?
О возможном развитии метода извлечения данных для восстановления файлов формата JPEG
Безопасность информационных технологий. 2013. № 4. С. 97-100.
A possible application of the author’s method of differentiation of clusters belonging to JPEG files from other clusters on the digital media for expanding of existing data recovery methods is described in the work. The decrease in the number of operations needed to reach the correct result is estimated. A way of using described method for automated improvement of data carving results is considered.
Sorokin A., Промышленные АСУ и контроллеры 2013 № 3 С. 54-57
The scheme of sequence of the actions applied to data recovery from digital media as viewed by the author is provided in the first part of this article. Situations at which data recovery can be performed with no diffi culties are specifi ed in this scheme, along with the situations at which data recovery is ...
Added: April 1, 2013
Костылова Н. А., Sorokin A., Безопасность информационных технологий 2014 № 4 С. 53-59
The results of the experimental attempts of elaboration of the previously proposed method for identifying clusters belonging to JPEG files are described. Type II errors rates for different file formats are estimated. The possible ways of their improvement for some file formats are offered. ...
Added: October 23, 2014
Sorokin A., Проблемы информационной безопасности. Компьютерные системы 2012 № 4 С. 61-67
An approach to differentiation of clusters belonging to jpeg files from other clusters on the digital media is described in the following work. The approach is based on building of signatures for former search in clusters in question. Possible applications of described method are discussed. ...
Added: April 1, 2013
Rogacheva O., Промышленные АСУ и контроллеры 2021 № 2 С. 41-50
Целью работы является исследование методов идентификации отдельно взятых фрагментов компьютерных файлов и разработка процедуры восстановления фрагментированных файлов формата JPEG. Разработанный метод позволяет определить принадлежность фрагмента файла к указанному формату и тем самым выявить лишние (чужеродные) фрагменты в файле. Данный метод может применяться, в том числе, и в задачах восстановления файлов данного формата. Необходимость восстановления данных ...
Added: July 19, 2021
Evsyutin O., Kokurina A., Мещеряков Р. В., Journal of Decision Systems 2018 Vol. 27 No. sup1 P. 256-264
In the presented research, the decision support in order to increase the efficiency of providing confidentiality of information with the use of methods of digital steganography is considered. These methods allow one to secretly transmit confidential information using various digital objects. When hiding information with the use of steganography, digital images are often used, among ...
Added: September 3, 2019
Evsyutin O., Шелупанов А. А., Мещеряков Р. В. et al., Компьютерная оптика 2017 Т. 41 № 3 С. 412-421
In the paper, we consider a particular direction of digital steganography — information embedding into the compressed JPEG images. A scheme of information embedding based on procedures of DCT-coefficients replacement is introduced. Variants of the scheme algorithmic implementation are offered and investigated. A genetic algorithm is used for the improvement of the embedding quality. The ...
Added: September 4, 2019
Chernyshev S. V., Cherepanov E. A., Pankratiev E. V. et al., Journal of Mathematical Sciences 2005 Vol. 128 No. 6 P. 3487-3495
Added: January 27, 2014
Skoptsov K. A., Sheshenin S., Galatenko V. V. et al., International Journal of Applied Mechanics 2016 Vol. 8 No. 2 P. 1650016-01-1650016-18
We present a method for evaluating elastic properties of a composite material produced by molding a resin filled with short elastic fibers. A flow of the filled resin is simulated numerically using a mesh-free method. After that, assuming that spatial distribution and orientation of fibers are not significantly changed during polymerization, effective elastic moduli of ...
Added: May 22, 2016
Malyshev D., Discrete Mathematics 2015 Vol. 338 No. 11 P. 1860-1865
We completely determine the complexity status of the 3-colorability problem for hereditary graph classes defined by two forbidden induced subgraphs with at most five vertices. ...
Added: April 7, 2014
Springer, 2012
Added: January 29, 2013
Sotnikova S., Динамика сложных систем 2012 № 3 С. 84-87
In article is described designed programme complex of the physical processes modeling, which also allows to conduct the identification printed node parameters (the physical model). On printed node designed the on-board secondary power supply source is realized. For it are designed relationship interfaces of controlling program with the known program of modeling and optimization. ...
Added: December 5, 2014
Chuprikov P., Nikolenko S. I., Davydow A. et al., IEEE Transactions on Networking 2018 Vol. 26 No. 1 P. 342-355
Modern network elements are increasingly required to deal with heterogeneous traffic. Recent works consider processing policies for buffers that hold packets with different processing requirements (number of processing cycles needed before a packet can be transmitted out) but uniform value, aiming to maximize the throughput, i.e., the number of transmitted packets. Other developments deal with ...
