?
ВЕРОЯТНОСТЬ ОШИБКИ КОНТРОЛЬНОЙ СУММЫ В СООБЩЕНИИ С ВОЗМОЖНЫМ ИСКАЖЕНИЕМ
Проблемы информационной безопасности. Компьютерные системы. 2019. № 3. С. 35-40.
Baranov A., Baranov P.
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums is related to message consistency control mechanisms which are implemented, in particular, in TCP protocol. Functional dependency of control sum error probability from value is acquired for latter’s low value.
Language:
Russian
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 4 С. 0-0
The paper considers error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers. Comparison of asymptotic representations of transmitted binary signal and for large transmitted block’s volume is presented in ...
Added: December 29, 2019
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Baranov P., Baranov A., Проблемы информационной безопасности. Компьютерные системы 2017 № 4
The article analyzes possibilities of errors in telecommunication protocols using packet data transmission. Probabilistic model of a prolonged-action additive interference is represented as a sequence of executions of independent interference blocks with definite length. The paper shows that in certain conditions concerning a polynomial of degree k, used for creation of CRC code, with block ...
Added: February 26, 2018
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2017 № 2 С. 39-45
The paper considers certain probability-theoretic models of packet mode-transferred information distortions. Attention is drawn mainly to distortions, including possible interferences influencing multiple transfer cycles. Distortions are modeled by a consequential impacts that are defined by dependent random variables. K-dimensioned values of CRC, respectively allow representation as a sum of k-dimensioned independent random variables.
In some cases ...
Added: September 11, 2017
Baranov A., Baranov P., Automatic Control and Computer Sciences 2017 Vol. 51 No. 8 P. 959-964
Some probability-theoretical models of packet-mode-transmitted information distortions have been considered. The main attention has been paid to distortions, including the possible interferences that affect several transmission cycles. Distortions are simulated by a sequence of impacts determined by dependent random variables. Correspondingly, k-dimensional CRC values also allow them to be represented as the sum of k-dimensional, differently distributed, ...
Added: February 18, 2019
М. : МИЭМ НИУ ВШЭ, 2014
В материалах конференции студентов, аспирантов и молодых специалистов НИУ ВШЭ представлены тезисы докладов по следующим направлениям: прикладная математика; информационно-коммуникационные технологии; автоматизация проектирования, банки данных и знаний, интеллектуальные системы; компьютерные образовательные продукты; информационная безопасность; электроника и приборостроение; производственные технологии, нанотехнологии и новые материалы; современные технологии дизайн проектирования; информационные технологии в экономике, бизнесе и инновационной деятельности.
Материалы конференции ...
Added: May 20, 2014
М. : МИЭМ НИУ ВШЭ, 2015
В материалах конференции студентов, аспирантов и молодых специалистов НИУ ВШЭ представлены тезисы докладов по следующим направлениям: прикладная математика; информационно-коммуникационные технологии; автоматизация проектирования, банки данных и знаний, интеллектуальные системы; компьютерные образовательные продукты; информационная безопасность; электроника и приборостроение; производственные технологии, нанотехнологии и новые материалы; современные технологии дизайн проектирования; информационные технологии в экономике, бизнесе и инновационной деятельности.
Материалы конференции ...
Added: February 13, 2015
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2016 № 1 С. 70-75
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. It is shown in research [1] that CRC value could be represented as a sum of special-way formed random vectors over k-dimension vector space GFk(2) over a two-element 0,1-field (GF(2)).If the message or errors are modeled using independent random ...
Added: December 5, 2015
Shvydun S., / Высшая школа экономики. Series WP7 "Математические методы анализа решений в экономике, бизнесе и политике". 2015. No. WP7/2015/07.
Two-stage superposition choice procedures, which sequentially apply two choice procedures so that the result of the first choice procedure is the input for the second choice procedure, are studied. We define which of them satisfy given normative conditions, showing how a final choice is changed due to the changes of preferences or a set of ...
Added: October 20, 2015
M. : Association of graduates and employees of AFEA named after prof. Zhukovsky, 2018
The materials of The International Scientific – Practical Conference is presented below.
The Conference reflects the modern state of innovation in education, science, industry and social-economic sphere, from the standpoint of introducing new information technologies.
It is interesting for a wide range of researchers, teachers, graduate students and professionals in the field of innovation and information technologies. ...
