首页 > 最新文献

Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)最新文献

英文 中文
Multichannel Fast Affine Projection algorithm with Gradient Adaptive Step-Size and fast computation of adaptive filter output signal 基于梯度自适应步长的多通道快速仿射投影算法及自适应滤波输出信号的快速计算
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027094
V. Djigan
The paper presents a computational procedure of a multichannel Fast Affine Projection algorithm. The procedure also includes Sliding Window linear prediction, Gradient Adaptive Step-Size and fast computation of adaptive filter output signal. An example of the algorithm application in a combined Feed-Forward and Feed Backward Active Noise Control system, which can be viewed as a two-channel adaptive filter, and simulation results are discussed.
给出了一种多通道快速仿射投影算法的计算过程。该程序还包括滑动窗口线性预测、梯度自适应步长和自适应滤波器输出信号的快速计算。最后给出了该算法在一个可看作双通道自适应滤波器的前馈和后馈组合有源噪声控制系统中的应用实例,并对仿真结果进行了讨论。
{"title":"Multichannel Fast Affine Projection algorithm with Gradient Adaptive Step-Size and fast computation of adaptive filter output signal","authors":"V. Djigan","doi":"10.1109/EWDTS.2014.7027094","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027094","url":null,"abstract":"The paper presents a computational procedure of a multichannel Fast Affine Projection algorithm. The procedure also includes Sliding Window linear prediction, Gradient Adaptive Step-Size and fast computation of adaptive filter output signal. An example of the algorithm application in a combined Feed-Forward and Feed Backward Active Noise Control system, which can be viewed as a two-channel adaptive filter, and simulation results are discussed.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114521340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The levels of target resources development in computer systems 计算机系统中目标资源开发的水平
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027104
J. Drozd, A. Drozd, D. Maevsky, L. Shapa
The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.
本文考虑了表征计算机系统及其组成部分改进的资源开发水平。强调传统的资源参数矛盾随着水平的提高而消除。对设计通用化、专业化和绿色技术发展过程中计算机系统软硬件的发展水平进行了估计。
{"title":"The levels of target resources development in computer systems","authors":"J. Drozd, A. Drozd, D. Maevsky, L. Shapa","doi":"10.1109/EWDTS.2014.7027104","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027104","url":null,"abstract":"The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Modeling of MOSFETs parameters and volt-ampere characteristics in a wide temperature range for low noise amplifiers design 低噪声放大器设计中宽温度范围mosfet参数和伏安特性的建模
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027065
A. Pilipenko, V. Biryukov
The temperature dependencies of the basic parameters of MOSFETs in a temperature range 20 - 300 K are measured. The universal formal four-parametric model, which allows to approximate all experimental temperature dependencies with the relative error less than 1% is proposed. The hybrid analytical model efficiency for approximation of volt-ampere characteristics of MOSFETs is proved.
测量了mosfet基本参数在20 ~ 300k温度范围内的温度依赖性。提出了一种通用的形式四参数模型,该模型可以近似所有实验温度依赖关系,相对误差小于1%。证明了混合解析模型用于模拟mosfet伏安特性的有效性。
{"title":"Modeling of MOSFETs parameters and volt-ampere characteristics in a wide temperature range for low noise amplifiers design","authors":"A. Pilipenko, V. Biryukov","doi":"10.1109/EWDTS.2014.7027065","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027065","url":null,"abstract":"The temperature dependencies of the basic parameters of MOSFETs in a temperature range 20 - 300 K are measured. The universal formal four-parametric model, which allows to approximate all experimental temperature dependencies with the relative error less than 1% is proposed. The hybrid analytical model efficiency for approximation of volt-ampere characteristics of MOSFETs is proved.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"403 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Theory of bionic optimization and its application to evolutionary synthesis of digital devices 仿生优化理论及其在数字器件进化合成中的应用
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027058
S. Rodzin, L. Rodzina
Authors present developed basic elements of the general theory of bionic optimization, as well as original algorithms of structural and parametric synthesis of electronic devices. Experiments allowed us to establish the best parameters for the practical application of evolutionary synthesis algorithms, polynomial evaluation to confirm the time complexity of algorithms developed bionic optimization.
