main page
annotations:
Advertisment:
Grant ME RF
“ќ2-03.1-816
язык\language

–усский | English

journal

є1

about journal

themes

Write us:

fibres@pbox.infotecstt.ru

fibres@itt.net.ru

I. Philosophical, historical, spiritual, legal aspects of the nature of terrorism and information scrambling with it.

Kotenko V.V., Rumjantsev K.E.
TRANSFORMATION OF TERRORISM THREATS IN INFORMATION SECURITY BREAKDOWN CIRCUMSTANCES

Modern information security is in crisis situation. Analysis of causes and consequences of that crisis draws a conclusion that we have to search definitely new ways to solve information security task. It is very important in international terrorism threat conditions and their transformation.

Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CONCEPTION OF MODERN INFORMATION THEORY BUILDING STRATEGY.

Growth of information technologies value almost in all fields of human life requests effective solutions of problems, which are inherent to the development of modern information theory. This is counteracted by lack of uniqueness in points of view on information theory. This article suggests a new way to information theory building strategy, which can exclude this indeterminacy.

Lunev A.A.
TERRORISM AS KIND OF ARMED VIOLENCE

The analysis of the acts of terrorism is conducted. The directions of state reacting of threats of terrorism are determined.

Potanin A.V.
SERIAL KILLS AS ONE OF THE SOCIAL TERRORISM MANIFESTATION

It is ground of analysis of the facts of production assassinations the approach to drawing up of a psychologic structure the production assassin is justified.


Shpakov A.E.
SOME QUESTIONS OF PROSTITUTION COUNTERACTIONS IN TERRORISM THREAT CIRCUMSTANCES

The analysis of the facts of prostitution as phenomena capable is conducted to plot a harm to safety of the state and company. Some problems of counteraction of prostitution in conditions of stability called activity of the criminal society are considered.

 

II. Information technologies of safety control of the personality, company, state
Information safety of intellectual(intelligent) systems


Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
COMPUTER TECHNOLOGIES: WAY OF USE WHILE SOLVING TASKS OF AUDIO INFORMATION PROTECTION CURRENT ESTIMATION.

This article shows the main ways of using software-technical complex of current audio information protection quality control.


Babenko L.K., Bruchkomitsky U.A., Makarevitch O.B., Peskova O.U.
RESEARCHES AND EXPLORATIONS IN THE FIELD OF INFORMATION SECURITY

The list of researches and development on hardware-software means and systems of information safety safety, executed on stand, of information technologies of the Taganrog state radio university within the last five years is resulted. The list includes, in particular, activity on methods both means of protection of computer networks and telecommunications, noiseproof coding, guard of intelligence systems, speech recognition and faxgrams, biometric methods of authentification etc.

Bruchkomitsky U.A.
INFORMATION SYSTEMS: BIOMETRICAL PARAMETRIC USERS AUTHENTICATION METHOD

The parametric method of construction of the qualifier for biometric authentification of the user of an intelligence system is considered. The qualifier will be realized by the way F-machines modeling range of allocation of biometric arguments of an authorized user. The method has the greater exactitude of authentification as contrasted to by geometrical methods of identification and does not demand learning, appropriute qualifiers constructed on synthetic neuronic networks.

Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
VIRTUAL ESTIMATION IN ANALOG INFORMATION PROTECTION TASKS.

This article suggests a new way to analog information protection? Which is based on virtual estimations using. This approach calls for digital noise using, as a masking noise and as a cipher key. The ways of this task solving are also presented.

Kotenko V.V., Polikarpov S.V.
EVALUATION ALGORITHMS OF VIRTUAL ESTIMATION SYNTHESIS POLICY.

This article suggests and grounds evaluation algorithms of virtual estimation synthesis policy. Virtual estimation evaluation algorithm is shown. Ways of using are analyzed.

 

III. Information safety of intellectual(intelligent) systems

Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
INTELLECTUAL SYSTEMS INFORMATIONAL SECURITY FROM THE POSITION OF VIRTUAL KNOWLEDGE.

This article gives a presentation of virtual systems from the position of virtual knowledge and thus opens definitely new possibilities of information security problems content analysis and the ways of their solving.

Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
STRATEGY OF INTELLECTUAL SYSTEMS MODELING.

This article analyses intellectual systems description and modeling conceptions, which are well-known now. Problems of these conceptions are displayed. New strategies of intellectual systems description and modeling are suggested.

 

IV. Guard of intellectual management systems.

Kotenko V.V., Rumjantsev K.E.
AUDIO INFORMATION SECURITY EFFICIENCY ESTIMATION CONTROL PROBLEMS.

This article discovers and analyses problems which counteract further researches in the field of audio information security estimation control optimization.


Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
EFFICIENCY ESTIMATION OF AUDIO INFORMATION SECURITY: SOLVING STRATEGY.

