{"title":"Speech Enhancement Method Based on Modified Encoder-Decoder Pyramid Transformer","authors":"A. Lependin, R. Nasretdinov, I. Ilyashenko","doi":"10.15514/ispras-2022-34(4)-10","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(4)-10","url":null,"abstract":"The development of new technologies for voice communication has led to the need of improvement of speech enhancement methods. Modern users of information systems place high demands on both the intelligibility of the voice signal and its perceptual quality. In this work we propose a new approach to solving the problem of speech enhancement. For this, a modified pyramidal transformer neural network with an encoder-decoder structure was developed. The encoder compressed the spectrum of the voice signal into a pyramidal series of internal embeddings. The decoder with self-attention transformations reconstructed the mask of the complex ratio of the cleaned and noisy signals based on the embeddings calculated by the encoder. Two possible loss functions were considered for training the proposed neural network model. It was shown that the use of frequency encoding mixed with the input data has improved the performance of the proposed approach. The neural network was trained and tested on the DNS Challenge 2021 dataset. It showed high performance compared to modern speech enhancement methods. We provide a qualitative analysis of the training process of the implemented neural network. It showed that the network gradually moved from simple noise masking in the early training epochs to restoring the missing formant components of the speaker's voice in later epochs. This led to high performance metrics and subjective quality of enhanced speech.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87873436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of the process of environmental monitoring in specially protected natural territories of the Russian Federation based on the content management system Directum RX","authors":"I. Rudko, L. Khoroshko, Pavel P. Keyno","doi":"10.15514/ispras-2022-34(2)-12","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(2)-12","url":null,"abstract":"For organizations that execute control over specially protected natural areas of the Russian Federation, the task of consolidating data on ongoing observations is relevant. These data, called the chronicles of nature, for a long time were kept in a simplified, paper form and did not have a clear structure. The task of automating business processes for collecting data and exchanging this data between members of the scientific community, as well as building models necessary for the scientific departments of parks and reserves, is important and relevant. In this connection, we see it relevant to consider automating the process of environmental monitoring by developing an electronic document management module based on the integration platform Directum RX business solutions. The purpose of the research is to automate the eco-monitoring process based on the Directum RX platform, which allows to build a corporate content management system, as well as create a full-fledged data storage and retrieval system for collecting information about observations. The article describes the role model for working with the system, the system architecture and the developed components of the \"Ecomonitoring\" module based on the Directum RX platform. For this, a structural method was used, by dividing the task into many independent stages available for understanding and solving and hierarchical ordering. Integration with the Yandex weather service has been developed for further use in analytical models. A solution has been developed to manage the universal classifier of animals in accordance with the classifier of biological taxonomy accepted in the world. The automation of user actions for collecting and processing information about observations is demonstrated. As a result, the process of environmental monitoring was automated in one of the reserves of the Russian Federation.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90798471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alesander Sergeevich Leonov, A. Laptev, Anastasia Laushkina, Mikhael Sinko, O. Basov
{"title":"Algorithm for finding specialists with unique skills based on a digital footprint","authors":"Alesander Sergeevich Leonov, A. Laptev, Anastasia Laushkina, Mikhael Sinko, O. Basov","doi":"10.15514/ispras-2022-34(4)-12","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(4)-12","url":null,"abstract":"In recent years, due to significant changes in the labor market, companies have become more likely to face various problems when searching and selecting candidates. The main reason for these problems is that the existing Internet resources for finding candidates do not allow you to find a specialist with the required set of competencies and fully evaluate his experience, skills, achievements and personal characteristics. As a result, it becomes necessary to create a service for finding exclusive specialists. Most of these specialists do not have a resume in the public domain, are not looking for a job, but are ready to consider interesting offers. As a result, this work is devoted to the study of the possibility of finding specialists with unique competencies on the Internet based on the analysis of their digital footprint. The hypothesis is that it is possible to get a complete profile of a unique specialist if you collect, combine and analyze data from various sources. In the course of this work, the possibilities provided by open data sources on the Internet were analyzed, as well as the scientometric indicators of a specialist and the parameters of his reliability were determined. An algorithm for searching for the required specialists based on these data has been compiled, an automated system implementing this search has been designed, developed and tested.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88345120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ekaterina Olegovna Kurdenkova, M. Cherepnina, A. S. Chistyakova, K. Arkhipenko
