I. Philosophical, historical, spiritual, legal aspects
of the nature of terrorism and information scrambling with it.
Kotenko V.V., Rumjantsev K.E.
TRANSFORMATION OF TERRORISM THREATS IN INFORMATION SECURITY BREAKDOWN
CIRCUMSTANCES
Modern information security is in crisis situation. Analysis of causes
and consequences of that crisis draws a conclusion that we have to search
definitely new ways to solve information security task. It is very important
in international terrorism threat conditions and their transformation.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CONCEPTION OF MODERN INFORMATION THEORY BUILDING STRATEGY.
Growth of information technologies value almost in all fields of human
life requests effective solutions of problems, which are inherent to the
development of modern information theory. This is counteracted by lack
of uniqueness in points of view on information theory. This article suggests
a new way to information theory building strategy, which can exclude this
indeterminacy.
Lunev A.A.
TERRORISM AS KIND OF ARMED VIOLENCE
The analysis of the acts of terrorism is conducted. The
directions of state reacting of threats of terrorism are determined.
Potanin A.V.
SERIAL KILLS AS ONE OF THE SOCIAL TERRORISM MANIFESTATION
It is ground of analysis of the facts of production assassinations
the approach to drawing up of a psychologic structure the production assassin
is justified.
Shpakov A.E.
SOME QUESTIONS OF PROSTITUTION COUNTERACTIONS IN TERRORISM THREAT CIRCUMSTANCES
The analysis of the facts of prostitution as phenomena capable
is conducted to plot a harm to safety of the state and company. Some problems
of counteraction of prostitution in conditions of stability called activity
of the criminal society are considered.
II. Information technologies of safety control of
the personality, company, state
Information safety of intellectual(intelligent) systems
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
COMPUTER TECHNOLOGIES: WAY OF USE WHILE SOLVING TASKS OF AUDIO INFORMATION
PROTECTION CURRENT ESTIMATION.
This article shows the main ways of using software-technical complex
of current audio information protection quality control.
Babenko L.K., Bruchkomitsky U.A., Makarevitch O.B., Peskova O.U.
RESEARCHES AND EXPLORATIONS IN THE FIELD OF INFORMATION SECURITY
The list of researches and development on hardware-software
means and systems of information safety safety, executed on stand, of
information technologies of the Taganrog state radio university within
the last five years is resulted. The list includes, in particular, activity
on methods both means of protection of computer networks and telecommunications,
noiseproof coding, guard of intelligence systems, speech recognition and
faxgrams, biometric methods of authentification etc.
Bruchkomitsky U.A.
INFORMATION SYSTEMS: BIOMETRICAL PARAMETRIC USERS AUTHENTICATION METHOD
The parametric method of construction of the qualifier for
biometric authentification of the user of an intelligence system is considered.
The qualifier will be realized by the way F-machines modeling range of
allocation of biometric arguments of an authorized user. The method has
the greater exactitude of authentification as contrasted to by geometrical
methods of identification and does not demand learning, appropriute qualifiers
constructed on synthetic neuronic networks.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
VIRTUAL ESTIMATION IN ANALOG INFORMATION PROTECTION TASKS.
This article suggests a new way to analog information protection? Which
is based on virtual estimations using. This approach calls for digital
noise using, as a masking noise and as a cipher key. The ways of this
task solving are also presented.
Kotenko V.V., Polikarpov S.V.
EVALUATION ALGORITHMS OF VIRTUAL ESTIMATION SYNTHESIS POLICY.
This article suggests and grounds evaluation algorithms of virtual estimation
synthesis policy. Virtual estimation evaluation algorithm is shown. Ways
of using are analyzed.
III. Information safety of intellectual(intelligent) systems
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
INTELLECTUAL SYSTEMS INFORMATIONAL SECURITY FROM THE POSITION OF VIRTUAL
KNOWLEDGE.
This article gives a presentation of virtual systems from the position
of virtual knowledge and thus opens definitely new possibilities of information
security problems content analysis and the ways of their solving.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
STRATEGY OF INTELLECTUAL SYSTEMS MODELING.
This article analyses intellectual systems description and modeling
conceptions, which are well-known now. Problems of these conceptions are
displayed. New strategies of intellectual systems description and modeling
are suggested.
IV. Guard of intellectual management systems.
Kotenko V.V., Rumjantsev K.E.
AUDIO INFORMATION SECURITY EFFICIENCY ESTIMATION CONTROL PROBLEMS.
This article discovers and analyses problems which counteract further
researches in the field of audio information security estimation control
optimization.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
EFFICIENCY ESTIMATION OF AUDIO INFORMATION SECURITY: SOLVING STRATEGY.
This article suggests the presentation of information security processes
as two levels (logical and material) and opens the possibility of efficiency
estimation of audio information security solving strategy problem from
the definitely new positions.
