Encoding algorithms of information objects in the code of conditional deductions
The possibilities of application of algorithms for encoding information objects in the code conditional deductions have been considered. Refs: 5 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Matov, O. Ya., Vasylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100311 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Method of adaptation of cascade codes to ensure reliability of information transmission of wireless data transmission systems
by: Zaitsev, Serhii V., et al.
Published: (2023)
by: Zaitsev, Serhii V., et al.
Published: (2023)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Semisimple group codes and dihedral codes
by: Dutra, Flaviana S., et al.
Published: (2018)
by: Dutra, Flaviana S., et al.
Published: (2018)
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
Formalization of the mathematical modeling process of adaptive change of code structure in wireless data transmission
by: Horlynskyi, Borys V., et al.
Published: (2019)
by: Horlynskyi, Borys V., et al.
Published: (2019)
On various parameters of \(\mathbb{Z}_q\)-simplex codes for an even integer \(q\)
by: Pandian, P. Chella, et al.
Published: (2015)
by: Pandian, P. Chella, et al.
Published: (2015)
Isodual and self-dual codes from graphs
by: Mallik, S., et al.
Published: (2021)
by: Mallik, S., et al.
Published: (2021)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Central and non central codes of dihedral 2-groups
by: Gupta, S., et al.
Published: (2022)
by: Gupta, S., et al.
Published: (2022)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Construction of self-dual binary \([2^{2k},2^{2k-1},2^k]\)-codes
by: Hannusch, Carolin, et al.
Published: (2016)
by: Hannusch, Carolin, et al.
Published: (2016)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
On the lattice of cyclic codes over finite chain rings
by: Fotue-Tabue, Alexandre, et al.
Published: (2019)
by: Fotue-Tabue, Alexandre, et al.
Published: (2019)
Satellite data in the substantiation and creation of objects of the Nature Reserve Fund and monitoring of their ecological condition
by: Lischenko, Lyidmila, et al.
Published: (2025)
by: Lischenko, Lyidmila, et al.
Published: (2025)
UNIVERSAL CODING SYSTEM FOR PALEONTOLOGICAL COLLECTIONS AS AN EFFECTIVE BASIS FOR CREATING A UNIFIED ELECTRONIC COLLECTIONS CATALOG AT THE INSTITUTE OF GEOLOGICAL SCIENCES OF THE NAS OF UKRAINE
by: Аністратенко, О.Ю., et al.
Published: (2022)
by: Аністратенко, О.Ю., et al.
Published: (2022)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
DRAFT OF THE UPDATED VERSION OF THE STRATIGRAPHIC CODE OF UKRAINE (2012) ON TYPES OF STRATIGRAPHIC SCALES AND SCHEMES, AS WELL AS RULES FOR THE PREPARATION AND APPROVAL OF STRATIGRAPHIC SCHEMES
by: Вернигорова, Ю.В.
Published: (2024)
by: Вернигорова, Ю.В.
Published: (2024)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Information systems of deciphering images using aerospace technologies
by: Maruschak, Vasyl M., et al.
Published: (2024)
by: Maruschak, Vasyl M., et al.
Published: (2024)
Localization of geological objects according to magnetometric data with application of algorithms of automated selection
by: Lapina, E.P., et al.
Published: (2016)
by: Lapina, E.P., et al.
Published: (2016)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Dynamic economic emission dispatch using whale optimization algorithm for multi-objective function
by: Mehdi , M. F., et al.
Published: (2021)
by: Mehdi , M. F., et al.
Published: (2021)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Similar Items
-
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016) -
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Method of adaptation of cascade codes to ensure reliability of information transmission of wireless data transmission systems
by: Zaitsev, Serhii V., et al.
Published: (2023)