首页 > 最新文献

Collection of selected papers of the III International Conference on Information Technology and Nanotechnology最新文献

英文 中文
SoC opportunities for boosting SDR GNSS performance 提升SDR GNSS性能的SoC机会
A. Kumarin, I. Kudryavtsev
Software-defined-radio (SDR) becomes an attractive technique for the development of GNSS receivers due to universal hardware and high flexibility. However, the performance of signal processing can be a challenging task. Real-time mode implementation requires fast floating point calculations in several threads, not available for most part of embedded systems. This paper describes the system-on-chip based device drastically increasing computational performance. A summary of computational complexity of each stage of GNSS receiver is provided and several particular solutions are proposed.
软件无线电(SDR)以其硬件通用性和高灵活性成为GNSS接收机发展的热门技术。然而,信号处理的性能是一项具有挑战性的任务。实时模式的实现需要在多个线程中进行快速浮点计算,这在大多数嵌入式系统中是不可用的。本文描述了一种基于片上系统的器件,它能大幅提高计算性能。总结了GNSS接收机各级的计算复杂度,并提出了几种具体的解决方案。
{"title":"SoC opportunities for boosting SDR GNSS performance","authors":"A. Kumarin, I. Kudryavtsev","doi":"10.18287/1613-0073-2019-2416-457-462","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-457-462","url":null,"abstract":"Software-defined-radio (SDR) becomes an attractive technique for the development of GNSS receivers due to universal hardware and high flexibility. However, the performance of signal processing can be a challenging task. Real-time mode implementation requires fast floating point calculations in several threads, not available for most part of embedded systems. This paper describes the system-on-chip based device drastically increasing computational performance. A summary of computational complexity of each stage of GNSS receiver is provided and several particular solutions are proposed.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73357104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forecast of water-cut at wells under design by machine learning methods 利用机器学习方法预测设计井含水率
M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin
A large amount of data is generated during the operation of oil fields. Such data can be both data already interpreted by a specialist, or "raw” data obtained directly from the devices, both structured and not structured, or locally structured (that is, allowing for local analysis, but in such form not allowing analyzing in conjunction with other types of data). To obtain from such a set of more informative data that will allow making decisions in the course of field operation, it is necessary to involve specialists from different areas of the oil industry. Therefore, it is possible and necessary to use non-deterministic methods for analyzing the data obtained. The article discusses the use of machine learning methods in the task of determining the initial water-cut based on well logging data.
油田在生产过程中会产生大量的数据。这些数据既可以是专家已经解释的数据,也可以是直接从设备获得的“原始”数据,包括结构化和非结构化数据,也可以是本地结构化数据(即允许本地分析,但以这种形式不允许与其他类型的数据一起分析)。为了从这些数据中获得更多信息,以便在现场作业过程中做出决策,有必要让石油行业不同领域的专家参与进来。因此,使用非确定性方法来分析所获得的数据是可能的,也是必要的。本文讨论了机器学习方法在根据测井数据确定初始含水率任务中的应用。
{"title":"Forecast of water-cut at wells under design by machine learning methods","authors":"M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin","doi":"10.18287/1613-0073-2019-2416-510-520","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-510-520","url":null,"abstract":"A large amount of data is generated during the operation of oil fields. Such data can be both data already interpreted by a specialist, or \"raw” data obtained directly from the devices, both structured and not structured, or locally structured (that is, allowing for local analysis, but in such form not allowing analyzing in conjunction with other types of data). To obtain from such a set of more informative data that will allow making decisions in the course of field operation, it is necessary to involve specialists from different areas of the oil industry. Therefore, it is possible and necessary to use non-deterministic methods for analyzing the data obtained. The article discusses the use of machine learning methods in the task of determining the initial water-cut based on well logging data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78671682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying doubly stochastic filters to evaluate the dynamics of object sizes on satellite image sequences 应用双随机滤波器评估卫星图像序列中目标尺寸的动态变化
V. Dementyev, D. Kondratyev
One of the important tasks facing the regional authorities is to monitor the condition of roads and power lines. In the Ulyanovsk region more than 8 thousand km of power lines and more than 9 thousand km of roads (including rural). A significant part of these facilities is located outside the settlements in places with medium and low availability. In many such places there is a problem of uncontrolled forest overgrowth. This work is devoted to solving the problem of automated satellite monitoring of such areas. For this purpose, it is proposed to use a modified convolutional neural network that processes time sequences of multispectral satellite images and allows to allocate territories occupied by forest and undergrowth with high accuracy. This approach allows us to assess the dynamics of overgrowth of the territory and perform the appropriate forecast with sufficient accuracy for practice.
