Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002973
M. Kataev, Eugeny Kartashov, R. Karpov
At present, no one doubts that machine vision significantly increases the efficiency, quality and reliability of solving numerous problems, including the detection of various product defects. Machine vision acts as a replacement for the complex and time-consuming work of specialists who search for defects using visual inspection. However, for the application of machine vision methods, several conditions must be met, which are associated with lighting and a suitable photographic apparatus, in order to obtain high-quality images, as well as the method of their processing. Image processing and analysis are important elements of a quality control system and obtaining information about defects. This study provides a problem statement for assessing the quality of the surface of bricks and describes the proposed approach to image processing and analysis. The results of processing real images obtained at a brick factory are presented.
{"title":"Assessment of the Quality of Brick Products by the Method of Machine Vision","authors":"M. Kataev, Eugeny Kartashov, R. Karpov","doi":"10.1109/SIBCON56144.2022.10002973","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002973","url":null,"abstract":"At present, no one doubts that machine vision significantly increases the efficiency, quality and reliability of solving numerous problems, including the detection of various product defects. Machine vision acts as a replacement for the complex and time-consuming work of specialists who search for defects using visual inspection. However, for the application of machine vision methods, several conditions must be met, which are associated with lighting and a suitable photographic apparatus, in order to obtain high-quality images, as well as the method of their processing. Image processing and analysis are important elements of a quality control system and obtaining information about defects. This study provides a problem statement for assessing the quality of the surface of bricks and describes the proposed approach to image processing and analysis. The results of processing real images obtained at a brick factory are presented.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10003010
Nikita Yu. Burtsev, O. Kozhemyak
The article presents the results of simulation of pulse DC-DC step-down converter with different types of diodes. Simulations have shown that the use of a silicon carbide diode instead of convenient silicon diode gives the best performance. It also shown, the parasitic inductances in the circuit significantly increase the power losses when the diode is switched-off and reduce the losses when the transistor is switched-on.
{"title":"Simulation of the Step-Down DC-DC converter with Si-and SiC-diodes","authors":"Nikita Yu. Burtsev, O. Kozhemyak","doi":"10.1109/SIBCON56144.2022.10003010","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003010","url":null,"abstract":"The article presents the results of simulation of pulse DC-DC step-down converter with different types of diodes. Simulations have shown that the use of a silicon carbide diode instead of convenient silicon diode gives the best performance. It also shown, the parasitic inductances in the circuit significantly increase the power losses when the diode is switched-off and reduce the losses when the transistor is switched-on.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10003028
V. M. Artyushenko, V. I. Volovach
The simultaneous influence of multiplicative and additive noises on the steepness of the discriminative characteristic of a two-channel discriminator is analyzed. A coherent signal and a sequence of incoherent pulses are used as input signals. It is assumed that, at a relatively low level of noise, the tracking meter is considered as a linear system. Conditions are obtained when systematic measurement errors are absent. The expressions for determining the steepness of the discriminative characteristic affected by multiplicative noise depending on the additive noise level are obtained. It is shown that multiplicative noise has a greater influence on the steepness of the discriminative characteristic when the level of additive noise is higher. Coefficients determining the normalizing effect of the automatic gain control are obtained. It is shown that the type of the input signal does not change the physical nature of the influence of multiplicative and additive noises on the steepness of the discriminative characteristic.
{"title":"Determination of the Steepness of the Discriminatory Characteristic for the Meter of non-Energy Parameters of the Signal","authors":"V. M. Artyushenko, V. I. Volovach","doi":"10.1109/SIBCON56144.2022.10003028","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003028","url":null,"abstract":"The simultaneous influence of multiplicative and additive noises on the steepness of the discriminative characteristic of a two-channel discriminator is analyzed. A coherent signal and a sequence of incoherent pulses are used as input signals. It is assumed that, at a relatively low level of noise, the tracking meter is considered as a linear system. Conditions are obtained when systematic measurement errors are absent. The expressions for determining the steepness of the discriminative characteristic affected by multiplicative noise depending on the additive noise level are obtained. It is shown that multiplicative noise has a greater influence on the steepness of the discriminative characteristic when the level of additive noise is higher. Coefficients determining the normalizing effect of the automatic gain control are obtained. It is shown that the type of the input signal does not change the physical nature of the influence of multiplicative and additive noises on the steepness of the discriminative characteristic.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002980
E. Medvedeva, I. Trubin, Denis Kuzminykh
A method for embedding a visually imperceptible message into an object of a digital image for transmission through a noisy communication channel is proposed. The embedding method is based on inverting some of the pixels of the secret image according to a certain rule and adding them to the selected positions of the bit plane of the least significant bit according to the mask generated by the pseudo-random number generator (PRNG). The authors use a two-dimensional nonlinear filtering algorithm in order to ensure the integrity of the data transmitted over the communication channel at low signal-to-noise ratios. The article presents the results of experimental estimates of the invisibility of the embedded image and the integrity of the original and secret images after transmission over a noisy communication channel for signal-to-noise ratios up to -6dB.
