Information technology



METHOD OF DETECTION OF PERIODIC PULSE SEQUENCES AND THEIR ESTIMATION THEIR PERIOD

The method makes it possible to provide synchronization pulses in the noise level when exposed to high noise factors, such as white noise and chaotic pulse train, a telegraph signal, the selection of the pulse signal of an additive mixture of noise, which can vary the amplitude of the signal due to the superposition of noise.
Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |


Method of protection assessment against leakage of information during its transfer to a digital form

The method enhances the accuracy of information security assessment when converting it from the analog to a digital form, transferring it into a digital form over digital transmission systems, as well as the further transformation of the digital signals into the analog form.
Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |


Software to improve the accuracy of the complex software and hardware «FILIN-A»

The method is based on the use of sophisticated measuring (linear frequency modulated) signal generated programmatically at the point of emanation of the measuring signal of low level at a high level of noise. Pre-treatment method of accumulation with direct and inverse Fourier transformation to reduce the threshold of chirp signals is used. To estimate the signal/noise ratio frequency-time processing of a chirp signal is applied. By means of the correlation theory of speech legibility calculation of all low-frequency channels on the basis of «FILIN-A» is carried out.
Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |


Method for estimation of security from leakage of a speech signal

It is intended for definition of degree of security of systems of transfer from leakage of speech information on several channels of leak.
Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology |


BUNDLED SOFTWARE FOR PRODUCTIVE AND RESEARCH USAGE «STEGANOPROCESSOR»

Bundled software is based on developed with bounds of Scientific Research Work №549/17 (Public Registration №20061227) algorithms for digital data into multimedia files embedding using different key schemes and set of algorithms for hidden messages detection in multimedia files that use file’s statistics analysis tools.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |


NEURAL NETWORK METHODS FOR FACE RECOGNITION TASK

Work of the system is based on use of neural networks, which allow to carry out correct identification even if there are age changes, emotions, glasses. It is the most important problem in face recognition.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Студент |


ALGORITHMS FOR CONSTRUCTION OF NEURAL NETWORK STRUCTURES FOR DETECTION AND RECOGNITION OF ATTACKS ON COMPUTER SYSTEMS

The goal of the researches is development of highly effective methods for detection and analysis of network intrusions on computer systems, capable to react on attacks in the real time and to find out unknown attacks. The scientific idea consists in generation and integration of various artificial neural networks in a single modular and/or multiagent intrusion detection system. Artificial neural networks have potential for solving different and difficult tasks from the domain of intrusion detection. Thus possessing the great flexibility and scalability capabilities, modular and multiagent neural networks become the effective tool in hands of a developer of computer security means.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |


THE ELECTRONIC ABSTRACT ON MICROSOFT EXCEL, WORD AND VBA WITH USE OF VIDEO-LESSONS

The essence consists that presented software product contains the directory in electronic form on key questions, a video-course and tests for self-checking.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Студент |


THE ELECTRONIC ABSTRACT ON MICROSOFT EXCEL, WORD AND VBA WITH USE OF VIDEO-LESSONS

The essence consists that presented software product contains the directory in electronic form on key questions, a video-course and tests for self-checking.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Студент |


SOFTWARE PLANGRAPH

The scheduling technique is grounded on GOST 25646-95 with definition of a volplaned annual operating time taking into account process of a strain ageing of construction equipment.

Просмотров сегодня: 0 | Просмотров всего: 0 | Категории: Information technology | Аспирант |
Syndicate content