地区当局面临的重要任务之一是监测道路和电力线的状况。在乌里扬诺夫斯克地区有8000多公里的输电线和9000多公里的公路(包括农村)。这些设施的很大一部分位于定居点以外的中等和低可利用性的地方。在许多这样的地方存在着不受控制的森林过度生长的问题。这项工作致力于解决这些地区的自动卫星监测问题。为此,提出了一种改进的卷积神经网络,该网络对多光谱卫星图像的时间序列进行处理,可以高精度地分配森林和灌木占用的区域。这种方法使我们能够评估该地区过度生长的动态,并为实践提供足够准确的适当预测。
{"title":"Applying doubly stochastic filters to evaluate the dynamics of object sizes on satellite image sequences","authors":"V. Dementyev, D. Kondratyev","doi":"10.18287/1613-0073-2019-2391-54-59","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-54-59","url":null,"abstract":"One of the important tasks facing the regional authorities is to monitor the condition of roads and power lines. In the Ulyanovsk region more than 8 thousand km of power lines and more than 9 thousand km of roads (including rural). A significant part of these facilities is located outside the settlements in places with medium and low availability. In many such places there is a problem of uncontrolled forest overgrowth. This work is devoted to solving the problem of automated satellite monitoring of such areas. For this purpose, it is proposed to use a modified convolutional neural network that processes time sequences of multispectral satellite images and allows to allocate territories occupied by forest and undergrowth with high accuracy. This approach allows us to assess the dynamics of overgrowth of the territory and perform the appropriate forecast with sufficient accuracy for practice.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78551433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double stochastic wave models of multidimensional random fields 多维随机场的双随机波模型
V. Krasheninnikov, A. Subbotin
The paper deals with the development of mathematical models of random fields to describe and simulate images. In the wave model, a random field is the result of the influence of perturbations (waves) that occur at random times in random places and have random shapes. This model allows representing and simulate isotropic and anisotropic images (and their temporal sequences) defined on arbitrary areas of multidimensional space, as well as on any surfaces. The problems of correlation analysis and synthesis can be relatively easily solved. However, this model allows representing only homogeneous fields. In this paper, we consider «double stochastic» wave models, when the first wave random field (control field) sets the parameters of the second (controlled field). As a result, the controlled field becomes nonuniform, since its parameters vary randomly. We also consider options when two fields mutually influence each other. These models allow us to represent and simulate multidimensional inhomogeneous images (and their temporal sequences), as well as systems of such images with mutual correlations.
本文讨论了用于描述和模拟图像的随机场数学模型的发展。在波动模型中,随机场是在随机时间、随机地点和具有随机形状的扰动(波)影响的结果。该模型允许在多维空间的任意区域以及任何表面上表示和模拟各向同性和各向异性图像(及其时间序列)。相关分析和综合的问题相对容易解决。然而,这个模型只允许表示同构字段。在本文中,我们考虑“双随机”波模型,当第一波随机场(控制场)设置第二波随机场(控制场)的参数。由于控制场的参数是随机变化的,因此控制场变得不均匀。当两个领域相互影响时,我们也会考虑备选方案。这些模型允许我们表示和模拟多维非均匀图像(及其时间序列),以及具有相互相关性的这些图像的系统。
{"title":"Double stochastic wave models of multidimensional random fields","authors":"V. Krasheninnikov, A. Subbotin","doi":"10.18287/1613-0073-2019-2391-41-47","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-41-47","url":null,"abstract":"The paper deals with the development of mathematical models of random fields to describe and simulate images. In the wave model, a random field is the result of the influence of perturbations (waves) that occur at random times in random places and have random shapes. This model allows representing and simulate isotropic and anisotropic images (and their temporal sequences) defined on arbitrary areas of multidimensional space, as well as on any surfaces. The problems of correlation analysis and synthesis can be relatively easily solved. However, this model allows representing only homogeneous fields. In this paper, we consider «double stochastic» wave models, when the first wave random field (control field) sets the parameters of the second (controlled field). As a result, the controlled field becomes nonuniform, since its parameters vary randomly. We also consider options when two fields mutually influence each other. These models allow us to represent and simulate multidimensional inhomogeneous images (and their temporal sequences), as well as systems of such images with mutual correlations.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82102451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining the proximity of groups in social networks based on text analysis using big data 基于使用大数据的文本分析来确定社交网络中群体的接近度
A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh
The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.
