Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027094
V. Djigan
The paper presents a computational procedure of a multichannel Fast Affine Projection algorithm. The procedure also includes Sliding Window linear prediction, Gradient Adaptive Step-Size and fast computation of adaptive filter output signal. An example of the algorithm application in a combined Feed-Forward and Feed Backward Active Noise Control system, which can be viewed as a two-channel adaptive filter, and simulation results are discussed.
{"title":"Multichannel Fast Affine Projection algorithm with Gradient Adaptive Step-Size and fast computation of adaptive filter output signal","authors":"V. Djigan","doi":"10.1109/EWDTS.2014.7027094","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027094","url":null,"abstract":"The paper presents a computational procedure of a multichannel Fast Affine Projection algorithm. The procedure also includes Sliding Window linear prediction, Gradient Adaptive Step-Size and fast computation of adaptive filter output signal. An example of the algorithm application in a combined Feed-Forward and Feed Backward Active Noise Control system, which can be viewed as a two-channel adaptive filter, and simulation results are discussed.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114521340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027104
J. Drozd, A. Drozd, D. Maevsky, L. Shapa
The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.
{"title":"The levels of target resources development in computer systems","authors":"J. Drozd, A. Drozd, D. Maevsky, L. Shapa","doi":"10.1109/EWDTS.2014.7027104","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027104","url":null,"abstract":"The paper considers the resource development levels characterizing the improvement of computer systems and their components. It stresses that the traditional contradictions in the parameters of resources are eliminated with the level increase. The development levels of computer system hardware and software in the processes of both design universalization and specialization and green technology development are estimated.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027065
A. Pilipenko, V. Biryukov
The temperature dependencies of the basic parameters of MOSFETs in a temperature range 20 - 300 K are measured. The universal formal four-parametric model, which allows to approximate all experimental temperature dependencies with the relative error less than 1% is proposed. The hybrid analytical model efficiency for approximation of volt-ampere characteristics of MOSFETs is proved.
{"title":"Modeling of MOSFETs parameters and volt-ampere characteristics in a wide temperature range for low noise amplifiers design","authors":"A. Pilipenko, V. Biryukov","doi":"10.1109/EWDTS.2014.7027065","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027065","url":null,"abstract":"The temperature dependencies of the basic parameters of MOSFETs in a temperature range 20 - 300 K are measured. The universal formal four-parametric model, which allows to approximate all experimental temperature dependencies with the relative error less than 1% is proposed. The hybrid analytical model efficiency for approximation of volt-ampere characteristics of MOSFETs is proved.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"403 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027058
S. Rodzin, L. Rodzina
Authors present developed basic elements of the general theory of bionic optimization, as well as original algorithms of structural and parametric synthesis of electronic devices. Experiments allowed us to establish the best parameters for the practical application of evolutionary synthesis algorithms, polynomial evaluation to confirm the time complexity of algorithms developed bionic optimization.
{"title":"Theory of bionic optimization and its application to evolutionary synthesis of digital devices","authors":"S. Rodzin, L. Rodzina","doi":"10.1109/EWDTS.2014.7027058","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027058","url":null,"abstract":"Authors present developed basic elements of the general theory of bionic optimization, as well as original algorithms of structural and parametric synthesis of electronic devices. Experiments allowed us to establish the best parameters for the practical application of evolutionary synthesis algorithms, polynomial evaluation to confirm the time complexity of algorithms developed bionic optimization.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124642260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027073
B. Lebedev, O. Lebedev, E. Lebedeva
The set coverings problem using mathematical methods in which principles of natural mechanisms of solution-making are proposed. For compact representation of the set covering solution the matrix of boundary requirements is used. This allowed forming the space of solutions in which frameworks the search process which is based on simulation of adaptive ant colony behavior is organized. In comparison with existing algorithms improvement of results is reached.
{"title":"Set covering on the basis of the ant algorithm","authors":"B. Lebedev, O. Lebedev, E. Lebedeva","doi":"10.1109/EWDTS.2014.7027073","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027073","url":null,"abstract":"The set coverings problem using mathematical methods in which principles of natural mechanisms of solution-making are proposed. For compact representation of the set covering solution the matrix of boundary requirements is used. This allowed forming the space of solutions in which frameworks the search process which is based on simulation of adaptive ant colony behavior is organized. In comparison with existing algorithms improvement of results is reached.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027099
V. Melikyan, Hasmik Osipyan
Recognition task is a hard problem due to the high dimension of input image data. The principal component analysis (PCA) is the one of the most popular algorithms for reducing the dimensionality. The main constraint of PCA is the execution time in terms of updating when new data is included; therefore, parallel computation is needed. Opening the GPU architectures to general purpose computation allows performing parallel computation on a powerful platform. In this paper the modified version of fast PCA (MFPCA) algorithm is presented on the GPU architecture and also the suitability of the algorithm for face recognition task is discussed. The performance and efficiency of MFPCA algorithm is studied on large-scale datasets. Experimental results show a decrease of the MFPCA algorithm execution time while preserving the quality of the results.
