The problem of automatic prediction of a certain class of deterministic signals is considered. Such problems arise both in the theory of automatic control and in various applications ...
COMPRESSION OF ENCRYPTED AND HIDDEN DATA. FIXING THE AVERAGE TIME WHEN PERFORMING THE HUFFMAN CODING ALGORITHM
Volume 6, Issue №4, 2021
This paper presents an algorithm for compressing data that has been encrypted or hidden, as well as capturing performance – the average time it takes to encode and ...
Biometric methods of identity identification have been actively developing in the world market over the past decade. These methods are becoming more accessible, and their implementation is happening ...
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in ...
The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge ...
This paper is devoted to the study of generative modeling in design used: this is an iterative process that generates several output data with consideration to certain restrictions ...
The topic of remote work with the arrival of the pandemic was an unusual way of working for many companies and organizations, but as time goes on, it ...
The article considers the rating of students of higher educational institutions as a way of presenting data in a compact and capacious form for collecting and recording information ...
The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based on the developed program for modeling the PSP process with ...
The use of Blockchain in the Internet of Things networks is an innovative approach that can make communication between devices of such a network distributed, autonomous and secure. ...
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well as its software implementation, which allows you to detect embedded ...
Today, one of the most promising areas in the field of information technology is machine learning. It is used in many areas of activity, including text data analysis. Between ...
The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and ...
In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that ...
Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, storing information for compressing audio recordings, ...
The use of hardware and software technologies in medicine has developed significantly over the past two decades thanks to such advances as the exoskeleton and bioengineering. One of ...
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a ...
The article deals with the creation of virtual laboratory works on the PC device for first-year students with the aim of their further use in distance learning. Virtual ...
One of the most pressing questions of the modern world is what is artificial intelligence (AI) – an assistant or a threat to all of humanity? Since the beginning ...
In the era of the coronavirus pandemic, traditional human communication has undergone several significant changes. Most of the usual offline activities went online, which made it necessary to ...
All journals
Send article
Research result. Information technologies is included in the scientific database of the RINTs (license agreement No. 765-12/2014 dated 08.12.2014).
Журнал включен в перечень рецензируемых научных изданий, рекомендуемых ВАК