32 research outputs found

    Regeneration and utilisation rotary systems of waste technological liquids

    Get PDF
    The article shows prospects of using regeneration and utilisation rotary systems of waste technological liquids in enclosed local water systems

    ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² Π±ΠΈΠΎΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠΊΠΈ для обнаруТСния ΠΌΡƒΡ‚ΠΈΡ€ΡƒΡŽΡ‰ΠΈΡ… ΠΊΠΈΠ±Π΅Ρ€Π°Ρ‚Π°ΠΊ

    Get PDF
    Π€ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½Π°Π» любой систСмы ΠΌΠΎΠΆΠ΅Ρ‚ Π±Ρ‹Ρ‚ΡŒ прСдставлСн Π² Π²ΠΈΠ΄Π΅ совокупности ΠΊΠΎΠΌΠ°Π½Π΄, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ приводят ΠΊ измСнСнию состояния систСмы. Π—Π°Π΄Π°Ρ‡Π° обнаруТСния Π°Ρ‚Π°ΠΊΠΈ для сигнатурных систСм обнаруТСния Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ эквивалСнтна ΡΠΎΠΏΠΎΡΡ‚Π°Π²Π»Π΅Π½ΠΈΡŽ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚Π΅ΠΉ ΠΊΠΎΠΌΠ°Π½Π΄, выполняСмых Π·Π°Ρ‰ΠΈΡ‰Π°Π΅ΠΌΠΎΠΉ систСмой, с извСстными сигнатурами Π°Ρ‚Π°ΠΊ. Π Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ ΠΌΡƒΡ‚Π°Ρ†ΠΈΠΈ Π² Π²Π΅ΠΊΡ‚ΠΎΡ€Π°Ρ… Π°Ρ‚Π°ΠΊ (Π²ΠΊΠ»ΡŽΡ‡Π°Ρ Π·Π°ΠΌΠ΅Π½Ρƒ ΠΊΠΎΠΌΠ°Π½Π΄ Π½Π° Ρ€Π°Π²Π½ΠΎΡΠΈΠ»ΡŒΠ½Ρ‹Π΅, пСрСстановку ΠΊΠΎΠΌΠ°Π½Π΄ ΠΈ ΠΈΡ… Π±Π»ΠΎΠΊΠΎΠ², Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΈΠ΅ мусорных ΠΈ пустых ΠΊΠΎΠΌΠ°Π½Π΄) ΡΠ½ΠΈΠΆΠ°ΡŽΡ‚ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΈ Ρ‚ΠΎΡ‡Π½ΠΎΡΡ‚ΡŒ обнаруТСния Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ. Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ ΠΏΡ€ΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠ΅ Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ Π² области Π±ΠΈΠΎΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠΊΠΈ, рассмотрСна ΠΈΡ… ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΠΌΠΎΡΡ‚ΡŒ для ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΌΡƒΡ‚ΠΈΡ€ΡƒΡŽΡ‰ΠΈΡ… Π°Ρ‚Π°ΠΊ. ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ Π½ΠΎΠ²Ρ‹ΠΉ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΊ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΡŽ Π°Ρ‚Π°ΠΊ Π½Π° основС Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ суффиксных Π΄Π΅Ρ€Π΅Π²ΡŒΠ΅Π², ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠΎΠΉ ΠΏΡ€ΠΈ сборкС ΠΈ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠ΅ схоТСсти Π³Π΅Π½ΠΎΠΌΠ½Ρ‹Ρ… ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚Π΅ΠΉ. ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² Π±ΠΈΠΎΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΈΠΊΠΈ позволяСт Π΄ΠΎΠ±ΠΈΡ‚ΡŒΡΡ высокой точности обнаруТСния ΠΌΡƒΡ‚ΠΈΡ€ΡƒΡŽΡ‰ΠΈΡ… Π°Ρ‚Π°ΠΊ Π½Π° ΡƒΡ€ΠΎΠ²Π½Π΅ соврСмСнных систСм обнаруТСния Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ (Π±ΠΎΠ»Π΅Π΅ 90%), ΠΏΡ€ΠΈ этом прСвосходя ΠΈΡ… ΠΏΠΎ экономичности использования памяти, Π±Ρ‹ΡΡ‚Ρ€ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ ΠΈ устойчивости ΠΊ измСнСниям Π²Π΅ΠΊΡ‚ΠΎΡ€ΠΎΠ² Π°Ρ‚Π°ΠΊ. Для ΡƒΠ»ΡƒΡ‡ΡˆΠ΅Π½ΠΈΡ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»Π΅ΠΉ точности ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½ ряд ΠΌΠΎΠ΄ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΉ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Π½Π½ΠΎΠ³ΠΎ Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ, вслСдствиС ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… Ρ‚ΠΎΡ‡Π½ΠΎΡΡ‚ΡŒ обнаруТСния Π°Ρ‚Π°ΠΊ ΡƒΠ²Π΅Π»ΠΈΡ‡Π΅Π½Π° Π΄ΠΎ 95% ΠΏΡ€ΠΈ ΡƒΡ€ΠΎΠ²Π½Π΅ ΠΌΡƒΡ‚Π°Ρ†ΠΈΠΉ Π² ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ Π΄ΠΎ 10%. ΠœΠ΅Ρ‚ΠΎΠ΄ ΠΌΠΎΠΆΠ΅Ρ‚ ΠΏΡ€ΠΈΠΌΠ΅Π½ΡΡ‚ΡŒΡΡ для обнаруТСния Π²Ρ‚ΠΎΡ€ΠΆΠ΅Π½ΠΈΠΉ ΠΊΠ°ΠΊ Π² классичСских ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹Ρ… сСтях, Ρ‚Π°ΠΊ ΠΈ Π² соврСмСнных Ρ€Π΅ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€ΠΈΡ€ΡƒΠ΅ΠΌΡ‹Ρ… сСтСвых инфраструктурах с ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½Π½Ρ‹ΠΌΠΈ рСсурсами (Π˜Π½Ρ‚Π΅Ρ€Π½Π΅Ρ‚ Π²Π΅Ρ‰Π΅ΠΉ, сСти кибСрфизичСских ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ², сСнсорныС сСти)

