32 research outputs found
Regeneration and utilisation rotary systems of waste technological liquids
The article shows prospects of using regeneration and utilisation rotary systems of waste technological liquids in enclosed local water systems
ΠΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ² Π±ΠΈΠΎΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΊΠΈ Π΄Π»Ρ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ ΠΌΡΡΠΈΡΡΡΡΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ
Π€ΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π» Π»ΡΠ±ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½ Π² Π²ΠΈΠ΄Π΅ ΡΠΎΠ²ΠΎΠΊΡΠΏΠ½ΠΎΡΡΠΈ ΠΊΠΎΠΌΠ°Π½Π΄, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ²ΠΎΠ΄ΡΡ ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ ΡΠΎΡΡΠΎΡΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΡ. ΠΠ°Π΄Π°ΡΠ° ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π°ΡΠ°ΠΊΠΈ Π΄Π»Ρ ΡΠΈΠ³Π½Π°ΡΡΡΠ½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π²ΡΠΎΡΠΆΠ΅Π½ΠΈΠΉ ΡΠΊΠ²ΠΈΠ²Π°Π»Π΅Π½ΡΠ½Π° ΡΠΎΠΏΠΎΡΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΊΠΎΠΌΠ°Π½Π΄, Π²ΡΠΏΠΎΠ»Π½ΡΠ΅ΠΌΡΡ
Π·Π°ΡΠΈΡΠ°Π΅ΠΌΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΠΎΠΉ, Ρ ΠΈΠ·Π²Π΅ΡΡΠ½ΡΠΌΠΈ ΡΠΈΠ³Π½Π°ΡΡΡΠ°ΠΌΠΈ Π°ΡΠ°ΠΊ. Π Π°Π·Π»ΠΈΡΠ½ΡΠ΅ ΠΌΡΡΠ°ΡΠΈΠΈ Π² Π²Π΅ΠΊΡΠΎΡΠ°Ρ
Π°ΡΠ°ΠΊ (Π²ΠΊΠ»ΡΡΠ°Ρ Π·Π°ΠΌΠ΅Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ Π½Π° ΡΠ°Π²Π½ΠΎΡΠΈΠ»ΡΠ½ΡΠ΅, ΠΏΠ΅ΡΠ΅ΡΡΠ°Π½ΠΎΠ²ΠΊΡ ΠΊΠΎΠΌΠ°Π½Π΄ ΠΈ ΠΈΡ
Π±Π»ΠΎΠΊΠΎΠ², Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΈΠ΅ ΠΌΡΡΠΎΡΠ½ΡΡ
ΠΈ ΠΏΡΡΡΡΡ
ΠΊΠΎΠΌΠ°Π½Π΄) ΡΠ½ΠΈΠΆΠ°ΡΡ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΈ ΡΠΎΡΠ½ΠΎΡΡΡ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π²ΡΠΎΡΠΆΠ΅Π½ΠΈΠΉ. Π ΡΡΠ°ΡΡΠ΅ ΠΏΡΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Ρ ΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΠ΅ ΡΠ΅ΡΠ΅Π½ΠΈΡ Π² ΠΎΠ±Π»Π°ΡΡΠΈ Π±ΠΈΠΎΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΊΠΈ, ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Π° ΠΈΡ
ΠΏΡΠΈΠΌΠ΅Π½ΠΈΠΌΠΎΡΡΡ Π΄Π»Ρ ΠΈΠ΄Π΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΠΌΡΡΠΈΡΡΡΡΠΈΡ
Π°ΡΠ°ΠΊ. ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ Π½ΠΎΠ²ΡΠΉ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ ΠΊ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π°ΡΠ°ΠΊ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΡΡΡΡΠΈΠΊΡΠ½ΡΡ
Π΄Π΅ΡΠ΅Π²ΡΠ΅Π², ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΠΎΠΉ ΠΏΡΠΈ ΡΠ±ΠΎΡΠΊΠ΅ ΠΈ ΠΏΡΠΎΠ²Π΅ΡΠΊΠ΅ ΡΡ
ΠΎΠΆΠ΅ΡΡΠΈ Π³Π΅Π½ΠΎΠΌΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ. ΠΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ² Π±ΠΈΠΎΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΊΠΈ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ Π΄ΠΎΠ±ΠΈΡΡΡΡ Π²ΡΡΠΎΠΊΠΎΠΉ ΡΠΎΡΠ½ΠΎΡΡΠΈ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ ΠΌΡΡΠΈΡΡΡΡΠΈΡ
Π°ΡΠ°ΠΊ Π½Π° ΡΡΠΎΠ²Π½Π΅ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π²ΡΠΎΡΠΆΠ΅Π½ΠΈΠΉ (Π±ΠΎΠ»Π΅Π΅ 90%), ΠΏΡΠΈ ΡΡΠΎΠΌ ΠΏΡΠ΅Π²ΠΎΡΡ
ΠΎΠ΄Ρ ΠΈΡ
ΠΏΠΎ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ½ΠΎΡΡΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΏΠ°ΠΌΡΡΠΈ, Π±ΡΡΡΡΠΎΠ΄Π΅ΠΉΡΡΠ²ΠΈΡ ΠΈ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΠΈ ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡΠΌ Π²Π΅ΠΊΡΠΎΡΠΎΠ² Π°ΡΠ°ΠΊ. ΠΠ»Ρ ΡΠ»ΡΡΡΠ΅Π½ΠΈΡ ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»Π΅ΠΉ ΡΠΎΡΠ½ΠΎΡΡΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ ΡΡΠ΄ ΠΌΠΎΠ΄ΠΈΡΠΈΠΊΠ°ΡΠΈΠΉ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠ°Π½Π½ΠΎΠ³ΠΎ ΡΠ΅ΡΠ΅Π½ΠΈΡ, Π²ΡΠ»Π΅Π΄ΡΡΠ²ΠΈΠ΅ ΠΊΠΎΡΠΎΡΡΡ