{"title":"Modified fast PCA algorithm on GPU architecture","authors":"V. Melikyan, Hasmik Osipyan","doi":"10.1109/EWDTS.2014.7027099","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027099","url":null,"abstract":"Recognition task is a hard problem due to the high dimension of input image data. The principal component analysis (PCA) is the one of the most popular algorithms for reducing the dimensionality. The main constraint of PCA is the execution time in terms of updating when new data is included; therefore, parallel computation is needed. Opening the GPU architectures to general purpose computation allows performing parallel computation on a powerful platform. In this paper the modified version of fast PCA (MFPCA) algorithm is presented on the GPU architecture and also the suitability of the algorithm for face recognition task is discussed. The performance and efficiency of MFPCA algorithm is studied on large-scale datasets. Experimental results show a decrease of the MFPCA algorithm execution time while preserving the quality of the results.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027066
A. Korshunov, P. Volobuev
As technology sizes shrink, the developers come upon a problem of leakage currents. Among the different power reduction approaches there are power gating and clock gating, which can significantly eliminate (cut down) components of power consumption. The combined use of these approaches shows great promise. In fact, this good idea poses challenges due to some difficulties in practical integration. First, there is a need in additional control logic and timing overheads appear. Secondly, the flip-flops need to be shut down during active-mode without any loss in logic states. We examine different state-preserving techniques that can retain data of flip-flops during the power gating. All presenting techniques can achieve leakage reduction in active mode of operation for combined approach.
{"title":"Active-mode leakage power optimization using state-preserving techniques","authors":"A. Korshunov, P. Volobuev","doi":"10.1109/EWDTS.2014.7027066","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027066","url":null,"abstract":"As technology sizes shrink, the developers come upon a problem of leakage currents. Among the different power reduction approaches there are power gating and clock gating, which can significantly eliminate (cut down) components of power consumption. The combined use of these approaches shows great promise. In fact, this good idea poses challenges due to some difficulties in practical integration. First, there is a need in additional control logic and timing overheads appear. Secondly, the flip-flops need to be shut down during active-mode without any loss in logic states. We examine different state-preserving techniques that can retain data of flip-flops during the power gating. All presenting techniques can achieve leakage reduction in active mode of operation for combined approach.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027108
V. Hahanov, W. Gharibi, A. Kudin, I. Hahanov, Ngene Cristopher, Tiekura Yeve, Daria Krulevska, Anastasya Yerchenko, A. Mishchenko, Dmitry Shcherbin, A. Priymak
A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals. The cyber technology for human-free managing social resources (staff and finance) includes two cloud service: 1) the distribution of government contracts and finance between the structures, undertakings and entities, based on competition of their competence matrices for a given metric; 2) allocation of staff vacancies in scalable social groups based on competition of the competence matrices of applicants for a given metric. The competence metric is a measuring method of the distance between objects or processes based on the use of the parameter vector that defines the space or a competence matrix of a person or social group in real time. A competence matrix is a model of integrated activity and skills of a person or social group at a given metric and time interval. As an alternative solution of the problem it is considered a cyber physical system for managing human and financial resources (Cyber Social Systems - CSS), as a scalable cloud service, available to the social groups, government agencies, private companies and private individuals; it provides lifelong monitoring competencies of corresponding subjects in real time in order to carry out cyber staff management through appropriate career, moral and material incentives according to the results of their constructive activity. The cyber social system is focused on the total destruction of the corruption in the actions of managers at all levels by eliminating the subjectivity in the management of human and financial resources on the basis of the transfer of the official functions to independent cloud cyber service. The system consists of two interacting components: 1) accumulative monitoring of all kinds of human (social group) activity that generates a competence matrix in real-time; 2) the optimal management through career, moral and material incentives of individuals and social formations based on the analysis and rating of the corresponding competence matrices. A cyber system is based on the use of the following technologies: Big Data, Internet of Things, Smart Everything, parallel virtual processors and focused on serving individuals, government agencies and companies. For each subject two unique metrics of competencies are generated: 1) the gold standard of indexes for each category of professional activity; 2) the current competence matrix of the subjects filled in the process of their life, which are ranked by metrical comparison or evaluation of the results of work with standard or better values.