作者提出了仿生优化一般理论的基本要素,以及电子器件结构和参数综合的原始算法。实验让我们建立了适合实际应用的进化综合算法的最佳参数,多项式评估来确认所开发的仿生优化算法的时间复杂度。
{"title":"Theory of bionic optimization and its application to evolutionary synthesis of digital devices","authors":"S. Rodzin, L. Rodzina","doi":"10.1109/EWDTS.2014.7027058","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027058","url":null,"abstract":"Authors present developed basic elements of the general theory of bionic optimization, as well as original algorithms of structural and parametric synthesis of electronic devices. Experiments allowed us to establish the best parameters for the practical application of evolutionary synthesis algorithms, polynomial evaluation to confirm the time complexity of algorithms developed bionic optimization.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124642260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Set covering on the basis of the ant algorithm 在蚁群算法的基础上设置覆盖
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027073
B. Lebedev, O. Lebedev, E. Lebedeva
The set coverings problem using mathematical methods in which principles of natural mechanisms of solution-making are proposed. For compact representation of the set covering solution the matrix of boundary requirements is used. This allowed forming the space of solutions in which frameworks the search process which is based on simulation of adaptive ant colony behavior is organized. In comparison with existing algorithms improvement of results is reached.
用数学方法研究集覆盖问题,提出了集覆盖问题求解的自然机制原理。对于集合覆盖解的紧凑表示,使用边界要求矩阵。这允许形成解决方案的空间,其中框架的搜索过程是基于自适应蚁群行为的模拟组织。与现有算法相比,结果有所改进。
{"title":"Set covering on the basis of the ant algorithm","authors":"B. Lebedev, O. Lebedev, E. Lebedeva","doi":"10.1109/EWDTS.2014.7027073","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027073","url":null,"abstract":"The set coverings problem using mathematical methods in which principles of natural mechanisms of solution-making are proposed. For compact representation of the set covering solution the matrix of boundary requirements is used. This allowed forming the space of solutions in which frameworks the search process which is based on simulation of adaptive ant colony behavior is organized. In comparison with existing algorithms improvement of results is reached.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modified fast PCA algorithm on GPU architecture 改进了基于GPU架构的快速PCA算法
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027099
V. Melikyan, Hasmik Osipyan
Recognition task is a hard problem due to the high dimension of input image data. The principal component analysis (PCA) is the one of the most popular algorithms for reducing the dimensionality. The main constraint of PCA is the execution time in terms of updating when new data is included; therefore, parallel computation is needed. Opening the GPU architectures to general purpose computation allows performing parallel computation on a powerful platform. In this paper the modified version of fast PCA (MFPCA) algorithm is presented on the GPU architecture and also the suitability of the algorithm for face recognition task is discussed. The performance and efficiency of MFPCA algorithm is studied on large-scale datasets. Experimental results show a decrease of the MFPCA algorithm execution time while preserving the quality of the results.
由于输入图像数据的高维,识别任务是一个难题。主成分分析(PCA)是目前最常用的降维算法之一。PCA的主要约束是在包含新数据时更新的执行时间;因此,需要并行计算。将GPU架构开放给通用计算允许在一个强大的平台上执行并行计算。本文提出了基于GPU架构的改进版快速主成分分析(MFPCA)算法,并讨论了该算法在人脸识别任务中的适用性。在大规模数据集上研究了MFPCA算法的性能和效率。实验结果表明,在保证结果质量的前提下,减少了MFPCA算法的执行时间。
{"title":"Modified fast PCA algorithm on GPU architecture","authors":"V. Melikyan, Hasmik Osipyan","doi":"10.1109/EWDTS.2014.7027099","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027099","url":null,"abstract":"Recognition task is a hard problem due to the high dimension of input image data. The principal component analysis (PCA) is the one of the most popular algorithms for reducing the dimensionality. The main constraint of PCA is the execution time in terms of updating when new data is included; therefore, parallel computation is needed. Opening the GPU architectures to general purpose computation allows performing parallel computation on a powerful platform. In this paper the modified version of fast PCA (MFPCA) algorithm is presented on the GPU architecture and also the suitability of the algorithm for face recognition task is discussed. The performance and efficiency of MFPCA algorithm is studied on large-scale datasets. Experimental results show a decrease of the MFPCA algorithm execution time while preserving the quality of the results.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Active-mode leakage power optimization using state-preserving techniques 基于状态保持技术的有源模式泄漏功率优化
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027066
A. Korshunov, P. Volobuev
As technology sizes shrink, the developers come upon a problem of leakage currents. Among the different power reduction approaches there are power gating and clock gating, which can significantly eliminate (cut down) components of power consumption. The combined use of these approaches shows great promise. In fact, this good idea poses challenges due to some difficulties in practical integration. First, there is a need in additional control logic and timing overheads appear. Secondly, the flip-flops need to be shut down during active-mode without any loss in logic states. We examine different state-preserving techniques that can retain data of flip-flops during the power gating. All presenting techniques can achieve leakage reduction in active mode of operation for combined approach.
