Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-457-462
A. Kumarin, I. Kudryavtsev
Software-defined-radio (SDR) becomes an attractive technique for the development of GNSS receivers due to universal hardware and high flexibility. However, the performance of signal processing can be a challenging task. Real-time mode implementation requires fast floating point calculations in several threads, not available for most part of embedded systems. This paper describes the system-on-chip based device drastically increasing computational performance. A summary of computational complexity of each stage of GNSS receiver is provided and several particular solutions are proposed.
{"title":"SoC opportunities for boosting SDR GNSS performance","authors":"A. Kumarin, I. Kudryavtsev","doi":"10.18287/1613-0073-2019-2416-457-462","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-457-462","url":null,"abstract":"Software-defined-radio (SDR) becomes an attractive technique for the development of GNSS receivers due to universal hardware and high flexibility. However, the performance of signal processing can be a challenging task. Real-time mode implementation requires fast floating point calculations in several threads, not available for most part of embedded systems. This paper describes the system-on-chip based device drastically increasing computational performance. A summary of computational complexity of each stage of GNSS receiver is provided and several particular solutions are proposed.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73357104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-510-520
M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin
A large amount of data is generated during the operation of oil fields. Such data can be both data already interpreted by a specialist, or "raw” data obtained directly from the devices, both structured and not structured, or locally structured (that is, allowing for local analysis, but in such form not allowing analyzing in conjunction with other types of data). To obtain from such a set of more informative data that will allow making decisions in the course of field operation, it is necessary to involve specialists from different areas of the oil industry. Therefore, it is possible and necessary to use non-deterministic methods for analyzing the data obtained. The article discusses the use of machine learning methods in the task of determining the initial water-cut based on well logging data.
{"title":"Forecast of water-cut at wells under design by machine learning methods","authors":"M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin","doi":"10.18287/1613-0073-2019-2416-510-520","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-510-520","url":null,"abstract":"A large amount of data is generated during the operation of oil fields. Such data can be both data already interpreted by a specialist, or \"raw” data obtained directly from the devices, both structured and not structured, or locally structured (that is, allowing for local analysis, but in such form not allowing analyzing in conjunction with other types of data). To obtain from such a set of more informative data that will allow making decisions in the course of field operation, it is necessary to involve specialists from different areas of the oil industry. Therefore, it is possible and necessary to use non-deterministic methods for analyzing the data obtained. The article discusses the use of machine learning methods in the task of determining the initial water-cut based on well logging data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78671682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2391-54-59
V. Dementyev, D. Kondratyev
One of the important tasks facing the regional authorities is to monitor the condition of roads and power lines. In the Ulyanovsk region more than 8 thousand km of power lines and more than 9 thousand km of roads (including rural). A significant part of these facilities is located outside the settlements in places with medium and low availability. In many such places there is a problem of uncontrolled forest overgrowth. This work is devoted to solving the problem of automated satellite monitoring of such areas. For this purpose, it is proposed to use a modified convolutional neural network that processes time sequences of multispectral satellite images and allows to allocate territories occupied by forest and undergrowth with high accuracy. This approach allows us to assess the dynamics of overgrowth of the territory and perform the appropriate forecast with sufficient accuracy for practice.
{"title":"Applying doubly stochastic filters to evaluate the dynamics of object sizes on satellite image sequences","authors":"V. Dementyev, D. Kondratyev","doi":"10.18287/1613-0073-2019-2391-54-59","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-54-59","url":null,"abstract":"One of the important tasks facing the regional authorities is to monitor the condition of roads and power lines. In the Ulyanovsk region more than 8 thousand km of power lines and more than 9 thousand km of roads (including rural). A significant part of these facilities is located outside the settlements in places with medium and low availability. In many such places there is a problem of uncontrolled forest overgrowth. This work is devoted to solving the problem of automated satellite monitoring of such areas. For this purpose, it is proposed to use a modified convolutional neural network that processes time sequences of multispectral satellite images and allows to allocate territories occupied by forest and undergrowth with high accuracy. This approach allows us to assess the dynamics of overgrowth of the territory and perform the appropriate forecast with sufficient accuracy for practice.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78551433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2391-41-47
V. Krasheninnikov, A. Subbotin
The paper deals with the development of mathematical models of random fields to describe and simulate images. In the wave model, a random field is the result of the influence of perturbations (waves) that occur at random times in random places and have random shapes. This model allows representing and simulate isotropic and anisotropic images (and their temporal sequences) defined on arbitrary areas of multidimensional space, as well as on any surfaces. The problems of correlation analysis and synthesis can be relatively easily solved. However, this model allows representing only homogeneous fields. In this paper, we consider «double stochastic» wave models, when the first wave random field (control field) sets the parameters of the second (controlled field). As a result, the controlled field becomes nonuniform, since its parameters vary randomly. We also consider options when two fields mutually influence each other. These models allow us to represent and simulate multidimensional inhomogeneous images (and their temporal sequences), as well as systems of such images with mutual correlations.
