Персона: Шевченко, Надежда Алексеевна
Email Address
Birth Date
Научные группы
Организационные подразделения
Статус
Фамилия
Имя
Имя
Результаты поиска
The Control Algorithm of Compressor Equipment of Automobile Gas-Filling Compressor Stations with Fuzzy Logic Elements
2022, Evstifeev, A. A., Zaeva, M. A., Shevchenko, N. A., Евстифеев, Андрей Александрович, Заева, Маргарита Анатольевна, Шевченко, Надежда Алексеевна
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.The need for motor fuel has a pronounced unevenness. At the same time, the unevenness of fuel consumption negatively affects the energy and economic efficiency of the production activities of automobile gas-filling compressor stations. The paper proposes algorithms for controlling compressor equipment that reduce this negative effect. The application of the theory of fuzzy sets and the fuzzy inference algorithm for estimating the parameters and the residual resource of gas equipment in the presence of fuzzy values in the equations allows us to obtain numerical values of the uncertainty of the estimated parameters. The use of varying the test results of equipment (nominal reference objects) allows you to make informed decisions when operating a vehicle if an expert has results for a limited number of tests with a set of models built on their basis.
Wi-Fi network analysis with a large number of access points
2019, Baranova, E. A., Zareshin, S. V., Shevchenko, N. A., Шевченко, Надежда Алексеевна
© 2019 IEEE For today, each of us uses wirelesscommunication capabilities. We often use Wi-Fi access points because we need an access to the Internet. This article discusses the security of Wi-Fi wireless networks. The article describes the method of a possible intruder's attack on one or several wireless networks. This study illustrates the possible scheme of the attacker's actions and the situation of the attack on wireless clients. This method is using the generation of a large number of Wi-Fi access points. The article also includes an analyzing of networks status during an attack and the behavior of wireless clients connected to access points with different configurations.