Added: March 14, 2018
Karpov V. E., Karpova I. P., Procedia Engineering 2015 Vol. 100 P. 1459-1468
Work solutions are proposed for problems of leader definition and role distribution in homogeneous groups of robots. It is shown that transition from a swarm to a collective of robots with hierarchical organization is possible using exclusively local interaction. The local revoting algorithm is central to the procedure for choice of leader while redistribution of roles can ...
Added: March 14, 2015
М. : Издательский центр «Российский государственный гуманитарный университет», 2019
Сборник включает 27 докладов международной конференции по компьютерной лингвистике и интеллектуальным технологиям «Диалог 2019», не вошедшие в ежегодник «Компьютерная лингвистика и интеллектуальные технологии», но рекомендованные Программным Комитетом к представлению на конференции. Для специалистов в области теоретической и прикладной лингвистики и интеллектуальных технологий. ...
Added: December 10, 2019
Beklemishev L. D., Оноприенко А. А., Математический сборник 2015 Т. 206 № 9 С. 3-20
We formulate some term rewriting systems in which the number of computation steps is finite for each output, but this number cannot be bounded by a provably total computable function in Peano arithmetic PA. Thus, the termination of such systems is unprovable in PA. These systems are derived from an independent combinatorial result known as the Worm ...
Added: March 13, 2016
Bliznets Ivan, Cygan M., Komosa P. et al., ACM Transactions on Computation Theory 2018 Vol. 10 No. 2 P. 1-32
The H-free Edge Deletion problem asks, for a given graph G and integer k, whether it is possible to delete at most k edges from G to make it H-free—that is, not containing H as an induced subgraph. The H-free Edge Completion problem is defined similarly, but we add edges instead of deleting them. The study of these two problem families has recently been the subject of intensive studies from the point of ...
Added: October 30, 2018
Toldova S., Azerkovich I., Гришина Ю. et al., / НИУ ВШЭ. Series WP BRP "Linguistics". 2015.
Building benchmark corpora in the domain of coreference and anaphora resolution is an important task for developing and evaluating NLP systems and models. Our study is aimed at assessing the feasibility of enhancing corpora with information about coreference relations. The annotation procedure includes identification of text segments that are subjects to annotation (markables), marking their ...
Added: December 15, 2015
Vyalyi M., Дискретная математика 1991 Т. 3 № 3 С. 35-45
Added: October 17, 2014
Shuranov E., / Cornell University. Series Computer Science "arxiv.org". 2021.
Text encodings from automatic speech recognition (ASR) transcripts and audio representations have shown promise in speech emotion recognition (SER) ever since. Yet, it is challenging to explain the effect of each information stream on the SER systems. Further, more clarification is required for analysing the impact of ASR's word error rate (WER) on linguistic emotion ...
Added: February 14, 2023
Gostev I. M., М. : Юрайт, 2016
В настоящее время компьютерные науки стремительно развиваются. Новые версии операционных систем появляются каждые полтора-два года, поэтому было принято решение о включении в данную книгу такого материала, который не будет устаревать. Содержание учебника представляет собой некоторые наиболее общие принципы построения операционных систем, которые были разработаны более 50 лет назад и практически не изменились за прошедшее время. ...
Added: October 13, 2009
Borchmann D., Hanika T., Obiedkov S., Discrete Applied Mathematics 2020 Vol. 273 P. 30-42
We propose an algorithm for learning the Horn envelope of an arbitrary domain using an expert, or an oracle, capable of answering certain types of queries about this domain. Attribute exploration from formal concept analysis is a procedure that solves this problem, but the number of queries it may ask is exponential in the size ...
Added: October 29, 2019
Каз. : Издательство «Фэн» Академии наук Республики Татарстан, 2013
Материалы и доклады Шестой Всероссийской научно-практической конференции по имитацонному моделированию и его применению в науке и промышленности. ...
Added: December 14, 2013
Goncharov R., Сапанов П. М., Яшунский А. Д., Социология власти 2013 № 3 С. 57-72
В статье представлена технология, позволяющая собирать в полевых исследованиях пространственно локализованные данные об объектах городской среды. Технология основана на автоматической привязке фотографий к пространственным координатам. Приведен план полевых и камеральных мероприятий, предложены варианты ГИС-обработки собираемых таким образом данных. В качестве примера приведены данные об использовании белорусского языка в общественном пространстве городов Белоруссии. ...
Added: April 12, 2015
Baibikova T., Domoratsky E., Вестник Московского финансово-юридического университета 2017 № 1 С. 200-206
Some questions of scientific visualization are under consideration in this paper. This article also discusses the peculiarities of application of cognitive computer graphics, singles out a range of tasks of scientific visualization. The paper gives a brief overview of modern support tools for program visualization, tendencies of their development and their main characteristics. A module ...
Added: June 10, 2017