- Speech Recognition and Synthesis
- Radio Astronomy Observations and Technology
- Geophysics and Gravity Measurements
- Speech and Audio Processing
- Music and Audio Processing
- Astronomical Observations and Instrumentation
- Cybersecurity and Information Systems
- Natural Language Processing Techniques
- Sensor Technology and Measurement Systems
- Advanced Measurement and Metrology Techniques
- Planetary Science and Exploration
- Gyrotron and Vacuum Electronics Research
- Advanced Signal Processing Techniques
- Superconducting and THz Device Technology
- Authorship Attribution and Profiling
- GNSS positioning and interference
- Economic and Technological Systems Analysis
- Scientific Research and Discoveries
- Inertial Sensor and Navigation
- Advanced Computational Techniques in Science and Engineering
- Multi-Criteria Decision Making
- Astrophysics and Cosmic Phenomena
- Methane Hydrates and Related Phenomena
- Computational Physics and Python Applications
- Carbon Nanotubes in Composites
Southwest Minnesota State University
2019-2025
Kursk State University
2023
South-West State University
2008-2021
Kazan State Technological University
2019
University of Eastern Finland
2014-2017
Institute for Infocomm Research
2017
Agency for Science, Technology and Research
2016
Finland University
2015
An increasing number of independent studies have confirmed the vulnerability automatic speaker verification (ASV) technology to spoofing.However, in comparison that involving other biometric modalities, spoofing and countermeasure research for ASV is still its infancy.A current barrier progress lack standards which impedes results generated by different researchers.The ASVspoof initiative aims overcome this bottleneck through provision standard corpora, protocols metrics support a common...
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology against spoofing can undermine confidence in its reliability and form a barrier to exploitation. The absence competitive evaluations lack common datasets has hampered progress developing effective countermeasures. This paper describes ASV Spoofing Countermeasures (ASVspoof) initiative, which aims fill this void. Through provision dataset, protocols, metrics, ASVspoof promotes sound research methodology...
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), no exception; replay, synthesis, conversion all provoke false acceptances unless countermeasures are used. We focus on (VC) considered as one of the most challenging for modern recognition systems. To detect spoofing, existing assume explicit or implicit knowledge a particular VC system designing discriminative features. In this paper, we explore back-end...
Automatic speaker verification (ASV) systems are highly vulnerable against spoofing attacks, also known as imposture. With recent developments in speech synthesis and voice conversion technology, it has become important to detect synthesized or voice-converted for the security of ASV systems. In this paper, we compare five different classifiers used recognition synthetic speech. Experimental results conducted on ASVspoof 2015 dataset show that support vector machines with generalized linear...
The purpose of the research is to systematize properties data centers and find ways increase productivity a network based on collective access, combining steps storing processing information its replication. Methods . methods are theory organization complex analytical systems artificial intelligence systems. application principles distributed-territorial centers, deferred collection, computational models knowledge representation allows you create center architectures reconfigurable for basic...
Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) no exception; replay, synthesis conversion all provoke false acceptances unless countermeasures are used.We focus on voice (VC) attacks.Most existing use full knowledge of a particular VC system detect spoofing.We study potentially more universal approach involving generative modeling perspective.Specifically, we adopt standard ivector representation probabilistic linear discriminant...
The series of language recognition evaluations (LRE's) conducted by the National Institute Standards and Technology (NIST) have been one driving forces in advancing spoken technology.This paper presents a shared view five institutions resulting from our collaboration toward LRE 2015 submissions under names I2R, Fan-tastic4, SingaMS.Among others, LRE'15 emphasizes on detection context closely related languages, which is different previous LRE's.From perspective system design, we witnessed...
Purpose of research. Creation and characterization carbon nanostructures by high-frequency magnetron sputtering from a target in argon on silicon substrate reactive nitrogen environment, obtained Ni catalyst buffer layer. Methods. High-frequency with changes control parameters: time power working gas pressure Ar N. Research was carried out using X-ray phase analysis, atomic force microscopy holographic microscopy, Raman scattering. Results. The formation nanotubes, including single-walled...
Purpose of reseach. Development a forecast model energy consumption and assessment factors influencing its consumption. The obtained estimates will improve the quality efficiency management decisions at all levels administrative management. Methods. article presents an analytical review existing methods cognitive modelling forecasting electric power consumption, description software implementation information-computing system that allows to make by population administrative-territorial...
We explore a method to boost discriminative capabilities of probabilistic linear discriminant analysis (PLDA) model without losing its generative advantages. show sequential projection and training steps leading classifier that operates in the original i-vector space but is discriminatively trained low-dimensional PLDA latent subspace. use extended Baum-Welch technique optimize with respect two objective functions for training. One them well-known maximum mutual information objective, while...
Purpose. Investigate the structural features of boron nitride films obtained by Langmuir-Blodgett method. Observe fluorescence spectra and determine band structure resulting coatings using optical methods. Methods. The deposition Langmuir was carried out KSV NIMA 2002 setup from colloidal solution ST BN/CHCl 3 . study properties conducted SF 2000 spectrophotometer in spectral range 200 – 1100 nm confocal Raman microspectrometer OmegaScope AIST-NT with resolution cm -1 Surface morphology...
Purpose of reseach is to improve the operation technical systems or performance socio-economic by developing a fuzzy system for selecting supplier inventories in logistics companies. The relevance study determined absence approach formation procurement strategy overwhelming majority companies, which makes operations management analysis and evaluation process difficult. When making decisions concerning supplier, based on variety sources, various mathematical methods techniques are used;...
This article describes the systems jointly submitted by Institute for Infocomm (I$^2$R), Laboratoire d'Informatique de l'Université du Maine (LIUM), Nanyang Technology University (NTU) and of Eastern Finland (UEF) 2015 NIST Language Recognition Evaluation (LRE). The system is a fusion nine sub-systems based on i-vectors extracted from different types features. Given i-vectors, several classifiers are adopted language detection task including support vector machines (SVM), multi-class...
Automatic speaker verification (ASV) technology is recently finding its way to end-user applications for secure access personal data, smart services or physical facilities. Similar other biometric technologies, vulnerable spoofing attacks where an attacker masquerades as a particular target via impersonation, replay, text-to-speech (TTS) voice conversion (VC) techniques gain illegitimate the system. We focus on TTS and VC that represent most flexible, high-end attacks. Most of prior studies...
The work is devoted to the consideration of approach effectiveness increase in socialeconomic system operation through fuzzy model development for supplier choice commoditymaterial stocks logistic companies. problem urgency conditioned on absence overwhelming majority companies formation procurement logistics strategy which makes difficulties process rapid management and charges efficient control. 
 theory sets a methodological ba-sis work. developed has practical value leadership
Abstract Methods of molecular dynamic simulation the bombardment polymeric materials by low-energy (up to 100 eV) ions generated in radio-frequency low-pressure (13.3-133 Pa) plasma are discussed. A model RF treatment ultrahigh weight polyethylene (UHMWPE) has been developed. It established that UHMWPE argon initiates fast rotation polymer chains, and rupture intramolecular bonds.