Transaction of Scientific Papers of the Novosibirsk State Technical University
Latest Publications


TOTAL DOCUMENTS

221
(FIVE YEARS 72)

H-INDEX

2
(FIVE YEARS 1)

Published By Novosibirsk State Technical University

2307-6879

Author(s):  
Aleksander Ulyashin ◽  
◽  
Aleksander Velichko ◽  

This paper is devoted to the comparative analysis of modern integral variables. Today, a number of foreign companies, such as Texas Instruments and Analog Devices, produce analog signal multipliers (APS) in integrated design. Russian industry produces chips of the 525PS and 174HA series. Each manufacturer uses its own method of implementing the device. The main task of such devices is to calculate the current voltage, phase, exponential and transcendental functions. Wide applicability of APS in integrated design was found in devices for analog processing and conversion of signals of communication and radio equipment, in devices for automatic control of onboard and ground radio equipment. A very important characteristic of such equipment is the dynamic range. The dynamic range of the receiver is the range of input signal amplitudes that provide the required quality of reproduction of the received message. The lower limit of the dynamic range is determined by the level of internal noise or external interference in the device, and the upper limit is determined by the device's overload capacity. In this regard, manufacturers of multipliers are faced with the task of maximizing the voltage that can be applied to its inputs. The difficulty is that the upper limit of the dynamic range is set by non-linear distortions. The non-linearity of the multiplier is a component of the multiplication error and characterizes the limiting capabilities of the APS inputs. In this paper, a comparative analysis of the main types of integral multipliers offered on the market is carried out in order to identify the best construction method for achieving the value of the dynamic range of the multiplier in 90 dB with high multiplication accuracy, which will allow using such a multiplier in modern radio equipment.


Author(s):  
Alexsander Voevoda ◽  
◽  
Dmitry Romannikov ◽  

The application of neural networks for the synthesis of control systems is considered. Examples of synthesis of control systems using methods of reinforcement learning, in which the state vector is involved, are given. And the synthesis of a neural controller for objects with an inaccessible state vector is discussed: 1) a variant using a neural network with recurrent feedbacks; 2) a variant using the input error vector, where each error (except for the first one) enters the input of the neural network passing through the delay element. The disadvantages of the first method include the fact that for such a structure of a neural network it is not possible to apply existing learning methods with confirmation and for training it is required to use a data set obtained, for example, from a previously calculated linear controller. The structure of the neural network used in the second option allows the application of reinforcement learning methods, but the article provides a statement and its proof that for the synthesis of a control system for objects with three or more integrators, a neural network without recurrent connections cannot be used. The application of the above structures is given on examples of the synthesis of control systems for objects 1/s2 and 1/s3 presented in a discrete form.


Author(s):  
Vadim Dronov ◽  
◽  
Galina Dronova ◽  
Victor Belov ◽  
Lev Grishchenko ◽  
...  

According to the Russian standards in the field of information security management (IS), which are authentic international standards, such as [1, 2], the organization must regularly conduct an internal audit of the information security management system. An audit is an independent review and evaluation of an organization's activities by analyzing and evaluating processes, projects, reports, and products. Audit, as an activity, is not static, unchanging, it evolves. From the point of view of leading international audit companies, in particular [3, 4], the current stage of audit evolution is the transition from reactivity (identifying shortcomings after the fact) to proactivity (predicting the results of actions or events before their completion). The validity of the statement for the Russian Internal Audit is confirmed by the results of the IX National Scientific and Practical Conference [5]. The movement towards proactivity in the audit determines the relevance of the following tasks: 1) processing up to 100 % of the information generated by the activity that is the focus of the audit; 2) processing information in a close-to-online mode; 3) the availability of powerful tools for data analysis and modeling on their basis the further development of the investigated events, as well as the appropriate skills of working with it from the auditors. When conducting audits, the auditors have a dilemma – on the one hand, they are obliged to provide the owners/shareholders/management of the organization with data as close as possible to the reliable state of the information security management processes, information about the identified shortcomings and recommendations for their elimination, on the other hand: the audit time is strictly limited; unloading the initial data from the organization's information systems takes considerable time; the data obtained from various information systems and other sources have different, not always standard formats; the tools used have disadvantages, since the most frequently used spreadsheets (MSExcel, LOCalc), due to internal limitations, are no longer able to provide the required functionality. The above-mentioned factors, as well as other factors, such as unwillingness to cooperate, hidden opposition of the personnel of the audited organization, evaluation of the work of auditors only by quantitative indicators (the number of observations or the time spent on one observation), lead to the fact that the checks are carried out superficially. At the same time, shortcomings in the information security management processes can be detected, but it becomes difficult to explain their nature and give effective recommendations to the business auditor. As a result, the goal of independent audits defined in GOST ISO/IEC 27002-2012 – “ensuring confidence in the continued efficiency, adequacy and effectiveness of the organization's approach to information security management” [2] – cannot be achieved. One of the options for eliminating some of the above-mentioned shortcomings is the use of programs developed by the auditors themselves and designed for operational data processing, the so-called “small automation”, during audits. This approach, although it is a low-level link in the chain of automation of audit procedures and, nevertheless, is within the framework of the audit development paradigm in the direction of robotization of procedures and the use of artificial intelligence, which is discussed, for example, in the works [3, 6, 7], and also confirmed by the results of conferences of the Institute of Internal Auditors [8].