提出了一种将视觉上难以察觉的信息嵌入到数字图像对象中并通过噪声通信信道传输的方法。该嵌入方法是根据伪随机数生成器(pseudo-random number generator, PRNG)生成的掩码,将秘密图像的部分像素按一定规则进行反置,并将其添加到最低有效位的位平面的选定位置上。为了保证在低信噪比下通信信道上传输的数据的完整性,作者使用了二维非线性滤波算法。本文介绍了在信噪比高达-6dB的噪声通信信道上传输后,对嵌入图像的不可见性和原始图像和秘密图像的完整性的实验估计结果。
{"title":"Steganographic Method of Embedding Data in Images for Transmission over a Noisy Communication Channel","authors":"E. Medvedeva, I. Trubin, Denis Kuzminykh","doi":"10.1109/SIBCON56144.2022.10002980","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002980","url":null,"abstract":"A method for embedding a visually imperceptible message into an object of a digital image for transmission through a noisy communication channel is proposed. The embedding method is based on inverting some of the pixels of the secret image according to a certain rule and adding them to the selected positions of the bit plane of the least significant bit according to the mask generated by the pseudo-random number generator (PRNG). The authors use a two-dimensional nonlinear filtering algorithm in order to ensure the integrity of the data transmitted over the communication channel at low signal-to-noise ratios. The article presents the results of experimental estimates of the invisibility of the embedded image and the integrity of the original and secret images after transmission over a noisy communication channel for signal-to-noise ratios up to -6dB.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"718 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002962
V. Kartak, Nail Bashmakov
This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.
{"title":"Method for Selecting Indicators of Data Compromise","authors":"V. Kartak, Nail Bashmakov","doi":"10.1109/SIBCON56144.2022.10002962","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002962","url":null,"abstract":"This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002960
Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich
The paper discusses the distribution of radio resources for a hybrid communication system adaptively using orthogonal (OMA) and non-orthogonal (NOMA) multiple access, which is the power domain NOMA (PD-NOMA) method. The problem of radio resource allocation in PD-NOMA systems remains topical because the additional degree of freedom (power domain) significantly increases the number of possible approaches, and it is required to find the optimal approach among them. We offer our own approach to radio resource planning and compare it with the existing. Moreover, we use the Monte Carlo simulation to compare the OMA and the hybrid OMA/NOMA systems. The comparison criterion is the amount of transmitted traffic. For the hybrid system, there is a proprietary table of paired signal-code constructions proposed to jointly assign modulation and coding schemes (MCS) to NOMA users and carry out multiplexing in the power domain.
{"title":"Scheduling PD-NOMA with Round-Robin, Equal-Rate and Proportional-Fair Strategies","authors":"Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich","doi":"10.1109/SIBCON56144.2022.10002960","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002960","url":null,"abstract":"The paper discusses the distribution of radio resources for a hybrid communication system adaptively using orthogonal (OMA) and non-orthogonal (NOMA) multiple access, which is the power domain NOMA (PD-NOMA) method. The problem of radio resource allocation in PD-NOMA systems remains topical because the additional degree of freedom (power domain) significantly increases the number of possible approaches, and it is required to find the optimal approach among them. We offer our own approach to radio resource planning and compare it with the existing. Moreover, we use the Monte Carlo simulation to compare the OMA and the hybrid OMA/NOMA systems. The comparison criterion is the amount of transmitted traffic. For the hybrid system, there is a proprietary table of paired signal-code constructions proposed to jointly assign modulation and coding schemes (MCS) to NOMA users and carry out multiplexing in the power domain.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002988
Y. Chursin, Ruslan A. Nurmukhametov
The article describes an optical method for obtaining the geometric parameters of an object, based on the analysis of the boundaries of the object’s shadow in a divergent light flux. One of the main tasks that arises when using this method is filtering a noisy signal in real time with a high frequency. The article discusses and compares two photo signal filtering methods using FPGAs.