ΡΠΎΡΠ½ΠΎΡΡΡ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π°ΡΠ°ΠΊ ΡΠ²Π΅Π»ΠΈΡΠ΅Π½Π° Π΄ΠΎ 95% ΠΏΡΠΈ ΡΡΠΎΠ²Π½Π΅ ΠΌΡΡΠ°ΡΠΈΠΉ Π² ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ Π΄ΠΎ 10%. ΠΠ΅ΡΠΎΠ΄ ΠΌΠΎΠΆΠ΅Ρ ΠΏΡΠΈΠΌΠ΅Π½ΡΡΡΡΡ Π΄Π»Ρ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ Π²ΡΠΎΡΠΆΠ΅Π½ΠΈΠΉ ΠΊΠ°ΠΊ Π² ΠΊΠ»Π°ΡΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΡΡ
ΡΠ΅ΡΡΡ
, ΡΠ°ΠΊ ΠΈ Π² ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΡ
ΡΠ΅ΠΊΠΎΠ½ΡΠΈΠ³ΡΡΠΈΡΡΠ΅ΠΌΡΡ
ΡΠ΅ΡΠ΅Π²ΡΡ
ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ°Ρ
Ρ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½Π½ΡΠΌΠΈ ΡΠ΅ΡΡΡΡΠ°ΠΌΠΈ (ΠΠ½ΡΠ΅ΡΠ½Π΅Ρ Π²Π΅ΡΠ΅ΠΉ, ΡΠ΅ΡΠΈ ΠΊΠΈΠ±Π΅ΡΡΠΈΠ·ΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ², ΡΠ΅Π½ΡΠΎΡΠ½ΡΠ΅ ΡΠ΅ΡΠΈ)
Cold-Field Switching in PVDF-TrFE Ferroelectric Polymer Nanomesas
Polarization reversal in ferroelectric nanomesas of polyvinylidene fluoride with trifluoroethylene has been probed by ultrahigh vacuum piezoresponse force microscopy in a wide temperature range from 89 to 326 K. In dramatic contrast to the macroscopic data, the piezoresponse force microscopy local switching was nonthermally activated and, at the same time, occurring at electric fields significantly lower than the intrinsic switching threshold. A "cold-field'' defect-mediated extrinsic switching is shown to be an adequate scenario describing this peculiar switching behavior. The extrinsic character of the observed polarization reversal suggests that there is no fundamental bar for lowering the coercive field in ferroelectric polymer nanostructures, which is of importance for their applications in functional electronics
Chemically induced JahnβTeller ordering on manganite surfaces
Physical and electrochemical phenomena at the surfaces of transition metal oxides and their coupling to local functionality remains one of the enigmas of condensed matter physics. Understanding the emergent physical phenomena at surfaces requires the capability to probe the local composition, map order parameter fields and establish their coupling to electronic properties. Here we demonstrate that measuring the sub-30-pm displacements of atoms from high-symmetry positions in the atomically resolved scanning tunnelling microscopy allows the physical order parameter fields to be visualized in real space on the single-atom level. Here, this local crystallographic analysis is applied to the in-situ-grown manganite surfaces. In particular, using direct bond-angle mapping we report direct observation of structural domains on manganite surfaces, and trace their origin to surface-chemistryinduced stabilization of ordered JahnβTeller displacements. Density functional calculations provide insight into the intriguing interplay between the various degrees of freedom now resolved on the atomic level
The Development of Villains in B. Stokerβs "Dracula", A.C. Doyleβs βThe Final Problemβ and J. K. Rowlingβs "Harry Potter" saga.
