:
10.25136/2644-5522.2017.5.24057

Abstract: The authors of the present article examine current and developing technologies of wireless data transmission used to construct telediagnostic system lines based on the example of a cyberphysical production system of Diakont. The authors describe advantages and disadvantages and evaluates efficiency of technology implementation. The rationale of the research is caused by the fact that the authors provide an analysis of prospects and challenges of implementing wireless lines which will allow to increase the speed of data transmission and diagnostic procedure remoteness from the feed end at the account of reducing the weight of a connecting cord. The analysis methods used by the authors include: theoretical analysis of current findings in the sphere of wireless connections used in cyberphysical telediagnostic systems, in particular, those that are used to control the state of pipelines. Modification of the robot for wireless data transmission is based on fixing bridges and antennas on an explosion-proof delivery system and pipe face (feed end). Modification of the eplosion-proof delivery system implies adjustment of the installation, circuit design and software. The authors emphasize the need to develop a new type of a signal conditioner lid with high-frequency connectors as well as a new antenna lid on the drivers block. Theoretically speaking, there are technologies allowing to convert to wireless data transmission inside an installation in order to perform the pipeline inspection. The main question today still remains the one about electromagnetic compatibility and noise immunity. For this purpose it is necessary to purchase equipment that would satisfy each standard in particular and to arrange tests for electromagnetic compatibility, carrying capacity, action radius, etc. 
Cybernetics and programming, 2016-6
Iureva R.A., Vedernikov K.A., Andreev Y.S. - Engineering and Technological Solutions in the Process of Developing Robotlike Inspection Systems for Controlling Conduit Pipes pp. 56-63

DOI:
10.7256/2306-4196.2016.6.20982

Abstract: Intratubal diagnostics is part of a set of non-destructive control methods allowing to define internal defects of conduit pipes by the means of technical diagnosis. The main goals of intratubal diagnostics are to define defects in the conduit pipe metal, welded joints, conduit pipe geometry, types of defects, their location and position inside a conduit pipe. To achieve these tasks, a cyber physical system certain requirements set for is usually developed. The present article is devoted to a group of companies 'Diakont', one of the world leaders in the sphere of high technological solutions of security arrangements and increasing efficiency in nuclear, petroleum and thermal power industries. The purpose of the present research is to analyze engineering and technological solutions used in the process of developing a robotlike complex for intratubal diagnostics at 'Diakont' company. The rationale of the research is caused by the growing demand for cyber physical systems related to explosion safety and low cost. Thus, creation of a cyber physical system for controlling conduit pipes is a challenging task. As a result of peculiarities of the environment where intratubal diagnostics are performed, there are strict explosion safety requirements for details and parts of the diagnostic suite. Moreover, the system must have a number of engineering specifics aimed at passing shaped objects, inclined and vertical parts of conduit pipes. The authors' contribution to the topic is their analysis of existing technological solutions made in the process of developing cyber physical systems for controlling conduit pipes.   
Software systems and computational methods, 2016-4
Iureva R.A., Komarov I.I., Maslennikov O.S. - Development of the method for detection and identification of hidden destructive impact on the multi-agent robotic systems

DOI:
10.7256/2454-0714.2016.4.21128

Abstract: Increased information security risks in multi-agent robotic systems create a need for new and known assessment in terms of security algorithms. Such risks include the loss or inaccessibility of data, spreading false information about the purpose of grouping and the use of distorted information, lack of energy resources. Authors note that common approaches to information security in multi-agent robotic systems so far are not formed. The research is aimed at developing a model of information security in multi-agent robotic systems taking into account the specifics of the technology. Existing scientific and methodical apparatus and technical solutions of ensuring information security in multi-agent systems are not applicable to the tasks of ensuring information security in multi-agent robotic systems due to the specific technology and a special type of threat models and the offending patterns associated with them. Existing methods of providing information security of multi-agent systems do not provide a comprehensive solution of the problems of information security in the multi-agent robotic systems, since they do not take into account the specificity of their composition and structure. Scientific novelty consists in the development of software models of information security risks in multi-agent robotic systems. An advantage of the method is the ability to detect new types of attacks without having to modify or update the model parameters, since the invasion of the offending system can be described as a deviation from the nominal behavior.
Software systems and computational methods, 2016-1
Iureva R.A., Komarov I.I., Dorodnikov N.A. - Designing the information interloper model for the multi-agent decentralized control robotic system

DOI:
10.7256/2454-0714.2016.1.17946

Abstract: The primary objective of the interloper is to keep a swarm of robots from performing their functions by any means including their destruction. The primary goal of the information security system is to provide the proper security level for the swarm of robots against any natural or artificial hindrances for it is necessary to take into account not only the information safety but also physical security of actors. For the physical security of a wide range of facilities (the authors offer to call them 'facilities under potential interloper's influence or FPIP) it is very important to prepare the list of potential threats, especially design threats. The list would allow to design a necessary system for the physical protection of a particular facility and to evaluate its efficiency. The composite element of the design threat is the interloper modeling and therefore development of such a model is a high priority. According to the guidline documents, the interloper model should be based on both the featurs of the facility and performed technological operations (stable factors) and variable factors, i.e. social conditions of the territory where the facility is located, social relations, psychological traits of a particular group of workers and/or individuals as well as the global, country's, regional environment, etc. Therefore, the model should take into account all kinds of factors that are related to various aspects of the reality and often divorced from one another. The authors of the present article analyze the offered interloper models from different points of view. Nevertheless, these models are interconnected, so examination of these connections is one of the goals of the vulnarability analysis. In case the obtained characteristics of the operational interloper model are below the desired characteristics of the design interloper model (for example, the number of interloper agents that can be potentially involved in the destructive activity is lower than the number of interlopers which activities are to be prevented by the designed Information Security System according to the design project prescribed for the facility, i.e. Z>У), then the decision about sufficient facility hardness can be made meaning there is no need to perform unscheduled actions (facility vulnarability analysis with ISS performance evaluation, improvement of ISS, changes in the task execution technology, etc.).
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.