{"title":"Cyber Physical Social Systems - future of Ukraine","authors":"V. Hahanov, W. Gharibi, A. Kudin, I. Hahanov, Ngene Cristopher, Tiekura Yeve, Daria Krulevska, Anastasya Yerchenko, A. Mishchenko, Dmitry Shcherbin, A. Priymak","doi":"10.1109/EWDTS.2014.7027108","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027108","url":null,"abstract":"A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals. The cyber technology for human-free managing social resources (staff and finance) includes two cloud service: 1) the distribution of government contracts and finance between the structures, undertakings and entities, based on competition of their competence matrices for a given metric; 2) allocation of staff vacancies in scalable social groups based on competition of the competence matrices of applicants for a given metric. The competence metric is a measuring method of the distance between objects or processes based on the use of the parameter vector that defines the space or a competence matrix of a person or social group in real time. A competence matrix is a model of integrated activity and skills of a person or social group at a given metric and time interval. As an alternative solution of the problem it is considered a cyber physical system for managing human and financial resources (Cyber Social Systems - CSS), as a scalable cloud service, available to the social groups, government agencies, private companies and private individuals; it provides lifelong monitoring competencies of corresponding subjects in real time in order to carry out cyber staff management through appropriate career, moral and material incentives according to the results of their constructive activity. The cyber social system is focused on the total destruction of the corruption in the actions of managers at all levels by eliminating the subjectivity in the management of human and financial resources on the basis of the transfer of the official functions to independent cloud cyber service. The system consists of two interacting components: 1) accumulative monitoring of all kinds of human (social group) activity that generates a competence matrix in real-time; 2) the optimal management through career, moral and material incentives of individuals and social formations based on the analysis and rating of the corresponding competence matrices. A cyber system is based on the use of the following technologies: Big Data, Internet of Things, Smart Everything, parallel virtual processors and focused on serving individuals, government agencies and companies. For each subject two unique metrics of competencies are generated: 1) the gold standard of indexes for each category of professional activity; 2) the current competence matrix of the subjects filled in the process of their life, which are ranked by metrical comparison or evaluation of the results of work with standard or better values.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027100
A. Adamov, V. Hahanov, Anders Carlsson
Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[1] of users in such way. However, botnets continue existing despite numerous takedowns initiated by antivirus companies, Microsoft, FBI, Europol and others. In this paper we investigate existed methods of traffic detection represented mostly by IDS system and discover new indicators that can be utilized for improving botnet traffic detection. To do this we analyse the most prevalent backdoors communication protocols that stay behind of the popular botnets. As a result, we extracted new data that might be used in detection routines of IDS (Intrusion Detection System). An objective of the study is mining new indicators of compromise from botnet traffic and using them to identify cyber-attacks on IC. The analysis method assumes analysis of a communication protocol of the top botnet backdoors. The discovered results that can be used to improve detection of infected hosts in a local network are presented in this paper.
{"title":"Discovering new indicators for botnet traffic detection","authors":"A. Adamov, V. Hahanov, Anders Carlsson","doi":"10.1109/EWDTS.2014.7027100","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027100","url":null,"abstract":"Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[1] of users in such way. However, botnets continue existing despite numerous takedowns initiated by antivirus companies, Microsoft, FBI, Europol and others. In this paper we investigate existed methods of traffic detection represented mostly by IDS system and discover new indicators that can be utilized for improving botnet traffic detection. To do this we analyse the most prevalent backdoors communication protocols that stay behind of the popular botnets. As a result, we extracted new data that might be used in detection routines of IDS (Intrusion Detection System). An objective of the study is mining new indicators of compromise from botnet traffic and using them to identify cyber-attacks on IC. The analysis method assumes analysis of a communication protocol of the top botnet backdoors. The discovered results that can be used to improve detection of infected hosts in a local network are presented in this paper.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/EWDTS.2014.7027070
N. Prokopenko, N. I. Chernov, V. Yugai
The non-classical (linear) approach to the logic synthesis of k-valued elements of computer engineering is considered. The method and fundamental principles of building of the circuitry basis, different from traditional ones, are described. The new circuit solutions of k-valued logical gates are suggested.
{"title":"The linear logic synthesis of k-valued digital structures in the analogous circuitry basis","authors":"N. Prokopenko, N. I. Chernov, V. Yugai","doi":"10.1109/EWDTS.2014.7027070","DOIUrl":"https://doi.org/10.1109/EWDTS.2014.7027070","url":null,"abstract":"The non-classical (linear) approach to the logic synthesis of k-valued elements of computer engineering is considered. The method and fundamental principles of building of the circuitry basis, different from traditional ones, are described. The new circuit solutions of k-valued logical gates are suggested.","PeriodicalId":272780,"journal":{"name":"Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}