scholarly journals THE CLASS OF PERFECT TERNARY ARRAYS

Author(s):  
A. V. Sokolov ◽  
O. N. Zhdanov

In recent decades, perfect algebraic constructions are successfully being use to signal systems synthesis, to construct block and stream cryptographic algorithms, to create pseudo-random sequence generators as well as in many other fields of science and technology. Among perfect algebraic constructions a significant place is occupied by bent-sequences and the class of perfect binary arrays associated with them. Bent-sequences are used for development of modern cryptographic primitives, as well as for constructing constant amplitude codes (C-codes) used in code division multiple access technology. In turn, perfect binary arrays are used for constructing correction codes, systems of biphase phase- shifted signals and multi-level cryptographic systems. The development of methods of many-valued logic in modern information and communication systems has attracted the attention of researchers to the improvement of methods for synthesizing many-valued bent-sequences for cryptography and information transmission tasks. The new results obtained in the field of the synthesis of ternary bent-sequences, make actual the problem of researching the class of perfect ternary arrays. In this paper we consider the problem of extending the definition of perfect binary arrays to three-valued logic case, as a result of which the definition of a perfect ternary array was introduced on the basis of the determination of the unbalance of the ternary function. A complete class of perfect ternary arrays of the third order is obtained by a regular method, bypassing the search. Thus, it is established that the class of perfect ternary arrays is a union of four subclasses, in each of which the corresponding methods of reproduction are determined. The paper establishes the relationship between the class of ternary bent-sequences and the class of perfect ternary arrays. The obtained results are the basis for the introduction of perfect ternary arrays into modern cryptographic and telecommunication algorithms.

2021 ◽  
Vol 16 (6) ◽  
pp. 21-30
Author(s):  
A. V. Kornev

The paper examines activity as the most important component of human life. The author elucidates the features of activity from the standpoint of various fields of knowledge: philosophy, psychology, sociology. The preference is given to the activity approach, which is based on the category of “substantive activity.” It is substantive in nature and does not simply define the activity as human interaction with the outside world, but reflects the changes that constitute the result of human activity. Various aspects of theoretical and practical activity are touched upon on the example of legal activity, which is of a complex intellectual nature. Legal activity is often characterized through legal practice — one of the varieties of social practices. Some similarities of these categories are reflected, as well as differences between them. The paper gives the author’s definition of legal activity focused on professional legal activity. The definition cannot claim to be universal due to various types of professional legal activity. Nevertheless, it is specified that professional legal activity is always an activity carried out on the basis of law, in legal forms; it is aimed at achieving the goals determined by law. The author demonstrates the impact of digital technologies on various types of legal activities. Especially in the conditions of the pandemic when traditional forms of communication have given way to virtual ones. It is noted that this influence is of a dual nature, that is, on the one hand, it increases the efficiency of communications, and, on the other hand, it leads to some risks and problems, in particular, against the background of the fact that a significant part of our population still does not have access to modern information and communication systems.


2011 ◽  
Vol 1 (3) ◽  
Author(s):  
Nicolas Guelfi

AbstractThe goal of this article is to provide a rigorous conceptual framework for defining the concepts of dependability and resilience. Since the seventies, the terms dependability and resilience have been used in nearly all the scientific and technological fields related to Information and Communication systems. The introduction and use of these concepts in all these fields makes it difficult to have a common and precise definition. Having such a definition is nevertheless mandatory for the software and systems engineering research community that create development processes, languages and tools to support the engineering of products that would be required to be dependable or resilient. For this, we introduce an abstract and generic terminology defined mathematically to be used when speaking about dependability and resiliency. We also provide some abstract semantic descriptions to these terminological elements. This formal framework is defined from a software engineering perspective, which means that we define its components such that they are useful for the development or improvement of analysis, architectural design, detailed design, implementation, verification and maintenance phases. To this aim, we provide the necessary elements in accordance with a model driven engineering perspective that enable the definition of a new modelling language for dependable and resilient systems.


