Maltseva N.K., Popova V.O., Syrov A.A. —
The search for baseline events for assessing the safety of nuclear refueling operations at nuclear power plants
// Software systems and computational methods. – 2022. – ¹ 1.
– P. 1 - 8.
DOI: 10.7256/2454-0714.2022.1.19323
URL: https://en.e-notabene.ru/itmag/article_19323.html
Read the article
Abstract: The relevance of the topic of the safety of nuclear refueling operations is associated with the specificity of exploitation of RBMK units. One of the most hazardous, from the perspective of accidents at modern nuclear power plants, is the process of nuclear fuel reloading. The operations on rearrangement of fuel cartridges entail the risk of fuel damage, and thus, the likelihood of the release of radioactive substances exceeding the permissible limits. The process of reloading RBMK, if the reactor is at full capacity, consists of the vast number of complex operations characterized by a range parameters. Non-observance of the criteria for carrying out operations, or if the parameter values exceed permissible limits, with high probability leads to an accident. This article explores the possibility of application of formalized approach towards determination of the baseline events that may cause accidents for the purpose of the development of essential protection instruments. The formal approach would allow detecting the excessiveness in protection instruments on the existing blocks, as well as revealing the accident situations that cannot be prevented using these protection instruments. The author formulated systemic approach towards comprehensive assessment of the accident rate of structurally complex systems. Adaptation of this method relative to REM allows systematizing the search for baseline vents that entail uncontrolled situations, as well as optimizing the protection instruments that would ultimately enhance reliability of the system, simplify the exploitation process, and reduce the time of operating cycle of the controller for processing of the protection.
Iureva R.A., Vedernikov K.A., Timko A.S., Perezyabov O.A. —
Modern wireless technologies: problems of application for modernization of systems for the in-line diagnostics of gas pipelines
// Cybernetics and programming. – 2018. – ¹ 4.
– P. 68 - 73.
DOI: 10.25136/2644-5522.2018.4.27242
URL: https://en.e-notabene.ru/kp/article_27242.html
Read the article
Abstract: Currently, the main method of monitoring of operating gas pipelines laid by the ground, has become in-line diagnostics, carried out by scanning their inner surface. The use of automated cyber-physical systems of non-destructive testing of gas pipelines will increase the level of man-made safety. The article discusses the types of wireless technologies, analyzes the effectiveness of using WFi technology to modernize the process of non-destructive testing of the pipeline in real time. A hypothesis is put forward on the operation of the pipeline as a waveguide for wireless data transmission. To solve this problem, the methods of data transfer theory, graph theory, analytical and simulation modeling are used. The scientific novelty consists in choosing and justifying the choice of using the method of transmitting data from non-destructive testing results over a wireless link in real time based on the analysis of transmitted data and existing technologies, as well as upgrading the design of the cyber-physical system for in-line diagnostics of the gas pipeline laid underground.
Iureva R.A., Timko A.S., Vedernikov K.A., Maltseva N.K. —
On the Question about Wireless Data Transfer Technology in Telediagnostic System Line Construction
// Cybernetics and programming. – 2017. – ¹ 5.
– P. 46 - 53.
DOI: 10.25136/2644-5522.2017.5.24057
URL: https://en.e-notabene.ru/kp/article_24057.html
Read the article
Abstract: The authors of the present article examine current and developing technologies of wireless data transmission used to construct telediagnostic system lines based on the example of a cyberphysical production system of Diakont. The authors describe advantages and disadvantages and evaluates efficiency of technology implementation. The rationale of the research is caused by the fact that the authors provide an analysis of prospects and challenges of implementing wireless lines which will allow to increase the speed of data transmission and diagnostic procedure remoteness from the feed end at the account of reducing the weight of a connecting cord. The analysis methods used by the authors include: theoretical analysis of current findings in the sphere of wireless connections used in cyberphysical telediagnostic systems, in particular, those that are used to control the state of pipelines. Modification of the robot for wireless data transmission is based on fixing bridges and antennas on an explosion-proof delivery system and pipe face (feed end). Modification of the eplosion-proof delivery system implies adjustment of the installation, circuit design and software. The authors emphasize the need to develop a new type of a signal conditioner lid with high-frequency connectors as well as a new antenna lid on the drivers block. Theoretically speaking, there are technologies allowing to convert to wireless data transmission inside an installation in order to perform the pipeline inspection. The main question today still remains the one about electromagnetic compatibility and noise immunity. For this purpose it is necessary to purchase equipment that would satisfy each standard in particular and to arrange tests for electromagnetic compatibility, carrying capacity, action radius, etc.
