SPIIRAS Proceedings最新文献

筛选
英文 中文
An Analytic Survey of End-to-End Speech Recognition Systems 端到端语音识别系统分析综述
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.58.4
Nikita Markovnikov, I. Kipyatkova
{"title":"An Analytic Survey of End-to-End Speech Recognition Systems","authors":"Nikita Markovnikov, I. Kipyatkova","doi":"10.15622/sp.58.4","DOIUrl":"https://doi.org/10.15622/sp.58.4","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83859943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A High-Performance Genome-Wide Association Study Algorithm based on Analysis of Pairs of Individuals 基于个体对分析的高性能全基因组关联研究算法
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/SP.58.1
Лев Владимирович Уткин, Ирина Львовна Уткина
{"title":"A High-Performance Genome-Wide Association Study Algorithm based on Analysis of Pairs of Individuals","authors":"Лев Владимирович Уткин, Ирина Львовна Уткина","doi":"10.15622/SP.58.1","DOIUrl":"https://doi.org/10.15622/SP.58.1","url":null,"abstract":"An extremely simple and high-performance genome-wide association study (GWAS) algorithm for estimating the main and epistatic effects of markers or single nucleotide polymorphisms (SNPs) is proposed. The main idea underlying the algorithm is based on comparison of genotypes of pairs of individuals and comparison of the corresponding phenotype values. It is used the intuitive assumption that changes of alleles corresponding to important SNPs in a pair of individuals lead to a large difference of phenotype values of these individuals. In other words, the algorithm is based on considering pairs of individuals instead of SNPs or pairs of SNPs. The main advantage of the algorithm is that it weakly depends on the number of SNPs in a genotype matrix. It mainly depends on the number of individuals, which is typically very small in comparison with the number of SNPs. Another important advantage of the algorithm is that it can detect the epistatic effect viewed as gene-gene interaction without additional computations. The algorithm can also be used when the phenotype takes only two values (the case-control study). Moreover, it can be simply extended from the analysis of binary genotype matrices to the microarray gene expression data analysis. Numerical experiments with real data sets consisting of populations of double haploid lines of barley illustrate the outperformance of the proposed algorithm in comparison with standard GWAS algorithms from the computation point of view especially for detecting the gene-gene interactions. The ways for improving the proposed algorithm are discussed in the paper.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74609262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Structural Interference for Data Protection from Information Leakage in the Stray Electromagnetic Radiations Channel 结构干扰在杂散电磁辐射信道中防信息泄漏数据保护中的应用
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.58.7
A. Parshutkin, D. Levin, S. Zaytsev, Aleksandr Valentinovich Egin
{"title":"Application of Structural Interference for Data Protection from Information Leakage in the Stray Electromagnetic Radiations Channel","authors":"A. Parshutkin, D. Levin, S. Zaytsev, Aleksandr Valentinovich Egin","doi":"10.15622/sp.58.7","DOIUrl":"https://doi.org/10.15622/sp.58.7","url":null,"abstract":"This work is devoted to the rational choice of formation parameters for the masking noise and structural interference and their combined use for the protection of confidential information against leaks in the stray electromagnetic radiations channel of the displaying units using the DVI standard. \u0000The work describes the simulation features of the influence of the interferences formed by the active jamming system on the quasioptimum receiver which serves as a tool for the interception. The principles of the pulse components formation in the stray electromagnetic radiations from displays based on the DVI standard-based video data transfer and specific pulse components of structural interference are presented. Noted that mode information output to the monitor screen have the broadband and repetitive stray electromagnetic radiations matching on frequency of the frame scan devices video path. \u0000The indicator is set for the estimation of effectiveness of structural interference in the solution of the data protection problem from leakage through the channel of stray electromagnetic radiations – variations of the wrong color recognition probability in the block of graphic information. A detailed description is given for the dependences of the effectiveness indicator of structural interference on a number of frames of an image, accumulated in the technical tool for the interception of stray electromagnetic radiations, as well as for signal/noise to amplitude relation at the input of the technical interception tool. \u0000On the basis of the simulation results we have evaluated the effectiveness of applying structural interference on active noise systems. Identified the feasibility of using structural interference with the protection of confidential information from leaking through the channel stray electromagnetic radiations means of information display the DVI standard. The advantages of decreased total output and power consumption by the active jamming devices are shown in comparison with the masking noise and traditional jamming methods.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Context-Oriented Competence Management in Expert Networks 情境导向的专家网络能力管理
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.59.7
Viktoriia Stepanenko, A. Kashevnik, A. Gurtov
{"title":"Context-Oriented Competence Management in Expert Networks","authors":"Viktoriia Stepanenko, A. Kashevnik, A. Gurtov","doi":"10.15622/sp.59.7","DOIUrl":"https://doi.org/10.15622/sp.59.7","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80307605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis and Synthesis of Communication Network Structures according to the Determined Stability Indicators 基于确定稳定性指标的通信网络结构分析与综合
