


Vol 53, No 4 (2019)
- Year: 2019
- Articles: 10
- URL: https://journal-vniispk.ru/0146-4116/issue/view/10778
Article
Influence of Nonlinearity of Fast Sawtooth Voltage on Stroboscopic Transformation of Signals in Receivers of Sensors Locators
Abstract
Sawtooth voltage with the possibility of changing its nonlinearity was modeled for a stroboscopic signal converter used in pulsed ultrawideband gigahertz sensor locators. The pattern of automatic shift in signal sample pulses is described mathematically, on the basis of which the formula of the law of shift in the aforementioned pulses at a nonlinear fast sawtooth voltage has been obtained. The effect of the nonlinearity of sawtooth voltage on the output signal of the stroboscopic converter is shown.



Optimal Robust Control of a Robots Group
Abstract
The article focuses on the development of an on-board system design method for optimal control of an autonomous mobile group of objects. It is assumed that the group consists of a leader and some agents. A new method for the synthesis of an optimal multivariable control system, which is needed for preserving desired position of the agent relatively to the leader, was substantiated in the article. The leader passes along a random trajectory and measurement of the agent position with respect to the leader is accompanied with random noise. All group members experience the action of random disturbances.



Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter
Abstract
Investigation of the effect of sensor fault in liquid process loop and designing a suitable fault isolation technique using the Kalman filter is proposed in this work. The objective of the work is to design an observer to estimate the process parameters, so as to compare with sensor functionality and thus identify and isolate faults in sensor. Based on the derived system model, observer is designed using Kalman filter approach. The proposed system with observer is subject to test in simulation and validated using physical system. The designed observer was successfully able to isolate drift, short circuit and open circuit faults in sensor. Practical validation shows the system with observer was able to track the set point with the root mean square of 0.986% error, even with faulty sensor.



Using Hybrid Discriminative-Generative Models for Binary Classification
Abstract
Discriminative and generative machine learning algorithms have been successfully used in different classification tasks during the last several decades. They both have some advantages and disadvantages and depending on a problem, one type of algorithm performs better than the other one. In this paper we contribute to the research of combination of both approaches and propose literature based a hybrid discriminative-generative generic model. Also, we propose hybrid model structure finding and building a new algorithm. We present theoretical and practical advantages of the hybrid model over its consisting algorithms, efficiency of the model structure finding algorithm, then perform experiments and compare results.



LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis
Abstract
The quality of statistical parametric speech synthesis (SPSS) relies on voiced/unvoiced classification. Errors in voicing decision can contribute to significant degradation in speech quality. This paper proposes a robust voicing detection method based on power spectrum and long short term memory (LSTM) network for SPSS. The performance of the proposed method is evaluated using CMU Arctic, Keele and MIR-1K databases. Further, the effectiveness of the proposed method is analyzed for deep neural network (DNN)-based SPSS. The results show that the proposed method can better classify the voiced and unvoiced speech segments, which significantly improves the speech quality.



Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms
Abstract
Website phishing is an online crime for obtaining secret information such as passwords, account numbers, and credit card details. Attackers lure users through attractive hyperlinks, in order to, redirect to the fake websites. Phishing detection through a machine-learning approach has become quite effective nowadays. In this research, the Uniform Resource Locator (URL) based phishing detection approach has been used. Machine-learning classifiers like Naïve Bayes, Iterative Dichotomiser-3 (ID3), K-Nearest Neighbor (KNN), Decision Tree and Random Forest used for the classification of legitimate and illegitimate websites. This classification would help in the detection of phishing websites. However, it has been observed that use of Genetic Algorithms (GAs) for feature selection can improve the detection accuracy. Our experimental results portrayed the use of Iterative Dichotomiser-3 (ID3) along with Yet Another Generating Genetic Algorithm (YAGGA) improves the detection accuracy up to 95%.



Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Abstract
As the scale of cloud computing expands gradually, the security of data sharing in cloud computing environment is facing more and more challenges. In this study, an improved, efficient data encryption method was proposed, which was based on ciphertext policy attribute-based encryption and controlled time cost using fixed-length ciphertext. The generation and aggregation of public and private keys and the encryption and decryption of data were introduced. Then simulation experiments were carried out in the cloud computing environment. Compared with the traditional ciphertext-policy attribute-based encryption (CP-ABE) algorithm, the improved algorithm had better performance in dealing with massive data and multi-user attributes although the steps increased. The comparison with other improved algorithms suggested that the improved algorithm put forward in this study had a high reliability, which indicated a good practicability of the improved algorithm in safe data sharing under cloud computing environment.



Practical Prediction of CFO-Made OFDM Symbol Distortion
Abstract
The Carrier Frequency Offset (CFO) is considered to be a major drawback of the Orthogonal Frequency-Division Multiplexing (OFDM) signal. So, in many practical situations, specifically with LTE-Advanced downlink introducing carrier aggregation, estimation of the CFO-induced OFDM symbol phase deviation, is of interest. However, this demands complex test equipment, such as e.g. a Vector Signal Analyzer (VSA), which might not be always and everywhere available. Therefore, we applied the link abstraction principle on the Bit Error Rate (BER) that is considered to be determined just by the CFO-caused phase deviation, i.e. as if the channel was noiseless and time-dispersion-free (so that evident bit errors occur just due to the actual CFO). Furthermore, as the CFO-caused squared phase deviation is linear with the instantaneous (per-OFDM-symbol) Peak-to-Average Power Ratio (PAPR), which is related to the Error Vector Magnitude (EVM) and so with BER, we develop a simple model for analytical BER-based estimating of CFO. In this sense, we considered the easy-to-measure BER degradation as resulting just from the according additive white Gaussian noise (AWGN) source, which abstracts the CFO distortion. The proposed analytical model is validated by according Monte-Carlo simulations.



Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring
Abstract
In this paper the design of printed log-periodic antennas is presented. Focus is on the design of an antenna for long range communication within a wireless sensor network system for sea water quality monitoring, but the contents of the paper can also be useful at other frequencies and other applications. The difficulties in using the design procedure for log-periodic dipole antennas proposed by Carrel are discussed and some limitations are pointed out. New design hints are given, and preliminary examples of printed antennas are presented. Simulations are carried out not only for free-space but also in presence of sea and wave motion. Results show that printed log-periodic antennas can be good candidates for the intended application.



User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
Abstract
5G cellular mobile networks aspire to accommodate large numbers of users and devices most of which are expected to be mobile. They will also provide much higher data rates than previous generations’ networks. Analyzing how a cell’s performance is impacted by user mobility becomes paramount in an effort to provide the best possible quality of services. In this paper we propose a model of a generic cell where each user is moving based on the random waypoint model. We then adapt this model to a 5G cell to extract meaningful quality of service metrics. To this end and to provide a better perspective of how the model can be adapted to different bandwidth allocation policies, we extend the Engset multirate loss model to obtain recursive but efficient formulas for various performance measures, including call blocking and time congestion probabilities for both the complete sharing and bandwidth reservation policies.