Iureva R.A., Kotel'nikov Y.P., Maltseva N.K., Vedernikov K.A. —
Study of electric drive used for moving a riding cutoff valve in a turbogenerator control system
// Electronics and Machinery. – 2017. – ¹ 3.
– P. 7 - 13.
DOI: 10.7256/2453-8884.2017.3.21960
URL: https://en.e-notabene.ru/elektronika/article_21960.html
Read the article
Abstract: Proper functioning of a turbogenerator set depends on continuous functioning of the system of regulation and protection of valves of a steam turbine. Proper functioning of a turbogenerator set is important in the case of accident threat caused by the increase of turbine rotation speed over a particular value within the operational range with insensitivity maximum 0,5% of an average operational rotation frequency. The protection of a steam turbogenerator set is guaranteed by cut-out, control and back-flow valves. By a signal of a sensor element of protection, a turbogenerator can be stopped by closing cut-out valves of a high-pressure and an intermediate pressure cylinders or their control valves and a grid valve, or simultaneous closing of the above mentioned cut-out and control units. Such a system operates on the basis of an automated system used for support of the key regulated parameters of a turbogenerator in electric load and heat load modes. The authors of the article study electro-mechanical drive used for moving a riding cutoff valve in a turbogenerator control system. The authors describe the requirements to it. Based on dynamic characteristics of the electro-mechanical drive produced by the joint company “Diakont”, the authors construct a model of a control system, which guarantees the emergency shut-down mode operation. The protection control system structure guarantees the independence of its operation from the condition of a turbogenerator control system.
Iureva R.A., Komarov I.I., Maslennikov O.S. —
Development of the method for detection and identification of hidden destructive impact on the multi-agent robotic systems
// Software systems and computational methods. – 2016. – ¹ 4.
– P. 375 - 382.
DOI: 10.7256/2454-0714.2016.4.21128
Read the article
Abstract: Increased information security risks in multi-agent robotic systems create a need for new and known assessment in terms of security algorithms. Such risks include the loss or inaccessibility of data, spreading false information about the purpose of grouping and the use of distorted information, lack of energy resources. Authors note that common approaches to information security in multi-agent robotic systems so far are not formed. The research is aimed at developing a model of information security in multi-agent robotic systems taking into account the specifics of the technology. Existing scientific and methodical apparatus and technical solutions of ensuring information security in multi-agent systems are not applicable to the tasks of ensuring information security in multi-agent robotic systems due to the specific technology and a special type of threat models and the offending patterns associated with them. Existing methods of providing information security of multi-agent systems do not provide a comprehensive solution of the problems of information security in the multi-agent robotic systems, since they do not take into account the specificity of their composition and structure. Scientific novelty consists in the development of software models of information security risks in multi-agent robotic systems. An advantage of the method is the ability to detect new types of attacks without having to modify or update the model parameters, since the invasion of the offending system can be described as a deviation from the nominal behavior.
Iureva R.A., Komarov I.I., Dorodnikov N.A. —
Designing the information interloper model for the multi-agent decentralized control robotic system
// Software systems and computational methods. – 2016. – ¹ 1.
– P. 42 - 48.
DOI: 10.7256/2454-0714.2016.1.17946
Read the article
Abstract: The primary objective of the interloper is to keep a swarm of robots from performing their functions by any means including their destruction. The primary goal of the information security system is to provide the proper security level for the swarm of robots against any natural or artificial hindrances for it is necessary to take into account not only the information safety but also physical security of actors. For the physical security of a wide range of facilities (the authors offer to call them 'facilities under potential interloper's influence or FPIP) it is very important to prepare the list of potential threats, especially design threats. The list would allow to design a necessary system for the physical protection of a particular facility and to evaluate its efficiency. The composite element of the design threat is the interloper modeling and therefore development of such a model is a high priority. According to the guidline documents, the interloper model should be based on both the featurs of the facility and performed technological operations (stable factors) and variable factors, i.e. social conditions of the territory where the facility is located, social relations, psychological traits of a particular group of workers and/or individuals as well as the global, country's, regional environment, etc. Therefore, the model should take into account all kinds of factors that are related to various aspects of the reality and often divorced from one another. The authors of the present article analyze the offered interloper models from different points of view. Nevertheless, these models are interconnected, so examination of these connections is one of the goals of the vulnarability analysis. In case the obtained characteristics of the operational interloper model are below the desired characteristics of the design interloper model (for example, the number of interloper agents that can be potentially involved in the destructive activity is lower than the number of interlopers which activities are to be prevented by the designed Information Security System according to the design project prescribed for the facility, i.e. Z>Ó), then the decision about sufficient facility hardness can be made meaning there is no need to perform unscheduled actions (facility vulnarability analysis with ISS performance evaluation, improvement of ISS, changes in the task execution technology, etc.).