{"title":"Effect of transformations on the success of adversarial attacks for Clipped BagNet and ResNet image classifiers","authors":"Ekaterina Olegovna Kurdenkova, M. Cherepnina, A. S. Chistyakova, K. Arkhipenko","doi":"10.15514/ispras-2022-34(6)-7","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(6)-7","url":null,"abstract":"Our paper compares the accuracy of the vanilla ResNet-18 model with the accuracy of the Clipped BagNet-33 and BagNet-33 models with adversarial learning under different conditions. We performed experiments on images attacked by the adversarial sticker under conditions of image transformations. The adversarial sticker is a small region of the attacked image, inside which the pixel values can be changed indefinitely, and this can generate errors in the model prediction. The transformations of the attacked images in this paper simulate the distortions that appear in the physical world when a change in perspective, scale or lighting changes the image. Our experiments show that models from the BagNet family perform poorly on images in low quality. We also analyzed the effects of different types of transformations on the models' robustness to adversarial attacks and the tolerance of these attacks.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86531388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical modeling the process of gas flow in the turbomolecular pump using the Cercignani-Lampis gas-surface interaction model","authors":"U. S. Gordeeva, F. Sharipov","doi":"10.15514/ispras-2022-34(6)-16","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(6)-16","url":null,"abstract":"In this paper, the process of gas flow in the flow path of a turbomolecular vacuum pump using the Cercignani-Lampis (CL) model was simulated. CL model was used as new boundary conditions when calculating the transition probability. The test particle method (Monte Carlo method) was used in the simulation. The calculation of the molecules transition probability through the blade channel in the forward and reverse directions, the transition resulting probability, the compression ratio was made.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"144 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79718114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithm of test generation from functional specification using Open IE model and clustering","authors":"Kirill Kobyshev, Sergey Molodyakov","doi":"10.15514/ispras-2022-34(2)-2","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(2)-2","url":null,"abstract":"Automated test coverage is a widespread practice in long-live software development projects for now. According to the test development approach, each automated test should reuse functions implemented in test framework. The provided research is aimed at improving the test framework development approach using natural language processing methods. The algorithm includes the following steps: preparation of test scenarios; transformation of scenario paragraphs to syntax tree using pretrained OpenIE model; test steps comparison with test framework interfaces using GloVe model; transformation of the given semantic tree to the Kotlin language code. The paper contains the description of protype of system automatically generating Kotlin language tests from natural language specification.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81164037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Herminio Del Ángel-Flores, E. López-Domínguez, Y. Hernández-Velázquez, Saúl Domínguez-Isidro, M. Medina-Nieto, Jorge De La Calleja
{"title":"Mobile Learning Platform focused on Learning Monitoring and Customization: Usability Evaluation Based on a Laboratory Study","authors":"Herminio Del Ángel-Flores, E. López-Domínguez, Y. Hernández-Velázquez, Saúl Domínguez-Isidro, M. Medina-Nieto, Jorge De La Calleja","doi":"10.15514/ispras-2022-34(3)-7","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(3)-7","url":null,"abstract":"The learning customization and monitoring are considered key aspects of the teaching-learning processes. Some works have proposed mobile learning systems that provide teachers and students learning monitoring and personalization services. One of the main requirements of these kinds of systems in terms of software quality is usability; however, few works have addressed the usability issues using laboratory studies with users in real domains. In this work, we present a usability evaluation of the learning monitoring and personalization services of a mobile learning platform based on a laboratory study in which nine teachers and ten students participated. In our usability evaluation, the aspects evaluated were effectiveness, efficiency, and level of user satisfaction as proposed by the ISO/IEC 25000 family of standards. The results show that the teachers presented effectiveness, efficiency, and satisfaction considered satisfactory, while the students presented effectiveness and satisfaction classified as satisfactory and acceptable efficiency. The usability evaluation described in this work can serve as a reference for developers seeking to improve learning monitoring and personalization services development.