{"title":"Selection and Research of Methods Increasing Optical Boundaries Determining Accuracy of Objects Suitable for Further FPGA Implementation","authors":"Y. Chursin, Ruslan A. Nurmukhametov","doi":"10.1109/SIBCON56144.2022.10002988","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002988","url":null,"abstract":"The article describes an optical method for obtaining the geometric parameters of an object, based on the analysis of the boundaries of the object’s shadow in a divergent light flux. One of the main tasks that arises when using this method is filtering a noisy signal in real time with a high frequency. The article discusses and compares two photo signal filtering methods using FPGAs.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10003002
I. Lvovich, Y. Lvovich, A. Preobrazhenskiy, Y. Preobrazhenskiy, T. Avetisyan
The paper deals with the problem of assessing the characteristics of electromagnetic wave scattering on electrodynamic objects with a complex shape. A combined approach, which is based on the use of statistical methods, methods of fuzzy estimation, and expert analysis, is proposed. A numerical estimate was determined for the index characterizing the level of scattered electromagnetic fields. Linguistic values of the indicators based on expert evaluations were compared. Numerical evaluations of the characteristics of the electrodynamic objects surveyed were given. Based on the formed information base, the frequency of occurrence of different responses was calculated for the analyzed groups, which included objects with over reflections (which was considered as the main group, and objects without over reflections (which was considered as the control group). The values of the electromagnetic wave scattering angle limits under the analyzed scattering conditions were demonstrated.
{"title":"Modeling of Complex Electrodynamic Objects Based on a Combined Approach","authors":"I. Lvovich, Y. Lvovich, A. Preobrazhenskiy, Y. Preobrazhenskiy, T. Avetisyan","doi":"10.1109/SIBCON56144.2022.10003002","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003002","url":null,"abstract":"The paper deals with the problem of assessing the characteristics of electromagnetic wave scattering on electrodynamic objects with a complex shape. A combined approach, which is based on the use of statistical methods, methods of fuzzy estimation, and expert analysis, is proposed. A numerical estimate was determined for the index characterizing the level of scattered electromagnetic fields. Linguistic values of the indicators based on expert evaluations were compared. Numerical evaluations of the characteristics of the electrodynamic objects surveyed were given. Based on the formed information base, the frequency of occurrence of different responses was calculated for the analyzed groups, which included objects with over reflections (which was considered as the main group, and objects without over reflections (which was considered as the control group). The values of the electromagnetic wave scattering angle limits under the analyzed scattering conditions were demonstrated.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10002952
Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel
Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities
{"title":"Computer Attacks Simulation in IIoT Systems","authors":"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel","doi":"10.1109/SIBCON56144.2022.10002952","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002952","url":null,"abstract":"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.1109/SIBCON56144.2022.10003006
D. Lyapunov, S. Lyapushkin, A. Yudintsev
This paper delves into the problem of designing a buck converter, serving as the key element for testing sets, also known as load simulators. These simulators impose varying electric load onto power supplies that may be employed in harsh environments and under temperatures below 00C. This provides ground testing for such supplies over a wide range of electric loads as well as creating the proper voltage waveform on the supply terminals. For this purpose, we implement a subordinate control system containing an internal inductor current loop and main output voltage feedback of the buck converter topology. Within the present research frameworks, a methodology of the control system designing, have been outlined. The resulting voltage and current waveforms confirm the correctness of the presented methodology and applicability of the buck converter with subordinate control system as a functional component of load simulators.
{"title":"Subordinate Control System of Buck Converter","authors":"D. Lyapunov, S. Lyapushkin, A. Yudintsev","doi":"10.1109/SIBCON56144.2022.10003006","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003006","url":null,"abstract":"This paper delves into the problem of designing a buck converter, serving as the key element for testing sets, also known as load simulators. These simulators impose varying electric load onto power supplies that may be employed in harsh environments and under temperatures below 00C. This provides ground testing for such supplies over a wide range of electric loads as well as creating the proper voltage waveform on the supply terminals. For this purpose, we implement a subordinate control system containing an internal inductor current loop and main output voltage feedback of the buck converter topology. Within the present research frameworks, a methodology of the control system designing, have been outlined. The resulting voltage and current waveforms confirm the correctness of the presented methodology and applicability of the buck converter with subordinate control system as a functional component of load simulators.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}