本文致力于对社交网络中此类群体的定义。选取数据社交网络Vk作为研究对象。对文本数据进行收集、处理和分析。为了解决获取必要信息的问题,对社交网络Vk的数据收集优化领域进行了研究。已经开发了一种软件工具,用于从指定资源中收集和后续处理必要的数据。研究和应用了现有的文本分析算法,主要是大容量文本分析算法。
{"title":"Determining the proximity of groups in social networks based on text analysis using big data","authors":"A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh","doi":"10.18287/1613-0073-2019-2416-521-526","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-521-526","url":null,"abstract":"The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82339525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The implementation of ”Kuznyechik” encryption algorithm using NVIDIA CUDA technology 采用NVIDIA CUDA技术实现“Kuznyechik”加密算法
A. Borisov, E. Myasnikov
In this paper, we discuss various options for implementing the ”Kuznyechik” block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor.
在本文中,我们讨论了使用NVIDIA CUDA技术实现“Kuznyechik”块加密算法的各种选项。我们使用查找表作为实现的基础。在实验中,我们研究了线程块大小和查找表位置对加密速度的影响。我们表明,当查找表存储在全局内存中时,可以获得最佳结果。在NVIDIA GeForce GTX 1070图形处理器上,峰值加密速度达到30.83 Gbps。
{"title":"The implementation of ”Kuznyechik” encryption algorithm using NVIDIA CUDA technology","authors":"A. Borisov, E. Myasnikov","doi":"10.18287/1613-0073-2019-2416-308-313","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-308-313","url":null,"abstract":"In this paper, we discuss various options for implementing the ”Kuznyechik” block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forecasting using predictor selection from a large set of highly correlated variables 从大量高度相关的变量中选择预测器进行预测
A. Timofeeva, Y. Mezentsev
The potential of correlation-based feature selection has been explored in selecting an optimal subset from a set of highly correlated predictors. This problem occurs, for example, in time series forecasting of economic indicators using regression models on multiple lags of a large number of candidate leading indicators. Greedy algorithms (forward selection and backward elimination) in such cases fail. To obtain the globally optimal solution, the feature selection problem is formulated as a mixed integer programming problem. To solve it, we use the binary cut-and-branch method. The results of simulation studies demonstrate the advantage of using the binary cut-and-branch method in comparison with heuristic search algorithms. The real example of the selection of leading indicators of consumer price index growth shows the acceptability of using the correlation-based feature selection method.
