{"title":"Low-Temperature JFET OpAmp Based On a Folded-Cascode with High Static Regime Symmetry of Transistors That Determine the Systematic Constituent of the Offset-Voltage","authors":"V. Chumakov, A. Bugakova, A. Titov","doi":"10.1109/SIBCON56144.2022.10002991","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002991","url":null,"abstract":"The original architecture of operational amplifiers (OpAmps) implemented on complementary JFETs or depletion-mode complementary MOS is considered. The feature of the proposed OpAmps is differential input stage and folded-cascode special designs, which have a high symmetry of the FETs static regime from terms of gate-to-drain voltages. Computer-based simulations of the OpAmp in the LTspice-XVII was conducted between -197 and 27 degrees Celsius. The proposed circuit solutions reduce the systematic constituent of the offset-voltage (up to 10 $mu mathrm{V}$) and increase voltage gain (up to 87 dB) of the open-loop OpAmp. The explored OpAmps are recommended by the authors of the article for analogue, including low-noise, and analogue-to-digital devices, for example, active filters, comparators, actuators, and others, which are used in systems of communication and management, such as at cryogenic temperatures, and/or under radiation conditions.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128139405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich
{"title":"Scheduling PD-NOMA with Round-Robin, Equal-Rate and Proportional-Fair Strategies","authors":"Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich","doi":"10.1109/SIBCON56144.2022.10002960","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002960","url":null,"abstract":"The paper discusses the distribution of radio resources for a hybrid communication system adaptively using orthogonal (OMA) and non-orthogonal (NOMA) multiple access, which is the power domain NOMA (PD-NOMA) method. The problem of radio resource allocation in PD-NOMA systems remains topical because the additional degree of freedom (power domain) significantly increases the number of possible approaches, and it is required to find the optimal approach among them. We offer our own approach to radio resource planning and compare it with the existing. Moreover, we use the Monte Carlo simulation to compare the OMA and the hybrid OMA/NOMA systems. The comparison criterion is the amount of transmitted traffic. For the hybrid system, there is a proprietary table of paired signal-code constructions proposed to jointly assign modulation and coding schemes (MCS) to NOMA users and carry out multiplexing in the power domain.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection and Research of Methods Increasing Optical Boundaries Determining Accuracy of Objects Suitable for Further FPGA Implementation","authors":"Y. Chursin, Ruslan A. Nurmukhametov","doi":"10.1109/SIBCON56144.2022.10002988","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002988","url":null,"abstract":"The article describes an optical method for obtaining the geometric parameters of an object, based on the analysis of the boundaries of the object’s shadow in a divergent light flux. One of the main tasks that arises when using this method is filtering a noisy signal in real time with a high frequency. The article discusses and compares two photo signal filtering methods using FPGAs.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of the Quality of Brick Products by the Method of Machine Vision","authors":"M. Kataev, Eugeny Kartashov, R. Karpov","doi":"10.1109/SIBCON56144.2022.10002973","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002973","url":null,"abstract":"At present, no one doubts that machine vision significantly increases the efficiency, quality and reliability of solving numerous problems, including the detection of various product defects. Machine vision acts as a replacement for the complex and time-consuming work of specialists who search for defects using visual inspection. However, for the application of machine vision methods, several conditions must be met, which are associated with lighting and a suitable photographic apparatus, in order to obtain high-quality images, as well as the method of their processing. Image processing and analysis are important elements of a quality control system and obtaining information about defects. This study provides a problem statement for assessing the quality of the surface of bricks and describes the proposed approach to image processing and analysis. The results of processing real images obtained at a brick factory are presented.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional Modeling as a Basis for Classifying Security Threats","authors":"A. Konev","doi":"10.1109/SIBCON56144.2022.10003024","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003024","url":null,"abstract":"Building a threat model plays one of the key roles in assessing the security of information systems. In this case, a rather important point is to establish a connection between the description of the protected object (functions of processing the protected information) and the list of threats directed at the protected object. One of the possible ways to describe the protected processes in information systems is to build a functional model. The proposed study examines the relationship between the IDEF0 functional modeling methodology and various classes of threats. The basic idea is as follows: different types of arrows in the IDEF0 notation correspond to different types of threats. The horizontal arrows correspond to threats of confidentiality and integrity violation of data, storage media, and other objects. Mechanism arrows correspond to threats and attacks directed at components of information systems (disabling components, introducing malware, etc.). Control arrows correspond to threats related to system trust (errors during development, implementation of undocumented features). The article provides a classification of threats based on the typing of arrows in the IDEF0 notation, and examples of threats for typical functions of processing protected information.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for Selecting Indicators of Data Compromise","authors":"V. Kartak, Nail Bashmakov","doi":"10.1109/SIBCON56144.2022.10002962","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002962","url":null,"abstract":"This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of the Step-Down DC-DC converter with Si-and SiC-diodes","authors":"Nikita Yu. Burtsev, O. Kozhemyak","doi":"10.1109/SIBCON56144.2022.10003010","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003010","url":null,"abstract":"The article presents the results of simulation of pulse DC-DC step-down converter with different types of diodes. Simulations have shown that the use of a silicon carbide diode instead of convenient silicon diode gives the best performance. It also shown, the parasitic inductances in the circuit significantly increase the power losses when the diode is switched-off and reduce the losses when the transistor is switched-on.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subordinate Control System of Buck Converter","authors":"D. Lyapunov, S. Lyapushkin, A. Yudintsev","doi":"10.1109/SIBCON56144.2022.10003006","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003006","url":null,"abstract":"This paper delves into the problem of designing a buck converter, serving as the key element for testing sets, also known as load simulators. These simulators impose varying electric load onto power supplies that may be employed in harsh environments and under temperatures below 00C. This provides ground testing for such supplies over a wide range of electric loads as well as creating the proper voltage waveform on the supply terminals. For this purpose, we implement a subordinate control system containing an internal inductor current loop and main output voltage feedback of the buck converter topology. Within the present research frameworks, a methodology of the control system designing, have been outlined. The resulting voltage and current waveforms confirm the correctness of the presented methodology and applicability of the buck converter with subordinate control system as a functional component of load simulators.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel
{"title":"Computer Attacks Simulation in IIoT Systems","authors":"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel","doi":"10.1109/SIBCON56144.2022.10002952","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002952","url":null,"abstract":"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of the Steepness of the Discriminatory Characteristic for the Meter of non-Energy Parameters of the Signal","authors":"V. M. Artyushenko, V. I. Volovach","doi":"10.1109/SIBCON56144.2022.10003028","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003028","url":null,"abstract":"The simultaneous influence of multiplicative and additive noises on the steepness of the discriminative characteristic of a two-channel discriminator is analyzed. A coherent signal and a sequence of incoherent pulses are used as input signals. It is assumed that, at a relatively low level of noise, the tracking meter is considered as a linear system. Conditions are obtained when systematic measurement errors are absent. The expressions for determining the steepness of the discriminative characteristic affected by multiplicative noise depending on the additive noise level are obtained. It is shown that multiplicative noise has a greater influence on the steepness of the discriminative characteristic when the level of additive noise is higher. Coefficients determining the normalizing effect of the automatic gain control are obtained. It is shown that the type of the input signal does not change the physical nature of the influence of multiplicative and additive noises on the steepness of the discriminative characteristic.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}