{"title":"Double stochastic wave models of multidimensional random fields","authors":"V. Krasheninnikov, A. Subbotin","doi":"10.18287/1613-0073-2019-2391-41-47","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-41-47","url":null,"abstract":"The paper deals with the development of mathematical models of random fields to describe and simulate images. In the wave model, a random field is the result of the influence of perturbations (waves) that occur at random times in random places and have random shapes. This model allows representing and simulate isotropic and anisotropic images (and their temporal sequences) defined on arbitrary areas of multidimensional space, as well as on any surfaces. The problems of correlation analysis and synthesis can be relatively easily solved. However, this model allows representing only homogeneous fields. In this paper, we consider «double stochastic» wave models, when the first wave random field (control field) sets the parameters of the second (controlled field). As a result, the controlled field becomes nonuniform, since its parameters vary randomly. We also consider options when two fields mutually influence each other. These models allow us to represent and simulate multidimensional inhomogeneous images (and their temporal sequences), as well as systems of such images with mutual correlations.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82102451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-521-526
A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh
The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.
{"title":"Determining the proximity of groups in social networks based on text analysis using big data","authors":"A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh","doi":"10.18287/1613-0073-2019-2416-521-526","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-521-526","url":null,"abstract":"The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82339525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-308-313
A. Borisov, E. Myasnikov
In this paper, we discuss various options for implementing the ”Kuznyechik” block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor.
{"title":"The implementation of ”Kuznyechik” encryption algorithm using NVIDIA CUDA technology","authors":"A. Borisov, E. Myasnikov","doi":"10.18287/1613-0073-2019-2416-308-313","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-308-313","url":null,"abstract":"In this paper, we discuss various options for implementing the ”Kuznyechik” block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-10-18
A. Timofeeva, Y. Mezentsev
The potential of correlation-based feature selection has been explored in selecting an optimal subset from a set of highly correlated predictors. This problem occurs, for example, in time series forecasting of economic indicators using regression models on multiple lags of a large number of candidate leading indicators. Greedy algorithms (forward selection and backward elimination) in such cases fail. To obtain the globally optimal solution, the feature selection problem is formulated as a mixed integer programming problem. To solve it, we use the binary cut-and-branch method. The results of simulation studies demonstrate the advantage of using the binary cut-and-branch method in comparison with heuristic search algorithms. The real example of the selection of leading indicators of consumer price index growth shows the acceptability of using the correlation-based feature selection method.
{"title":"Forecasting using predictor selection from a large set of highly correlated variables","authors":"A. Timofeeva, Y. Mezentsev","doi":"10.18287/1613-0073-2019-2416-10-18","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-10-18","url":null,"abstract":"The potential of correlation-based feature selection has been explored in selecting an optimal subset from a set of highly correlated predictors. This problem occurs, for example, in time series forecasting of economic indicators using regression models on multiple lags of a large number of candidate leading indicators. Greedy algorithms (forward selection and backward elimination) in such cases fail. To obtain the globally optimal solution, the feature selection problem is formulated as a mixed integer programming problem. To solve it, we use the binary cut-and-branch method. The results of simulation studies demonstrate the advantage of using the binary cut-and-branch method in comparison with heuristic search algorithms. The real example of the selection of leading indicators of consumer price index growth shows the acceptability of using the correlation-based feature selection method.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90634253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2391-318-325
A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov
According to the Federal State Statistics Service for 2017, over 25,000 injuries at work were registered in Russia, of which 1,138 were fatal. Studies have shown that most of the injuries in the workplace due to non-compliance with technical safety rules, namely the lack of personal protective equipment or their improper use. To improve the efficiency of monitoring compliance with the rules of technical safety at industrial facilities, this paper discusses the use of vision systems for automatic control of the availability of personal protective equipment at workers in the area of industrial work.
{"title":"Application of vision systems to improve the effectiveness of monitoring compliance with technical safety requirements at industrial facilities","authors":"A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov","doi":"10.18287/1613-0073-2019-2391-318-325","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-318-325","url":null,"abstract":"According to the Federal State Statistics Service for 2017, over 25,000 injuries at work were registered in Russia, of which 1,138 were fatal. Studies have shown that most of the injuries in the workplace due to non-compliance with technical safety rules, namely the lack of personal protective equipment or their improper use. To improve the efficiency of monitoring compliance with the rules of technical safety at industrial facilities, this paper discusses the use of vision systems for automatic control of the availability of personal protective equipment at workers in the area of industrial work.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-553-565
M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov
The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.
{"title":"Intrusion detection system on the basis of data mining algorithms in the industrial network","authors":"M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov","doi":"10.18287/1613-0073-2019-2416-553-565","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-553-565","url":null,"abstract":"The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90149794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.18287/1613-0073-2019-2416-165-172
E. Sharapova, R. Sharapov
Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.
{"title":"Detection of spam using email signatures","authors":"E. Sharapova, R. Sharapov","doi":"10.18287/1613-0073-2019-2416-165-172","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-165-172","url":null,"abstract":"Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88378566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}