随着技术尺寸的缩小,开发人员遇到了泄漏电流的问题。在不同的功耗降低方法中,有功率门控和时钟门控,它们可以显着消除(降低)功耗组件。这些方法的结合使用显示出巨大的希望。事实上,由于在实际整合中存在一些困难,这个好想法带来了挑战。首先,需要额外的控制逻辑和时间开销。其次,触发器需要在活动模式下关闭而不丢失任何逻辑状态。我们研究了不同的状态保持技术,可以在电源门控期间保留触发器的数据。所有的技术都能在主动操作模式下达到减少泄漏的目的。
{"title":"Active-mode leakage power optimization using state-preserving techniques","authors":"A. Korshunov, P. Volobuev","doi":"10.1109/EWDTS.2014.7027066","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027066","url":null,"abstract":"As technology sizes shrink, the developers come upon a problem of leakage currents. Among the different power reduction approaches there are power gating and clock gating, which can significantly eliminate (cut down) components of power consumption. The combined use of these approaches shows great promise. In fact, this good idea poses challenges due to some difficulties in practical integration. First, there is a need in additional control logic and timing overheads appear. Secondly, the flip-flops need to be shut down during active-mode without any loss in logic states. We examine different state-preserving techniques that can retain data of flip-flops during the power gating. All presenting techniques can achieve leakage reduction in active mode of operation for combined approach.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Physical Social Systems - future of Ukraine 网络物理社会系统——乌克兰的未来
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027108
V. Hahanov, W. Gharibi, A. Kudin, I. Hahanov, Ngene Cristopher, Tiekura Yeve, Daria Krulevska, Anastasya Yerchenko, A. Mishchenko, Dmitry Shcherbin, A. Priymak
A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals. The cyber technology for human-free managing social resources (staff and finance) includes two cloud service: 1) the distribution of government contracts and finance between the structures, undertakings and entities, based on competition of their competence matrices for a given metric; 2) allocation of staff vacancies in scalable social groups based on competition of the competence matrices of applicants for a given metric. The competence metric is a measuring method of the distance between objects or processes based on the use of the parameter vector that defines the space or a competence matrix of a person or social group in real time. A competence matrix is a model of integrated activity and skills of a person or social group at a given metric and time interval. As an alternative solution of the problem it is considered a cyber physical system for managing human and financial resources (Cyber Social Systems - CSS), as a scalable cloud service, available to the social groups, government agencies, private companies and private individuals; it provides lifelong monitoring competencies of corresponding subjects in real time in order to carry out cyber staff management through appropriate career, moral and material incentives according to the results of their constructive activity. The cyber social system is focused on the total destruction of the corruption in the actions of managers at all levels by eliminating the subjectivity in the management of human and financial resources on the basis of the transfer of the official functions to independent cloud cyber service. The system consists of two interacting components: 1) accumulative monitoring of all kinds of human (social group) activity that generates a competence matrix in real-time; 2) the optimal management through career, moral and material incentives of individuals and social formations based on the analysis and rating of the corresponding competence matrices. A cyber system is based on the use of the following technologies: Big Data, Internet of Things, Smart Everything, parallel virtual processors and focused on serving individuals, government agencies and companies. For each subject two unique metrics of competencies are generated: 1) the gold standard of indexes for each category of professional activity; 2) the current competence matrix of the subjects filled in the process of their life, which are ranked by metrical comparison or evaluation of the results of work with standard or better values.