Added: May 24, 2018
М. : ИПУ РАН, 2014
Электронное издание является сборником материалов международной научно-практической конференции "Теория активных систем" (ТАС-2014) ...
Added: January 26, 2015
М. : Издательство РУДН, 2014
В трудах представлены материалы пленарных и секционных докладов участников Одиннадцатого международного симпозиума "Интеллектуальные системы".
Материалы, представленные в трудах симпозиума, отражают актуальные проблемы использования достижений в области управления, информационных технологий и вычислительной техники при разработке, создании и внедрении нового поколения систем обработки информации и управления - интеллектуальных систем. Приводятся результаты современного состояния исследований, тенденции и перспективы развития ...
Added: November 23, 2015
Akopov A. S., Beklaryan L. A., Thakur M. et al., Knowledge-Based Systems 2019 Vol. 174 P. 103-122
There is an ongoing evolution involving a new approach to large-scale optimisations based on co-evolutionary searches using interacting heterogeneous agent-processes via the implementation of synchronised genetic algorithms with local populations. The individualisation of heuristic operators at the level of agent-processes that implement independent evolutionary searches facilitate the improved likelihood of obtaining the best solutions in ...
Added: April 18, 2019
Koltsov S., Nikolenko S. I., Koltsova O., Письма в Журнал технической физики 2016 Т. 42 № 8 С. 837-839
A new variant of the method of probability density distribution recovery for solving topical modeling problems is described. Disadvantages of the Gibbs sampling algorithm are considered, and a modified
variant, called the “granulated sampling method,” is proposed. Based on the results of statistical modeling,
it is shown that the proposed algorithm is characterized by higher stability as ...
Added: July 26, 2016
Koltsov S., Physica A: Statistical Mechanics and its Applications 2018 Vol. 512 P. 1192-1204
This study proposes to minimize Rényi and Tsallis entropies for finding the optimal number of topics T in topic modeling (TM). A promising tool to obtain knowledge about large text collections, TM is a method whose properties are underresearched; in particular, parameter optimization in such models has been hindered by the use of monotonous quality ...
Added: October 11, 2018
Таганрог : Изд-во НОЦ ЗИС КТ Южного федерального университета, 2015
Сборник подготовлен по результатам проведения Всероссийской молодежной школы семинара «Актуальные проблемы информационных технологий, электроники и радиотехники - 2015» (ИТЭР - 2015). В сборник включены материалы лучших научных статей молодых ученых, аспирантов, магистрантов, студентов, сотрудников образовательных и научных организаций, участников всероссийской молодежной школы семинара «Актуальные проблемы информационных технологий, электроники и радиотехники – 2015». Всероссийская молодежная школа ...
Added: February 19, 2016
Yasnitsky L., Пермь : Пермский государственный национальный исследовательский университет. – Электронные данные. , 2020
The collection contains materials from the international conference "Intelligent systems in science and technology" and the Sixth all-Russian scientific and practical conference "Artificial intelligence in solving urgent social and economic problems of the XXI century", which was held on October 12-18, 2020 in Perm as part of the Perm natural science forum "Mathematics and global ...
Added: December 4, 2020
M. : HSE, 2014
The materials of The Third International Scientific-Practical Conference is presented below. The Conference reflects the modern state of innovation in education, science, industry and social-economic sphere, from the standpoint of introducing new information technologies.
Digest of Conference materials is presented in 3 parts. It is interesting for a wide range of researchers, teachers, graduate students and ...
Added: April 18, 2014
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
Kazan : -, 2013
The issue contains the papers presented at the 7th Spring/Summer Young Researchers' Соllоquium оn Software Engineering (SYRCoSE 2013) held in Kazan, Russia on 30th and З1st оf Мay, 2013. Paper selection was based on a competitive peer review process being done by the program committee. Both regular and reseаrсh-in-рrogrеss papers were соnsidered ассeрtable for the ...
Added: June 8, 2013
Babash A. V., М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
Fuad Aleskerov, Evgeny Mitichkin, Sergey Shvydun et al., Procedia Computer Science 2013 No. 17 P. 1121-1124
The paper examines a choice problem in case of large number of alternatives characterized by a set of criteria. Very often existing choice procedures cannot be used due to their computational complexity. In contrast, the approach proposed in this paper utilizes a set of easy to use techniques having complexity less than the quadratic. We ...
Added: June 7, 2013
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013