    Cold-Field Switching in PVDF-TrFE Ferroelectric Polymer Nanomesas

    Get PDF
    Polarization reversal in ferroelectric nanomesas of polyvinylidene fluoride with trifluoroethylene has been probed by ultrahigh vacuum piezoresponse force microscopy in a wide temperature range from 89 to 326 K. In dramatic contrast to the macroscopic data, the piezoresponse force microscopy local switching was nonthermally activated and, at the same time, occurring at electric fields significantly lower than the intrinsic switching threshold. A "cold-field'' defect-mediated extrinsic switching is shown to be an adequate scenario describing this peculiar switching behavior. The extrinsic character of the observed polarization reversal suggests that there is no fundamental bar for lowering the coercive field in ferroelectric polymer nanostructures, which is of importance for their applications in functional electronics

    Chemically induced Jahn–Teller ordering on manganite surfaces

    Get PDF
    Physical and electrochemical phenomena at the surfaces of transition metal oxides and their coupling to local functionality remains one of the enigmas of condensed matter physics. Understanding the emergent physical phenomena at surfaces requires the capability to probe the local composition, map order parameter fields and establish their coupling to electronic properties. Here we demonstrate that measuring the sub-30-pm displacements of atoms from high-symmetry positions in the atomically resolved scanning tunnelling microscopy allows the physical order parameter fields to be visualized in real space on the single-atom level. Here, this local crystallographic analysis is applied to the in-situ-grown manganite surfaces. In particular, using direct bond-angle mapping we report direct observation of structural domains on manganite surfaces, and trace their origin to surface-chemistryinduced stabilization of ordered Jahn–Teller displacements. Density functional calculations provide insight into the intriguing interplay between the various degrees of freedom now resolved on the atomic level

    The Development of Villains in B. Stoker’s "Dracula", A.C. Doyle’s β€œThe Final Problem” and J. K. Rowling’s "Harry Potter" saga.

    No full text
    This Master's Thesis explores the phenomena of villains and their development in English literature in the period from 1893 to 2016, based on the examples of Dracula from B. Stoker's Dracula, Moriarty from A. C. Doyle's "The Final Problem”, and Voldemort from J.K. Rowling's Harry Potter series. The analysis investigates the development of these villains and brings up the greater questions about evil and the essence of human nature. In order to do so, these villains are correlated to the philosophical, theological, and social ideas by Hobbes, Rousseau, Machiavelli, Augustine of Hippo, and Locke. This work is divided into six sections. First comes the introduction, then three sections for closer analysis of each villain where the philosophical ideas are used to suggest the possible interpretation of these characters. A close reading of the original texts is used to provide information about the villains, their characteristics, and specifics. A comparative discussion of the villains ensues from the philosophy-oriented character analysis. The conclusion finalizes the character analysis, comparisons, and philosophical consideration. The argumentation declares that even though these villains represent different forms of evil, they at the same time, remain undoubtfully evil at their core. Their evil nature is the same, the representation of it is what differs them

    β€œEto prosto bukvy na bumage…” Vladimir Sorokin: Posle literatury (β€œIt’s just letters on paper…” Vladimir Sorokin: After the Literature)

    No full text
    This volume is devoted to the leading contemporary Russian writer Vladimir Sorokin (b. 1955). The articles included in the collection are focused both on general principles of his poetics and individual works: texts written in the late Soviet underground, his post-Soviet bestsellers, plays, screenplays and films. Sorokin is seen here not only as a writer, but also as a media figure who created his own personal myth. The book consists of the most important works written about Sorokin for several decades, throughout his literary career, as well as new articles and Sorokin’s selected interviews

    Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms

    No full text
    The problems of applying neural network methods for solving problems of preventing cyberthreats to flexible self-organizing network infrastructures of digital economy platforms: vehicle adhoc networks, wireless sensor networks, industrial IoT, β€œsmart buildings” and β€œsmart cities” are considered. The applicability of the classic perceptron neural network, recurrent, deep, LSTM neural networks and neural networks ensembles in the restricting conditions of fast training and big data processing are estimated. The use of neural networks with a complex architecture– recurrent and LSTM neural networks – is experimentally justified for building a system of intrusion detection for self-organizing network infrastructures

    IoT Security Mechanisms in the Example of BLE

    No full text
    In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency

    IoT Security Mechanisms in the Example of BLE

    No full text
    In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency

    The Effect of a Single Dose of Citrulline on the Physical Performance of Soccer-Specific Exercise in Adult Elite Soccer Players (A Pilot Randomized Double-Blind Trial)

    No full text
    Purpose: The purpose of this study was to evaluate the effect of a single intake of citrulline at 3 g and 6 g doses in adult elite soccer players performing sport-specific exercise. Materials and Methods: This randomized double-blind placebo-controlled study analyzed 18 soccer players from the top divisions of three European countries. Participants were randomized into three groups of six each and performed a field-based soccer-specific test for 18 min. Comparative analysis of heart rate, fatigue and post-exercise recovery was conducted. Results: There were no statistically significant differences in most of the analyzed parameters, nor at any of the time points for lactate concentration. Players’ RPE exercise test score did not reveal any differences. Conclusions: Neither a single intake of 3 g nor of 6 g of citrulline malate affected physical performance, subjective feelings of fatigue or post-exercise recovery in adult elite soccer players who performed a soccer-specific test
    corecore