Proceedings of Tomsk State University of Control Systems and Radioelectronics
Latest Publications


TOTAL DOCUMENTS

452
(FIVE YEARS 140)

H-INDEX

2
(FIVE YEARS 1)

Published By Tomsk State University Of Control Systems And Radioelectronics (Tusur)

1818-0442

Author(s):  
M. V. Vladimirov ◽  

This article presents an analysis of the possibilities of using Blockchain technology within the framework of programs for the digitalization of the economy and the development of the educational sector. Three main areas of blockchain use are highlighted: cryptocurrencies, tracking the uniqueness of items, and smart contracts. A classification of blockchainbased systems is also proposed, dividing systems by volume. The modern methods of using this technology for the implementation of various tasks at the level of particular companies, countries and the world are considered, and a promising solution is proposed in accordance with modern trends and directions of development. The problems related to the implementation of blockchain systems are also suggeste


Author(s):  
G. Lan ◽  
◽  
A. S. Fadeev ◽  
A. N. Morgunov ◽  
◽  
...  

This article details the development of methods for the synthesis of phonemes of the human voice based on the analytical description of individual formants. A technique for analyzing the spectrum and spectrograms of original phonemes to obtain the main amplitude-frequency characteristics of the signal components is presented. An algorithm to reconstruct a speech signal based on the obtained sets of parameters is proposed. A technique to assess the quality of synthesized speech elements is described


Author(s):  
A. I. Shaposhnikov ◽  

The article gives the description of the feature vector, which is suitable for the MeanShift procedure, uses all the color information of the RGB24 format and has a dimension exceeding only 1.5 times the dimension of the smallest 512-dimensional vector used for the Kernel Based Object Tracking procedure. For the described feature vector, a function of similarity of two elliptical areas of the frame is built. For the similarity function, formulas are found for the gradient vector - the mean shift vector, which indicates the direction of the growth of similarity in four-dimensional space of all elliptical regions covering the object in the frame. Knowing the greatest value of the similarity function of two elliptical regions, the length of the displacement vector in the four dimensional space of all elliptical regions was found. To this vector the previous point in space must be moved at the current moment, i.e. the values of the coordinates of the center and the dimensions of the ellipse, in order to obtain the best similarity of the current elliptical area from the previous one. Finally, so as to implement Kernel Based Object Tracking, an algorithm of successive iterations (Newton's method) has been developed, which allows finding the parameters of the ellipse that really has the best similarity. The experiments were carried out and their results were presented and discussed


Author(s):  
A. O. Igumnov ◽  

The features of some systems for transport monitoring and control are considered. A technique to build a unified platform is proposed. The functional modules of general purpose that could be used to build the platform are given. The interface of intermodular interaction is described, which ensures the compliance with principles of building distributed systems


Author(s):  
A. S. Asochakov ◽  
◽  
A. A. Druzhinin ◽  
I. M. Zhuravlyov ◽  
A. A. Lopatin ◽  
...  

The operation of multichannel shunt solar array converter with discrete zone voltage regulation was investigated. The «relay» and «ring» switch algorithms for shunt voltage converter of solar array energy are considered. The prototype of multichannel shunt voltage converter has been developed, and the analytical waveforms by dynamic work mode of shunt voltage converter have been obtained


Author(s):  
E. A. Yandashevskaya ◽  

This article presents a way to implement the subsystem for steganalysis of digital images circulating in the information system. This subsystem expands the functionality of existing intrusion detection / prevention systems in terms of detecting covert channels used in computer attacks. In the presented solution, a parametric model of a convolutional neural network is proposed and implemented to detect a payload in digital images, performed by a number of steg-nesting algorithms recognized in real attacks. A software implementation of a modular generator of a training sample (dataset) that supports these algorithms has been developed. An experimental assessment of the accuracy has been carried out


Author(s):  
A. V. Osipov ◽  
◽  
V. M. Rulevskiy ◽  

The paper considers the features of frequency-pulse-width control in a resonant LCL converter with an active rectifier in the mode of parametric stabilization of the output current. The analysis of the properties of the LCL converter during regulation by the rectifier is carried out, the phase frequency characteristic and the coefficient of parametric stabilization are obtained. It is shown that the rectifier introduces a reactive component into the impedance of the resonant circuit. It is illustrated that the introduction of the control angle leads to the loss of roots by the equation on a part of the load range. The estimation of the frequency adjustment in the converter is carried out, the control characteristic is obtained, the energy advantages of frequency-pulse-width control are demonstrated, which consists in the zero phase of the inverter current and minimization of the recuperation interval


Author(s):  
V. A. Kucher ◽  
◽  
M. M. Putyato ◽  
A. S. Makaryan ◽  
M. A. Karmanov ◽  
...  

The article presents the security analysis of locally stored enduser data, as well as the specifics of working with them in the application called “Signal” based on Android OS. The investigated version 5.3.12 was the most recent one up to the time of writing this article. According to a certain scenario, test user data was generated in the application, and then the sources information with critical data was extracted from this data. Using the open-source code available, the mechanisms of the application's operation, including the implementation of protection measures, wit the specified critical data were identified and analyzed. A qualitative assessment of implementing protection mechanisms for locally stored critical data was made to distinguish the data with typical protection measures inherent for any mobile applications, and the one specific for applications of this particular class of messengers. As a result, the flaws were discovered related to the inaccessibility of certain protective mechanisms on specific versions of the Android operating system, which could compromise the user data. As an advantage of the messenger protection, the database encryption module could be specified, which provides strong protection against unauthorized access to information due to the lack of a specific version of the assembly for personal computers. This article also proposes an approach to decrypt messenger databases, which requires either an emulator of an Android-based device, or a real mobile device with a specially developed application


Author(s):  
M. Yu. Kataev ◽  
◽  
N. G. Kataeva ◽  
R. A. Chernov ◽  
◽  
...  

Movement is an integral part of a human activity. Maintaining human’s health or doing sports, for example, requires an accurate assessment of a person's physical activity, and especially the way the person moves (gait). The natural age-related changes or diseases cause a disfunction of the musculoskeletal system, and limits human movement. Traditionally, the medical diagnostics consists in examination of a person in a static position or with a minimum level of movement. This article proposes a solution to the problem of assessing the parameters of a person's walking using several accelerometers fixed on the human body. This solution allows obtaining correct data on a human limb movement in time and space. The authors believe that this approach can be used to diagnose the state of the human musculoskeletal system


Author(s):  
V. V. Nguyen ◽  
◽  
A. A. Shilin ◽  
V. G. Bukreev ◽  
F. V. Perevoshchikov ◽  
...  

In the article a method to carry out a synthesis of regulators of the drying plant control system is considered based on the integration of known statistical data by the Lagrange polynomial. An algorithm to correct the parameters of regulators in problematic modes of operation of the drying plant is proposed. It is shown that the control system developed and implemented on the PLC provides stable control of temperature and humidity during the drying of materials


Sign in / Sign up

Export Citation Format

Share Document