This Master's Thesis explores the phenomena of villains and their development in English literature in the period from 1893 to 2016, based on the examples of Dracula from B. Stoker's Dracula, Moriarty from A. C. Doyle's "The Final Problemβ, and Voldemort from J.K. Rowling's Harry Potter series. The analysis investigates the development of these villains and brings up the greater questions about evil and the essence of human nature. In order to do so, these villains are correlated to the philosophical, theological, and social ideas by Hobbes, Rousseau, Machiavelli, Augustine of Hippo, and Locke. This work is divided into six sections. First comes the introduction, then three sections for closer analysis of each villain where the philosophical ideas are used to suggest the possible interpretation of these characters. A close reading of the original texts is used to provide information about the villains, their characteristics, and specifics. A comparative discussion of the villains ensues from the philosophy-oriented character analysis. The conclusion finalizes the character analysis, comparisons, and philosophical consideration. The argumentation declares that even though these villains represent different forms of evil, they at the same time, remain undoubtfully evil at their core. Their evil nature is the same, the representation of it is what differs them
βEto prosto bukvy na bumageβ¦β Vladimir Sorokin: Posle literatury (βItβs just letters on paperβ¦β Vladimir Sorokin: After the Literature)
This volume is devoted to the leading contemporary Russian writer Vladimir Sorokin (b. 1955). The articles included in the collection are focused both on general principles of his poetics and individual works: texts written in the late Soviet underground, his post-Soviet bestsellers, plays, screenplays and films. Sorokin is seen here not only as a writer, but also as a media figure who created his own personal myth. The book consists of the most important works written about Sorokin for several decades, throughout his literary career, as well as new articles and Sorokinβs selected interviews
Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms
The problems of applying neural network methods for solving problems of preventing cyberthreats to flexible self-organizing network infrastructures of digital economy platforms: vehicle adhoc networks, wireless sensor networks, industrial IoT, βsmart buildingsβ and βsmart citiesβ are considered. The applicability of the classic perceptron neural network, recurrent, deep, LSTM neural networks and neural networks ensembles in the restricting conditions of fast training and big data processing are estimated. The use of neural networks with a complex architectureβ recurrent and LSTM neural networks β is experimentally justified for building a system of intrusion detection for self-organizing network infrastructures
IoT Security Mechanisms in the Example of BLE
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency
IoT Security Mechanisms in the Example of BLE
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency
The Effect of a Single Dose of Citrulline on the Physical Performance of Soccer-Specific Exercise in Adult Elite Soccer Players (A Pilot Randomized Double-Blind Trial)
Purpose: The purpose of this study was to evaluate the effect of a single intake of citrulline at 3 g and 6 g doses in adult elite soccer players performing sport-specific exercise. Materials and Methods: This randomized double-blind placebo-controlled study analyzed 18 soccer players from the top divisions of three European countries. Participants were randomized into three groups of six each and performed a field-based soccer-specific test for 18 min. Comparative analysis of heart rate, fatigue and post-exercise recovery was conducted. Results: There were no statistically significant differences in most of the analyzed parameters, nor at any of the time points for lactate concentration. Players’ RPE exercise test score did not reveal any differences. Conclusions: Neither a single intake of 3 g nor of 6 g of citrulline malate affected physical performance, subjective feelings of fatigue or post-exercise recovery in adult elite soccer players who performed a soccer-specific test