-
YaART: Yet Another ART Rendering Technology
Authors:
Sergey Kastryulin,
Artem Konev,
Alexander Shishenya,
Eugene Lyapustin,
Artem Khurshudov,
Alexander Tselousov,
Nikita Vinokurov,
Denis Kuznedelev,
Alexander Markovich,
Grigoriy Livshits,
Alexey Kirillov,
Anastasiia Tabisheva,
Liubov Chubarova,
Marina Kaminskaia,
Alexander Ustyuzhanin,
Artemii Shvetsov,
Daniil Shlenskii,
Valerii Startsev,
Dmitrii Kornilov,
Mikhail Romanov,
Artem Babenko,
Sergei Ovcharenko,
Valentin Khrulkov
Abstract:
In the rapidly progressing field of generative models, the development of efficient and high-fidelity text-to-image diffusion systems represents a significant frontier. This study introduces YaART, a novel production-grade text-to-image cascaded diffusion model aligned to human preferences using Reinforcement Learning from Human Feedback (RLHF). During the development of YaART, we especially focus…
▽ More
In the rapidly progressing field of generative models, the development of efficient and high-fidelity text-to-image diffusion systems represents a significant frontier. This study introduces YaART, a novel production-grade text-to-image cascaded diffusion model aligned to human preferences using Reinforcement Learning from Human Feedback (RLHF). During the development of YaART, we especially focus on the choices of the model and training dataset sizes, the aspects that were not systematically investigated for text-to-image cascaded diffusion models before. In particular, we comprehensively analyze how these choices affect both the efficiency of the training process and the quality of the generated images, which are highly important in practice. Furthermore, we demonstrate that models trained on smaller datasets of higher-quality images can successfully compete with those trained on larger datasets, establishing a more efficient scenario of diffusion models training. From the quality perspective, YaART is consistently preferred by users over many existing state-of-the-art models.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Comparison of parameters of vowel sounds of russian and english languages
Authors:
V. I. Fedoseev,
A. A. Konev,
A. Yu. Yakimuk
Abstract:
In multilingual speech recognition systems, a situation can often arise when the language is not known in advance, but the signal has already been received and is being processed. For such cases, some generalized model is needed that will be able to respond to phonetic differences and, depending on them, correctly recog-nize speech in the desired language. To build such a model, it is necessary to…
▽ More
In multilingual speech recognition systems, a situation can often arise when the language is not known in advance, but the signal has already been received and is being processed. For such cases, some generalized model is needed that will be able to respond to phonetic differences and, depending on them, correctly recog-nize speech in the desired language. To build such a model, it is necessary to set the values of phonetic parameters, and then compare similar sounds, establishing significant differences.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Life cycle models and security threats to a microcircuit during its development and operation
Authors:
D. S. Belyakov,
E. O. Kalinin,
A. A. Konev,
A. A. Shelupanov,
A. K. Novokhrestov
Abstract:
The growth of Internet of Things devices has shown the need to develop the direction of information security in the field of development and operation of microcircuits, since modern information systems are built around the latter. This article presents the life cycle of secure chips used as a root of trust ( Root of Trust ) information systems. The main stages of the life cycle of protected microc…
▽ More
The growth of Internet of Things devices has shown the need to develop the direction of information security in the field of development and operation of microcircuits, since modern information systems are built around the latter. This article presents the life cycle of secure chips used as a root of trust ( Root of Trust ) information systems. The main stages of the life cycle of protected microcircuits are described, namely, the life cycle models during development and during operation by the end user.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Ty** of data transfer processes in the information system within the framework of threat modeling
Authors:
E. S. Romanova,
A. K. Novokhrestov,
A. A. Konev
Abstract:
Work is aimed at automating the process of obtaining a list of security threats aimed at the information system in the work processes of data transfer are considered, definitions for each process are presented. The typification of processes and the formalization of the list of basic data transfer processes are considered. Based on the presented typical data transmission processes, schemes of these…
▽ More
Work is aimed at automating the process of obtaining a list of security threats aimed at the information system in the work processes of data transfer are considered, definitions for each process are presented. The typification of processes and the formalization of the list of basic data transfer processes are considered. Based on the presented typical data transmission processes, schemes of these processes have been developed that describe transmission channels and information carriers.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
System Attack Modeling Techniques Critical Information Infrastructure
Authors:
A. K. Novokhrestov,
A. A. Konev,
A. S. Kovalenko,
N. I. Sermavkin
Abstract:
Every day around the world, various organizations are exposed to more than a hundred attacks, most of which are success-fully repelled by information security specialists. However, attacks are also carried out that some information systems or specialists are unable to repel, which is why a large number of enterprises, as well as individuals, suffer huge monetary and reputational losses. The aim of…
▽ More
Every day around the world, various organizations are exposed to more than a hundred attacks, most of which are success-fully repelled by information security specialists. However, attacks are also carried out that some information systems or specialists are unable to repel, which is why a large number of enterprises, as well as individuals, suffer huge monetary and reputational losses. The aim of the work is to train specialists through cyber polygons and interactive games to a high level of knowledge and skills in the field of information security
△ Less
Submitted 18 December, 2021;
originally announced December 2021.
-
Speech frame implementation for speech analysis and recognition
Authors:
A. A. Konev,
V. S. Khlebnikov,
A. Yu. Yakimuk
Abstract:
Distinctive features of the created speech frame are: the ability to take into account the emotional state of the speaker, sup-port for working with diseases of the speech-forming tract of speakers and the presence of manual segmentation of a num-ber of speech signals. In addition, the system is focused on Russian-language speech material, unlike most analogs.
Distinctive features of the created speech frame are: the ability to take into account the emotional state of the speaker, sup-port for working with diseases of the speech-forming tract of speakers and the presence of manual segmentation of a num-ber of speech signals. In addition, the system is focused on Russian-language speech material, unlike most analogs.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
On spectral multiplicities {2, 4,..., 2^n} for totally ergodic Z^2-actions
Authors:
R. A. Konev,
V. V. Ryzhikov
Abstract:
For totally ergodic Z^2-actions a collection of weak limits provide the set {2,4, ..., 2 ^ n} of spectral multiplicities for their tensor product. Our conditions allow to obtain a similar result for mixing actions via some limit procedure.
For totally ergodic Z^2-actions a collection of weak limits provide the set {2,4, ..., 2 ^ n} of spectral multiplicities for their tensor product. Our conditions allow to obtain a similar result for mixing actions via some limit procedure.
△ Less
Submitted 20 December, 2012;
originally announced December 2012.