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84155711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized context-dependent graph-theoretic model of folklore and literary texts","authors":"N. Moskin, A. Rogov, R. V. Voronov","doi":"10.15514/ispras-2022-34(1)-6","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(1)-6","url":null,"abstract":"One of the problems of automatic text processing is their attribution. This term is understood as the establishment of the attributes of a text work (determination of authorship, time of creation, place of recording, etc.). The article presents a generalized context-dependent graph-theoretic model designed for the analysis of folklore and literary texts. The minimal structural unit of the model (primitive) is a word. Sets of words are combined into vertices, and the same word can be related to different vertices. Edges and graph substructures reflect the lexical, syntactic and semantic links of the text. The characteristics of the model are its fuzziness, hierarchy and temporality. As examples, a hierarchical graph-theoretical model of components (on the example of literary works by A. S. Pushkin), a temporal graph-theoretic model of a fairy tale plot (on the example of Russian fairy tales by A. M. Afanasyev) and a fuzzy graph-theoretic model of «strong» connections of grammatical classes (on the example of anonymous articles from the pre-revolutionary magazines «Time», «Epoch» and the weekly «Citizen», edited by F. M. Dostoevsky). The model is built in such a way that it can be further explored using artificial intelligence methods (for example, decision trees or neural networks). For this purpose, a format for storing such data was implemented in the information system «Folklore», as well as procedures for entering, editing and analyzing texts and their graph-theoretic models.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89177119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the accuracy of static analysis by accounting for the values of class fields that can have only one constant value","authors":"Vadim Sergeevitch Karcev, V. N. Ignatyev","doi":"10.15514/ispras-2022-34(6)-2","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(6)-2","url":null,"abstract":"The paper describes the approach for the improvement of the accuracy of general purpose static symbolic execution analysis of C# sources based on the accounting for the values of class fields that can have only one possible value. In addition, we propose the detector of forgotten readonly modifiers and unused fields, that use data collected by the main analysis. The approach and detectors were implemented as part of the industrial static analyzer SharpChecker. The main analysis is performed at the AST level to reduce time and resource costs. Collected values of the fields are used during symbolic execution phase allowing it to use concrete value instead of symbolic for the subset of class fields. As a result, we managed to noticeably improve the accuracy of some analyzers, such as UNREACHABLE_CODE (improved by 7.57%) or DEREF_OF_NULL (improved by 1.33%) and get new results in cases with forgotten readonly or unused fields. Achieved results allow to use analysis and detectors in the main branch of the SharpChecker and make it available to users. The paper considers in detail the algorithm of the detector and provides examples of results on the set of open source software.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of erroneous usage of synchronization monitor in С# via static analysis","authors":"Polina Ilyinichna Ragozina, V. N. Ignatyev","doi":"10.15514/ispras-2022-34(4)-5","DOIUrl":"https://doi.org/10.15514/ispras-2022-34(4)-5","url":null,"abstract":"The paper describes static analysis algorithms aimed at finding three types of errors related to the concept of a synchronizing monitor: redefinition of a variable of mutually exclusive locking inside a critical section; use of an incorrect variable type when entering the monitor; blocking involving an object that has methods that use a reference to an instance (this) to lock. Developed algorithms rely on symbolic execution technology and involve interprocedural analysis via summary of functions, which ensures scalability, field-, context-, and flow-sensivity. Proposed methods were implemented in the infrastructure of a static analyzer in the form of three separate detectors. Testing on the set of open source projects revealed 23 errors and the true positive ratio of 88.5% was obtained, while the time consumption only made up from 0.1 to 0.7% of the total analysis time. The errors that these detectors were designed to find are difficult to detect by testing or dynamic analysis because of their multithreading nature. At the same time, it is necessary to find them: just one such defect can lead to incorrectness of the program and even make it vulnerable to intruders.","PeriodicalId":33459,"journal":{"name":"Trudy Instituta sistemnogo programmirovaniia RAN","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74523477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}