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/SP.58.6
K. Batenkov, A. Batenkov
{"title":"Analysis and Synthesis of Communication Network Structures according to the Determined Stability Indicators","authors":"K. Batenkov, A. Batenkov","doi":"10.15622/SP.58.6","DOIUrl":"https://doi.org/10.15622/SP.58.6","url":null,"abstract":"When solving problems related to the analysis and synthesis of communication networks for stability, a special place is simple and easy to understand indicators, weakly linked to the classical concept of exit probability from a state of health. Such deterministic indicators of stability (connectedness, a couple of connections, linear functional connectivity, the number of spanning trees) allow, albeit very approximately, to solve a complex of tasks related to the assessment of the reliability and survivability complex networks. Due to the rather simple analytical form of a linear functional connectivity for the synthesis of structures, it is possible to use the analytical method presented in the work. In this general formulation for the synthesis of connected graphs is formulated as the maximization of the linear functional connec-tivity for all possible graphs with a given number of edges, vertices, and with fixed values of their weighting coefficients.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81235235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HMM-based Whisper Recognition using μ-law Frequency Warping 基于μ律频率扭曲的hmm低语识别
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/SP.58.2
J. Galic, S. Jovicic, V. Delić, B. Markovic, D. Pavlovic, Đorđe Grozdić
{"title":"HMM-based Whisper Recognition using μ-law Frequency Warping","authors":"J. Galic, S. Jovicic, V. Delić, B. Markovic, D. Pavlovic, Đorđe Grozdić","doi":"10.15622/SP.58.2","DOIUrl":"https://doi.org/10.15622/SP.58.2","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82668294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvements in Serbian Speech Recognition Using Sequence-Trained Deep Neural Networks 使用序列训练深度神经网络改进塞尔维亚语语音识别
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.58.3
E. Pakoci, B. Popović, D. Pekar
{"title":"Improvements in Serbian Speech Recognition Using Sequence-Trained Deep Neural Networks","authors":"E. Pakoci, B. Popović, D. Pekar","doi":"10.15622/sp.58.3","DOIUrl":"https://doi.org/10.15622/sp.58.3","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83554159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Output Control of Nonlinear Systems Using Modified Backstepping Algorithm with Disturbances Compensation 带扰动补偿的改进反演非线性系统输出控制
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.58.8
S. Vrazhevsky
{"title":"Output Control of Nonlinear Systems Using Modified Backstepping Algorithm with Disturbances Compensation","authors":"S. Vrazhevsky","doi":"10.15622/sp.58.8","DOIUrl":"https://doi.org/10.15622/sp.58.8","url":null,"abstract":"The article deals with a tracking control system synthesis for a nonlinear plant functioning under bounded external disturbances which are not available for measurement. A proposed solution is a robust modification of the backstepping approach with the similar controller design structure. The main changes are based on plant model transformations that make it possible to use the only one filer in control system and, along with it, an auxiliary loop method usage to disturbances evaluation and compensation. High-gain observers are used for unknown signals measuring together with their derivatives. Tracking errors and observation errors convergence with the adjustable accuracy during the finite transient time is proved. Efficiency of the algorithm is demonstrated using computer modeling in comparison with an analogue.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77288765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Efficiency of Entropy Coding Method in Modern Video Compression Standards 提高现代视频压缩标准中熵编码方法的效率
SPIIRAS Proceedings Pub Date : 2018-06-01 DOI: 10.15622/sp.58.5
Van Truong Nguyen, Andrey Tropchenko
{"title":"Improving Efficiency of Entropy Coding Method in Modern Video Compression Standards","authors":"Van Truong Nguyen, Andrey Tropchenko","doi":"10.15622/sp.58.5","DOIUrl":"https://doi.org/10.15622/sp.58.5","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"218 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75615541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Анализ биоинспирированных подходов для защиты компьютерных систем и сетей 生物工程方法分析保护计算机系统和网络
SPIIRAS Proceedings Pub Date : 2014-03-17 DOI: 10.15622/SP.18.2
Филипп Геннадьевич Нестерук, Игорь Витальевич Котенко, Андрей Владимирович Шоров
{"title":"Анализ биоинспирированных подходов для защиты компьютерных систем и сетей","authors":"Филипп Геннадьевич Нестерук, Игорь Витальевич Котенко, Андрей Владимирович Шоров","doi":"10.15622/SP.18.2","DOIUrl":"https://doi.org/10.15622/SP.18.2","url":null,"abstract":"Nowadays more and more different bio-inspired approaches (based on a biological metaphor) for the computer and networks security systems are mentioned and advertised. Traditional computer-based systems and their functionality are often limited by different conditions. Due to frequent minor errors, these systems are subject of failure. They lack scalability, have low adaptation ability to changeable conditions of functioning and its goals. As opposed to traditional computer-based systems, biological systems are often quite reliable. They have great self-protection mechanisms, highly scalable, adaptable and able to self regeneration. These properties of biological systems can be used to construct technical systems (including information security systems). The paper considers different approaches to the protection of computer systems and networks, which are based on a biological metaphor.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87781320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信