Kotenko V.V., Polikarpov S.V.
BASE CONCEPTS AND DEFINITIONS SYSTEMATIZATION IN AUDIO INFORMATION PROTECTION
TASKS.
Base definitions considerable ambiguity in the field of audio information
security processes optimization is quite a serious problem, which can
confuse experienced scientists as well as beginners. This article shows
a new way to base concepts and definitions classification with a view
to solve the problem
V. Guard of telecommunication systems and time-sharings.
Rumjantsev K.E., Hairov I.E.
CONFIDENTIAL INFORMATION TRANSFER BY FIBER-OPTICS CHANNELS, PROTECTED
FROM UNAUTHORIZED ACCESS.
The evaluation of efficacyy of fibre-optical transmission
systems of the confidential information working in a mode of the invoice
of separate photons in conditions of an operation of Poisson hums and
with allowance for non-ideal of arguments of clusters of a receiving equipment
is given.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CEASELESS SOURCES CODING STRATEGY.
Ceaseless sources coding strategy is grounded. Its using had discovered
a set of its eventual transformation variants. Conducted analysis showed
that ceaseless sources, unlike discrete, have a possibility of choice
from three variations, which discovers the vast field of action for new
coding modes research and development.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
CEASELESS SOURCES CODING THEOREM FROM THE SIDE OF RELATIVE SUPERFLUITY.
While solving ceaseless sources superfluity definition ambiguity the
relative superfluity conception was introduced and evaluated. From its
side the ceaseless sources coding theorem was formulated and proved for
the first time. This theorem allowed to determine a new way to ceaseless
sources coding efficiency estimation, which had led to information contraction
estimation algorithm development.
Kotenko V.V., Polikarpov S.V.
INFORMATION PROTECTION STRATEGY WHILE CODING THE SOURCE.
This article suggests and grounds new information protection strategy
from the side of source coding, named as absolute undecodable strategy.
Kotenko V.V., Polikarpov S.V.
NEW WAY TO INFORMATION SECURITY EFFICIENCY ESTIMATION
Expressions for efficiency and coding resistance are calculated. They
can realize qualitative information security efficiency estimation.
VI. Radio electronic technologies of information safety
Wolfovsky B.N.
MULTIPLE ANTICORRELATION HANDLING AND ITS POSSIBILITIES TO THE DETECTION
OF HARMONIC SIGNAL IN NOISE AND SIGNAL MIXTURE.
Zemlianuchin P.A, Rumjantsev K.E.
THE WAYS OF ACTIVE ANALYSIS OF A GAS ENVIRONMENTS IN TERRORISM THREATS
CIRCUMSTANCES.
The last time has increased clandestine effecting and sharply
transportation of drug materials, the cases of terrorism with usage, both
explosive, and chemical agents have become frequent. In these conditions
relevant the operating analysis of gas media is. To execute it it is possible
on the basis of multitouchsensitive rearranged systems. Each sensor in
this system will orient by perception some of one argument of material.
Thus the range of perception of argument can rearranged. The set of estimated
arguments can constitute a pattern of a state of gas medium, on which
one it is possible to judge availability in her of explosive, drug or
other parasitic chemical agents.
VII. Software of computing systems, complexes and
computer networks.
P.P. Kravchenko, N.S. Husainov, A.A. Hadchinov, K.V.
Pogorelov, A.N. Shkurko.
VIDEO-MONITORING AUDIO AND VIDEO INFORMATION MULTILATERAL CHANGE SOFTWARE
SYSTEM.
Principles of the computer-based software video conferension system УDelta-conferenceФ,
developed in Taganrog State University of Radioengeneering are discussed.
Definitely new sides of the system, differing from known video conference
systems are using of new original and fast audio and video compression
algorythms, possibility to organize multilateralconference without using
dedicated control device, adaptive mediadata coding quality according
to dymamic link channel capacity, data transfer quality acceleration at
the expense of more effective local and corporate IP-nets devices using.
V.ќ. Osypan
THE PROTECTIVE SYSTEM of the INFORMATION ON THE BASIS OF a WARSHAMOV CODE
The class of cryptosystems with the open key is considered, in the basis
which one the problem about a backpack lays. The algorithm of construction
generalized cryptosystems with the open key is resulted and it is offered,
in particular to take for the basis –-dimension Warsamov code Wn and generalized
function Fp (x) for construction of such cryptosystems.
VIII. Organization and training methodologies of
the experts in range of information safety.
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V.
NEW WAY TO EDUCATION QUALITY QUANTITATIVE ESTIMATION FORMATION FROM THE
SIDE OF VIRTUAL KNOWLEDGE THEORY.
From the positions of virtual knowledge theory the place and a role of
training in the general model of intellectual systems interaction is determined.
Main question is formed on the basis of the education. We offer a way
to the decision of education quantitative estimation quality, determining
given class problem strategy decision.
|