This article suggests the presentation of information security processes as two levels (logical and material) and opens the possibility of efficiency estimation of audio information security solving strategy problem from the definitely new positions.

Kotenko V.V., Polikarpov S.V.
BASE CONCEPTS AND DEFINITIONS SYSTEMATIZATION IN AUDIO INFORMATION PROTECTION TASKS.

Base definitions considerable ambiguity in the field of audio information security processes optimization is quite a serious problem, which can confuse experienced scientists as well as beginners. This article shows a new way to base concepts and definitions classification with a view to solve the problem

 

V. Guard of telecommunication systems and time-sharings.

Rumjantsev K.E., Hairov I.E.
CONFIDENTIAL INFORMATION TRANSFER BY FIBER-OPTICS CHANNELS, PROTECTED FROM UNAUTHORIZED ACCESS.

The evaluation of efficacyy of fibre-optical transmission systems of the confidential information working in a mode of the invoice of separate photons in conditions of an operation of Poisson hums and with allowance for non-ideal of arguments of clusters of a receiving equipment is given.


Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CEASELESS SOURCES CODING STRATEGY.

Ceaseless sources coding strategy is grounded. Its using had discovered a set of its eventual transformation variants. Conducted analysis showed that ceaseless sources, unlike discrete, have a possibility of choice from three variations, which discovers the vast field of action for new coding modes research and development.


Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CEASELESS SOURCES CODING THEOREM FROM THE SIDE OF RELATIVE SUPERFLUITY.

While solving ceaseless sources superfluity definition ambiguity the relative superfluity conception was introduced and evaluated. From its side the ceaseless sources coding theorem was formulated and proved for the first time. This theorem allowed to determine a new way to ceaseless sources coding efficiency estimation, which had led to information contraction estimation algorithm development.

 

Kotenko V.V., Polikarpov S.V.
INFORMATION PROTECTION STRATEGY WHILE CODING THE SOURCE.

This article suggests and grounds new information protection strategy from the side of source coding, named as absolute undecodable strategy.

Kotenko V.V., Polikarpov S.V.
NEW WAY TO INFORMATION SECURITY EFFICIENCY ESTIMATION

Expressions for efficiency and coding resistance are calculated. They can realize qualitative information security efficiency estimation.

 

VI. Radio electronic technologies of information safety

Wolfovsky B.N.
MULTIPLE ANTICORRELATION HANDLING AND ITS POSSIBILITIES TO THE DETECTION OF HARMONIC SIGNAL IN NOISE AND SIGNAL MIXTURE.


Zemlianuchin P.A, Rumjantsev K.E.
THE WAYS OF ACTIVE ANALYSIS OF A GAS ENVIRONMENTS IN TERRORISM THREATS CIRCUMSTANCES.

The last time has increased clandestine effecting and sharply transportation of drug materials, the cases of terrorism with usage, both explosive, and chemical agents have become frequent. In these conditions relevant the operating analysis of gas media is. To execute it it is possible on the basis of multitouchsensitive rearranged systems. Each sensor in this system will orient by perception some of one argument of material. Thus the range of perception of argument can rearranged. The set of estimated arguments can constitute a pattern of a state of gas medium, on which one it is possible to judge availability in her of explosive, drug or other parasitic chemical agents.

 

VII. Software of computing systems, complexes and computer networks.

P.P. Kravchenko, N.S. Husainov, A.A. Hadchinov, K.V. Pogorelov, A.N. Shkurko.
VIDEO-MONITORING AUDIO AND VIDEO INFORMATION MULTILATERAL CHANGE SOFTWARE SYSTEM.

Principles of the computer-based software video conferension system УDelta-conferenceФ, developed in Taganrog State University of Radioengeneering are discussed. Definitely new sides of the system, differing from known video conference systems are using of new original and fast audio and video compression algorythms, possibility to organize multilateralconference without using dedicated control device, adaptive mediadata coding quality according to dymamic link channel capacity, data transfer quality acceleration at the expense of more effective local and corporate IP-nets devices using.

V.ќ. Osypan
THE PROTECTIVE SYSTEM of the INFORMATION ON THE BASIS OF a WARSHAMOV CODE

The class of cryptosystems with the open key is considered, in the basis which one the problem about a backpack lays. The algorithm of construction generalized cryptosystems with the open key is resulted and it is offered, in particular to take for the basis –-dimension Warsamov code Wn and generalized function Fp (x) for construction of such cryptosystems.


VIII. Organization and training methodologies of the experts in range of information safety.

Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
NEW WAY TO EDUCATION QUALITY QUANTITATIVE ESTIMATION FORMATION FROM THE SIDE OF VIRTUAL KNOWLEDGE THEORY.

From the positions of virtual knowledge theory the place and a role of training in the general model of intellectual systems interaction is determined. Main question is formed on the basis of the education. We offer a way to the decision of education quantitative estimation quality, determining given class problem strategy decision.


 

Хостинг от uCoz