Author(s):  
Stephan Zelewski ◽  
Adina Silvia Bruns ◽  
Martin Kowalski

For e-business, the computer-based processing of value-creation, especially for knowledge-intensive business processes, plays a prominent role with the help of modern information and communication techniques. At least since the further development of the classical Internet for the Semantic Web, the content-based knowledge processing and knowledge transfer have gained more importance. In this chapter it is shown that ontologies represent an auspicious instrument to ensure the interoperability of information and communication systems that have to work together on the work-sharing development of knowledge-intensive business processes. Ontologies become important when agents with heterogeneous knowledge backgrounds co-operate on such business processes. Firstly, the complex and often ill-considered use of the definition of ontology will be discussed critically and its meaning specified. Thereupon it will be shown (with the help of two application areas) how ontologies can be used effectively to support knowledge-intensive business processes in e-business. On the one hand, the chapter is concerned with the management of knowledge of competences, which agents have to have a command of for successful process execution. On the other hand, it is about the management of know-how, which has already been collected from completed projects and should be reused in new projects.


Radiotekhnika ◽  
2021 ◽  
pp. 24-29
Author(s):  
I.D. Gorbenko ◽  
O.V. Potii ◽  
A.A. Zamula

The use of broadband signals (BSS) makes it possible to increase the noise immunity of information and communication systems (ICS) when exposed to structural (mutual) and organized interference. The real noise immunity will be lower than the potential one. The reason for the decrease in noise immunity, when entering synchronism and when distinguishing signals, is the presence of side peaks of the correlation functions. Proceeding from this, the NLS used in ICS should have such correlation properties when the side peaks of the NLS CF are as small as possible, i.e. ideally should tend to zero. In this case, it is necessary to determine the influence of side peaks on the characteristics of signal detection, measure their parameters, distinguish signals, and find the conditions for obtaining small side peaks. The problem of synthesizing a class of signals with given correlation, ensemble and structural properties, as well as properties of "blurring" in correlation characteristics, is formulated and solved in general form. The specified property ("fuzziness") means that increasing or decreasing the length of the discrete signal does not change the correlation properties of the discrete sequence on the basis of which the signal is synthesized. The use of many of these signal systems in modern information and communication systems will improve the performance indicators of such systems, first of all, noise immunity, secrecy, information security, noise immunity of signal reception.


2019 ◽  
Vol 292 ◽  
pp. 01056
Author(s):  
Jiří Dvořák ◽  
Jiří Konečný ◽  
Marek Tomaštík

The paper briefly presents some possibilities of the modern use of cyberspace tools for the theory of artificial intelligence related to the definition of the model and the corresponding possibilities leading to systemic modeling of crises in the modern information and knowledge world and in the area of system security. The modeling process is mainly focused on the specific concept of the virtual model and on the network represented by information and communication systems (ICT) and on the corresponding perspective modeling of the system-based environment used to simulate cyber-attacks and the corresponding levels of cyber-defence. It forms the actual content of the newly conceived modeling with the process of model adaptation in the modern learning environment of artificial intelligence. The paper is based on a scientific task dealing with the possibilities of modeling and adaptation of cybersecurity in a new projected cybersecurity laboratory with the environment of artificial intelligence application in this virtual environment of modern security.


2021 ◽  
Vol 3 (9(111)) ◽  
pp. 16-26
Author(s):  
Ivan Gorbenko ◽  
Oleksandr Zamula

Information and communication systems (ICSs) must comply with increasingly stringent requirements to ensure the reliability and speed of information transmission, noise immunity, information security. This paper reports the methods to synthesize discrete complex cryptographic signals, underlying the construction of which are random (pseudo-random) processes; the methods for synthesizing characteristic discrete complex signals whose construction is based on using the nature of the multiplicative group of a finite field; the results of studying the properties of the specified signal systems. It is shown that the methods built provide a higher synthesis performance than known methods and make it possible to algorithmize the synthesis processes for the construction of software and hardware devices to form such signals. The win in the time when synthesizing nonlinear signals in finite fields using the devised method is, compared to the known method, for the period of 9,972 elements is 1,039.6 times. The proposed method for synthesizing the entire system of such signals, based on decimation operation, outperforms the known method of difference sets in performance. Thus, for a signal period of 2,380 elements, the win in time exceeds 28 times. It has also been shown that the application of such systems of complex signals could improve the efficiency indicators of modern ICSs. Thus, the imitation resistance of the system, when using complex discrete cryptographic signals with a signal period of 1,023 elements, is four orders of magnitude higher than when applying the linear signal classes (for example, M-sequences). For a signal period of 1,023 elements, the win (in terms of structural secrecy) when using the signal systems reported in this work exceeds 300 times at a period of 8,192, compared to the signals of the linear form (M-sequences)


Sign in / Sign up

Export Citation Format

Share Document