Encoding algorithms of information objects in the code of conditional deductions
The possibilities of application of algorithms for encoding information objects in the code conditional deductions have been considered. Refs: 5 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Matov, O. Ya., Vasylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100311 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Method of adaptation of cascade codes to ensure reliability of information transmission of wireless data transmission systems
by: Zaitsev, Serhii V., et al.
Published: (2023)
by: Zaitsev, Serhii V., et al.
Published: (2023)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Formalization of the mathematical modeling process of adaptive change of code structure in wireless data transmission
by: Horlynskyi, Borys V., et al.
Published: (2019)
by: Horlynskyi, Borys V., et al.
Published: (2019)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Constructive-synthesizing modeling of the genetic algorithm chromosomes with encoded sorting algorithms
by: Shinkarenko, V.I., et al.
Published: (2025)
by: Shinkarenko, V.I., et al.
Published: (2025)
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
On various parameters of \(\mathbb{Z}_q\)-simplex codes for an even integer \(q\)
by: Pandian, P. Chella, et al.
Published: (2015)
by: Pandian, P. Chella, et al.
Published: (2015)
Semisimple group codes and dihedral codes
by: Dutra, Flaviana S., et al.
Published: (2018)
by: Dutra, Flaviana S., et al.
Published: (2018)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
The use of ontological knowledge for multi-criteria comparison of complex information objects
by: Rogushina, J.V., et al.
Published: (2023)
by: Rogushina, J.V., et al.
Published: (2023)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: V. S. Vasylenko, et al.
Published: (2017)
by: V. S. Vasylenko, et al.
Published: (2017)
Isodual and self-dual codes from graphs
by: Mallik, S., et al.
Published: (2021)
by: Mallik, S., et al.
Published: (2021)
Use of thesauruses for search of complex information objects on Web on the basis of ontologies
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
Central and non central codes of dihedral 2-groups
by: Gupta, S., et al.
Published: (2022)
by: Gupta, S., et al.
Published: (2022)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
UNIVERSAL CODING SYSTEM FOR PALEONTOLOGICAL COLLECTIONS AS AN EFFECTIVE BASIS FOR CREATING A UNIFIED ELECTRONIC COLLECTIONS CATALOG AT THE INSTITUTE OF GEOLOGICAL SCIENCES OF THE NAS OF UKRAINE
by: Аністратенко, О.Ю., et al.
Published: (2022)
by: Аністратенко, О.Ю., et al.
Published: (2022)
Construction of self-dual binary \([2^{2k},2^{2k-1},2^k]\)-codes
by: Hannusch, Carolin, et al.
Published: (2016)
by: Hannusch, Carolin, et al.
Published: (2016)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
DRAFT OF THE UPDATED VERSION OF THE STRATIGRAPHIC CODE OF UKRAINE (2012) ON TYPES OF STRATIGRAPHIC SCALES AND SCHEMES, AS WELL AS RULES FOR THE PREPARATION AND APPROVAL OF STRATIGRAPHIC SCHEMES
by: Вернигорова, Ю.В.
Published: (2024)
by: Вернигорова, Ю.В.
Published: (2024)
Software and information simulation complex of multinode integrated and autonomous power and heat supply systems
by: Denysov, Viktor, et al.
Published: (2023)
by: Denysov, Viktor, et al.
Published: (2023)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
The proof-structure of the transcendental deduction of categories
by: Yu. Fedorchenko
Published: (2015)
by: Yu. Fedorchenko
Published: (2015)
Estimates for information quantity in probability model in image encoding
by: Tyrygin, I. Ya., et al.
Published: (1995)
by: Tyrygin, I. Ya., et al.
Published: (1995)
Deductive verification of requirements for event-driven architecture
by: Letichevsky, A.A., et al.
Published: (2025)
by: Letichevsky, A.A., et al.
Published: (2025)
Deductive verification of requirements for event-driven architecture
by: A. Letichevsky, et al.
Published: (2013)
by: A. Letichevsky, et al.
Published: (2013)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
A tool to measure Fortran source code metrics using syntax analysis
by: Pokrovskyi, A.M.
Published: (2021)
by: Pokrovskyi, A.M.
Published: (2021)
Similar Items
-
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016) -
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Method of adaptation of cascade codes to ensure reliability of information transmission of wireless data transmission systems
by: Zaitsev, Serhii V., et al.
Published: (2023) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)