在从一组高度相关的预测因子中选择最优子集方面,探索了基于关联的特征选择的潜力。例如,在使用回归模型对大量候选领先指标的多重滞后进行经济指标的时间序列预测时,就会出现这个问题。贪婪算法(前向选择和后向消除)在这种情况下失败。为了获得全局最优解,将特征选择问题表述为一个混合整数规划问题。为了解决这个问题,我们使用了二元分割和分支方法。仿真研究结果表明,与启发式搜索算法相比,二元分割分支算法具有明显的优越性。以居民消费价格指数增长先行指标选择为例,说明了基于相关性的特征选择方法的可接受性。
{"title":"Forecasting using predictor selection from a large set of highly correlated variables","authors":"A. Timofeeva, Y. Mezentsev","doi":"10.18287/1613-0073-2019-2416-10-18","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-10-18","url":null,"abstract":"The potential of correlation-based feature selection has been explored in selecting an optimal subset from a set of highly correlated predictors. This problem occurs, for example, in time series forecasting of economic indicators using regression models on multiple lags of a large number of candidate leading indicators. Greedy algorithms (forward selection and backward elimination) in such cases fail. To obtain the globally optimal solution, the feature selection problem is formulated as a mixed integer programming problem. To solve it, we use the binary cut-and-branch method. The results of simulation studies demonstrate the advantage of using the binary cut-and-branch method in comparison with heuristic search algorithms. The real example of the selection of leading indicators of consumer price index growth shows the acceptability of using the correlation-based feature selection method.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90634253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of vision systems to improve the effectiveness of monitoring compliance with technical safety requirements at industrial facilities 应用视觉系统,提高监察工业设施是否符合技术安全规定的效率
A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov
According to the Federal State Statistics Service for 2017, over 25,000 injuries at work were registered in Russia, of which 1,138 were fatal. Studies have shown that most of the injuries in the workplace due to non-compliance with technical safety rules, namely the lack of personal protective equipment or their improper use. To improve the efficiency of monitoring compliance with the rules of technical safety at industrial facilities, this paper discusses the use of vision systems for automatic control of the availability of personal protective equipment at workers in the area of industrial work.
根据联邦国家统计局2017年的数据,俄罗斯登记的工伤事故超过2.5万起,其中1138起是致命的。研究表明,工作场所的大多数伤害是由于不遵守技术安全规则,即缺乏个人防护装备或使用不当。为了提高监测工业设施技术安全规则遵守情况的效率,本文讨论了在工业工作领域使用视觉系统自动控制工人个人防护设备的可用性。
{"title":"Application of vision systems to improve the effectiveness of monitoring compliance with technical safety requirements at industrial facilities","authors":"A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov","doi":"10.18287/1613-0073-2019-2391-318-325","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-318-325","url":null,"abstract":"According to the Federal State Statistics Service for 2017, over 25,000 injuries at work were registered in Russia, of which 1,138 were fatal. Studies have shown that most of the injuries in the workplace due to non-compliance with technical safety rules, namely the lack of personal protective equipment or their improper use. To improve the efficiency of monitoring compliance with the rules of technical safety at industrial facilities, this paper discusses the use of vision systems for automatic control of the availability of personal protective equipment at workers in the area of industrial work.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection system on the basis of data mining algorithms in the industrial network 基于数据挖掘算法的入侵检测系统在工业网络中的应用
M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov
The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.
本工作的目的是基于智能网络流量分析算法来提高工业网络自动化过程控制系统的安全性。分析了某企业工业网络中对自动化过程控制系统实施网络攻击时,违反者的行为检测和记录问题。提出了工业控制系统工业网络监控系统的结构和功能模型。开发了一种算法,用于对工业协议的网络流量进行智能分析,并开发了一个软件包,该软件包将所提出的算法作为监控系统的一部分,以评估所提出的解决方案对现场数据的有效性。
{"title":"Intrusion detection system on the basis of data mining algorithms in the industrial network","authors":"M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov","doi":"10.18287/1613-0073-2019-2416-553-565","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-553-565","url":null,"abstract":"The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90149794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of spam using email signatures 使用电子邮件签名检测垃圾邮件
E. Sharapova, R. Sharapov
Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.
目前,不需要的电子邮件被积极地发送到互联网上。数百万份电子邮件同时发送给不同的用户。通常,电子邮件会经过微小的修改,从而使垃圾邮件的检测变得复杂。本文提出了确定电子邮件签名的选项,这些选项允许识别具有相同内容和结构的信件。信件的内容签名包括电子邮件文本中的基本短语,但姓名,数字代码,字典中未包含的可疑单词除外。结构签名包含相同类型的电子邮件,例如段落、表格、图像。本文给出了利用签名检测垃圾邮件的结果。
{"title":"Detection of spam using email signatures","authors":"E. Sharapova, R. Sharapov","doi":"10.18287/1613-0073-2019-2416-165-172","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-165-172","url":null,"abstract":"Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88378566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Collection of selected papers of the III International Conference on Information Technology and Nanotechnology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1