为乌克兰和世界的经济、社会和技术未来提出了一个根本性的解决方案。问题在于通过形成和实施国家计划来消除腐败,为数字监控技术过程和优化资源管理创造网络物理空间,以实现重要的社会目标。无人力管理社会资源(人员和财务)的网络技术包括两种云服务:1)基于给定指标的能力矩阵的竞争,在结构、企业和实体之间分配政府合同和财务;2)在可扩展的社会群体中分配工作人员空缺,这是基于给定指标下申请人能力矩阵的竞争。能力度量是利用实时定义一个人或社会群体的空间或能力矩阵的参数向量,对物体或过程之间的距离进行测量的方法。能力矩阵是一个人或社会群体在给定度量和时间间隔内的综合活动和技能的模型。作为问题的另一种解决方案,它被认为是管理人力和财务资源的网络物理系统(网络社会系统- CSS),作为一种可扩展的云服务,可供社会团体,政府机构,私营公司和个人使用;它提供相应科目的实时终身监测能力,以便根据其建设性活动的结果,通过适当的职业、道德和物质激励,开展网络工作人员管理。网络社会系统的重点是在将官方职能转移到独立的云网络服务的基础上,通过消除人力和财力管理中的主观性,彻底摧毁各级管理者行为中的腐败。该系统由两个相互作用的部分组成:1)对各种人类(社会群体)活动的累积监测,实时生成能力矩阵;(2)基于相应能力矩阵的分析和评级,通过个人和社会形态的职业、道德和物质激励进行最优管理。网络系统基于以下技术的使用:大数据、物联网、智能万物、并行虚拟处理器,并专注于为个人、政府机构和公司服务。对于每个学科,产生了两个独特的能力指标:1)每个专业活动类别的指标的黄金标准;(2)被试在其生活过程中填写的当前胜任力矩阵,通过对工作结果的标准或较优值的测量比较或评价来排名。
{"title":"Cyber Physical Social Systems - future of Ukraine","authors":"V. Hahanov, W. Gharibi, A. Kudin, I. Hahanov, Ngene Cristopher, Tiekura Yeve, Daria Krulevska, Anastasya Yerchenko, A. Mishchenko, Dmitry Shcherbin, A. Priymak","doi":"10.1109/EWDTS.2014.7027108","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027108","url":null,"abstract":"A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals. The cyber technology for human-free managing social resources (staff and finance) includes two cloud service: 1) the distribution of government contracts and finance between the structures, undertakings and entities, based on competition of their competence matrices for a given metric; 2) allocation of staff vacancies in scalable social groups based on competition of the competence matrices of applicants for a given metric. The competence metric is a measuring method of the distance between objects or processes based on the use of the parameter vector that defines the space or a competence matrix of a person or social group in real time. A competence matrix is a model of integrated activity and skills of a person or social group at a given metric and time interval. As an alternative solution of the problem it is considered a cyber physical system for managing human and financial resources (Cyber Social Systems - CSS), as a scalable cloud service, available to the social groups, government agencies, private companies and private individuals; it provides lifelong monitoring competencies of corresponding subjects in real time in order to carry out cyber staff management through appropriate career, moral and material incentives according to the results of their constructive activity. The cyber social system is focused on the total destruction of the corruption in the actions of managers at all levels by eliminating the subjectivity in the management of human and financial resources on the basis of the transfer of the official functions to independent cloud cyber service. The system consists of two interacting components: 1) accumulative monitoring of all kinds of human (social group) activity that generates a competence matrix in real-time; 2) the optimal management through career, moral and material incentives of individuals and social formations based on the analysis and rating of the corresponding competence matrices. A cyber system is based on the use of the following technologies: Big Data, Internet of Things, Smart Everything, parallel virtual processors and focused on serving individuals, government agencies and companies. For each subject two unique metrics of competencies are generated: 1) the gold standard of indexes for each category of professional activity; 2) the current competence matrix of the subjects filled in the process of their life, which are ranked by metrical comparison or evaluation of the results of work with standard or better values.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Discovering new indicators for botnet traffic detection 发现僵尸网络流量检测的新指标
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027100
A. Adamov, V. Hahanov, Anders Carlsson
Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[1] of users in such way. However, botnets continue existing despite numerous takedowns initiated by antivirus companies, Microsoft, FBI, Europol and others. In this paper we investigate existed methods of traffic detection represented mostly by IDS system and discover new indicators that can be utilized for improving botnet traffic detection. To do this we analyse the most prevalent backdoors communication protocols that stay behind of the popular botnets. As a result, we extracted new data that might be used in detection routines of IDS (Intrusion Detection System). An objective of the study is mining new indicators of compromise from botnet traffic and using them to identify cyber-attacks on IC. The analysis method assumes analysis of a communication protocol of the top botnet backdoors. The discovered results that can be used to improve detection of infected hosts in a local network are presented in this paper.