Author(s):  
Vitaly Grachev ◽  
◽  
Leonid Myshlyaev ◽  
Mikhail Venger ◽  
Marina Purgina ◽  
...  

The article examines the creation of automated industrial systems with the use of Industry 4.0. Describes the main stages of development of the concept of "Industry", technology of the present stage of Industry 4.0 technologies and the use of "digital twins" BIM 3D modeling of buildings and structures. The areas of application of these technologies, as well as their advantages and disadvantages, are presented. An example of designing the elements of the automated process control system of the processing plant "Mine No. 12" (Kiselevsk, Kemerovo region) using Industry 4.0 technologies is given.


Author(s):  
Aleksandr Kashtanov ◽  
◽  
Mikhail Pazhetnov ◽  
Evgeny Koptev ◽  
◽  
...  

In the process of creating modern production, it is necessary to reduce the marriage associated with the human factor to zero, by reducing the number of operations carried out by people, leveling the mistakes that a person can make. So one of the solutions to this problem is the creation of robotic systems in which all operations are performed without any operator intervention. To control the execution of operations by a robotic system, in some cases, it is possible to use various sensors and sensors, but sometimes it turns out to be too expensive and difficult, therefore, the authors demonstrated the implementation of control over automation implemented using computer vision systems. Also, in the work, an analogy is drawn between computer vision and physical sensors, using the example of solving the problem that the authors faced.


Author(s):  
Aleksander Ulyashin ◽  
◽  
Aleksander Velichko ◽  

This paper is devoted to the comparative analysis of modern integrated analog-to-digital converters (ADCs). At the moment, a number of foreign companies, such as Analog Devices, Texas Instruments and Microchip, produce ADCs in integrated design. Each manufacturer uses its own method of implementing the device. The main task of such devices is to convert voltage to binary code. ADCs are used wherever it is necessary to receive an analog signal and process it in digital form. Examples include applications such as communications and telecommunications, various radio systems, and measurement technology. Very important characteristics of such equipment are dynamic range, ease of implementation and speed. The means of analog-to-digital conversion are constantly being improved, which leads to an increase in the speed of the converters and the frequency band of the converted signals, an increase in the dynamic range, sensitivity and accuracy of the ADC. Significant interest in high-speed ADCs with a large dynamic range is explained by the fact that in the vast majority of telecommunications and radio engineering systems, direct signal conversion schemes without intermediate frequency conversion are increasingly used. Broadband applications have also been developed. The main requirement in these applications is the high sensitivity and wide dynamic range of the transducer for simultaneous detection of strong and weak signals. In this paper, a comparative analysis of the main types of analog-to-digital converters offered on the market is carried out in order to identify the most optimal construction method for using it in modern equipment.


Author(s):  
Aleksander Voevoda ◽  
◽  
Victor Shipagin ◽  

Polynomial methods for synthesizing controllers for automatic control systems with linear objects are becoming increasingly common. The synthesis of multichannel controllers is particularly difficult, which is caused by the need to use matrix polynomial calculus. However, this approach mainly considers objects with the number of inputs equal to the number of outputs. This is due to the convenience of solving a system of linear algebraic equations in matrix polynomial calculus. In this paper, we consider a polynomial method for synthesizing regulators for a non-square object, that is, one whose number of inputs is not equal to the number of outputs. The selected system contains not only a non-square object, but also a non-square controller.


Author(s):  
Maria Sivak ◽  

The paper is devoted to analyzing the ability of using robust functions for building neural networks. The research highlights different robust functions in terms of applying them for obtaining a robust modification of the back-propagation algorithm. The algorithm requires that the used loss function should be infinitely or continuously differentiable. The analysis of twelve different functions has been done. The derivate of Charbonnier function has been obtained by the author. The results of analysis shows which functions can be used for the further investigation and which ones should be excluded from it.


Author(s):  
Eugene Romanov ◽  
◽  
Tatiana Romanenko ◽  

The topic of the article relates to the introduction of such forms of education as visualizers of algorithms into the distance education system of Novosibirsk State Technical University.


Author(s):  
Aleksander Ulyashin ◽  
◽  
Aleksander Velichko ◽  

Recently, the market for scanning rangefinders, in other words, LIDARS, has begun to develop rapidly due to the new course for unmanned vehicles and the need for high-precision positioning of objects in construction, geodesy, military Affairs, navigation, etc. The leading manufacturers of such scanning devices are currently Velodyne, Ouster and Luminar. Each company has its own unique approach to creating LIDAR, which has both pros and cons. LIDAR itself is a scanning device designed to receive and process information about remote objects using active optical systems that use the phenomena of light absorption and scattering in optically transparent media. In other words, a LIDAR is a device that uses a laser emitter to detect an object, after which the beam from the object is reflected and hits the photodetector, which, in turn, generates a signal and transmits it to the time interval meter. The output is a two-or three-dimensional image of the scanned object in the form of dots, depending on the type of LIDAR. The more of them, the clearer the picture we have, their number directly depends on the number of lasers and the processing speed of the system. This work is devoted to a comparative analysis of methods for constructing LIDAR systems. The analysis is carried out in order to identify the most accurate method of measuring the distance to an object under various conditions, and a new self-oscillating principle of distance measurement is proposed, which allows you to bring the measurement accuracy to a new level.


Sign in / Sign up

Export Citation Format

Share Document