僵尸网络成为一种强大的网络武器,涉及全球数千万台受感染的计算机——“网络僵尸”。安全行业正在努力防止僵尸网络的传播,并以这种方式危及用户的个人网络空间(IC)[1]。然而,尽管反病毒公司、微软(Microsoft)、联邦调查局(FBI)、欧洲刑警组织(Europol)和其他机构发起了大量的打击行动,僵尸网络仍然存在。本文对以IDS系统为代表的现有流量检测方法进行了研究,并发现了可以用来改进僵尸网络流量检测的新指标。为此,我们分析了流行僵尸网络背后最流行的后门通信协议。结果,我们提取了新的数据,这些数据可能用于入侵检测系统的检测例程。该研究的目的是从僵尸网络流量中挖掘新的妥协指标,并使用它们来识别对IC的网络攻击。分析方法假设对顶级僵尸网络后门的通信协议进行分析。本文介绍了这些发现的结果,可以用来提高对本地网络中受感染主机的检测。
{"title":"Discovering new indicators for botnet traffic detection","authors":"A. Adamov, V. Hahanov, Anders Carlsson","doi":"10.1109/EWDTS.2014.7027100","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027100","url":null,"abstract":"Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[1] of users in such way. However, botnets continue existing despite numerous takedowns initiated by antivirus companies, Microsoft, FBI, Europol and others. In this paper we investigate existed methods of traffic detection represented mostly by IDS system and discover new indicators that can be utilized for improving botnet traffic detection. To do this we analyse the most prevalent backdoors communication protocols that stay behind of the popular botnets. As a result, we extracted new data that might be used in detection routines of IDS (Intrusion Detection System). An objective of the study is mining new indicators of compromise from botnet traffic and using them to identify cyber-attacks on IC. The analysis method assumes analysis of a communication protocol of the top botnet backdoors. The discovered results that can be used to improve detection of infected hosts in a local network are presented in this paper.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The linear logic synthesis of k-valued digital structures in the analogous circuitry basis k值数字结构在模拟电路基础上的线性逻辑综合
Pub Date : 2014-09-01 DOI: 10.1109/EWDTS.2014.7027070
N. Prokopenko, N. I. Chernov, V. Yugai
The non-classical (linear) approach to the logic synthesis of k-valued elements of computer engineering is considered. The method and fundamental principles of building of the circuitry basis, different from traditional ones, are described. The new circuit solutions of k-valued logical gates are suggested.
研究了计算机工程中k值元素逻辑综合的非经典(线性)方法。介绍了不同于传统电路基构建的方法和基本原理。提出了k值逻辑门的新电路方案。
{"title":"The linear logic synthesis of k-valued digital structures in the analogous circuitry basis","authors":"N. Prokopenko, N. I. Chernov, V. Yugai","doi":"10.1109/EWDTS.2014.7027070","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027070","url":null,"abstract":"The non-classical (linear) approach to the logic synthesis of k-valued elements of computer engineering is considered. The method and fundamental principles of building of the circuitry basis, different from traditional ones, are described. The new circuit solutions of k-valued logical gates are suggested.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1