scholarly journals Software Approaches and Methods to Ensure the Security of Interactive Systems

2018 ◽  
Vol 18 (5) ◽  
pp. 12-20
Author(s):  
Galina Bogdanova ◽  
Todor Todorov ◽  
Galya Georgieva-Tsaneva

Abstract In the paper are studied methods for protection of interactive systems and digital archives against unauthorized distribution of digital content. We make an overview of steganographic methods and image protection schemes. An improved watermark error correction scheme is presented. The studies contribute to the overall development of the North+region, provide future generations with widespread public access to digital materials. We achieve a long-term storage, secure data protection and interactive web presence.

Author(s):  
Bertram Lyons

During this year’s IASA conference in Washington, DC at the Library of Congress, I noticed continued discussion of trends that are ever-looming in our feld: (1) digital video care and management improvements and (2) increased access demands for digital audiovisual collections. We are required to be agile in our ability to provide effortless access to audiovisual archives in the digital landscape; and simultaneously, we are challenged to design long-term storage infrastructure for the preservation of exponentially growing collections of the biggest (in terms of bytes) digital content in existence—high defnition digital audio and digital video objects. At the core of our work, while we are attending to the many details of audiovisual archives, most of us are still laying dependable infrastructure for digital preservation of and versatile access to our ever-growing digital archives. This is the reality in which we operate today.


2001 ◽  
Vol 6 (2) ◽  
pp. 3-14 ◽  
Author(s):  
R. Baronas ◽  
F. Ivanauskas ◽  
I. Juodeikienė ◽  
A. Kajalavičius

A model of moisture movement in wood is presented in this paper in a two-dimensional-in-space formulation. The finite-difference technique has been used in order to obtain the solution of the problem. The model was applied to predict the moisture content in sawn boards from pine during long term storage under outdoor climatic conditions. The satisfactory agreement between the numerical solution and experimental data was obtained.


Diabetes ◽  
1997 ◽  
Vol 46 (3) ◽  
pp. 519-523 ◽  
Author(s):  
G. M. Beattie ◽  
J. H. Crowe ◽  
A. D. Lopez ◽  
V. Cirulli ◽  
C. Ricordi ◽  
...  

2020 ◽  
Vol 59 (SL) ◽  
pp. SLLC01 ◽  
Author(s):  
Tomoki Murota ◽  
Toshiki Mimura ◽  
Ploybussara Gomasang ◽  
Shinji Yokogawa ◽  
Kazuyoshi Ueno

Author(s):  
O. Semenenko ◽  
O. Vodchyts ◽  
V. Koverga ◽  
R. Lukash ◽  
O. Lutsenko

The introduction and active use of information transmission and storage systems in the Ministry of Defense (MoD) of Ukraine form the need to develop ways of guaranteed removal of data from media after their use or long-term storage. Such a task is an essential component of the functioning of any information security system. The article analyzes the problems of guaranteed destruction of information on magnetic media. An overview of approaches to the guaranteed destruction of information on magnetic media of different types is presented, and partial estimates of the effectiveness of their application are given by some generally accepted indicators of performance evaluation. The article also describes the classification of methods of destruction of information depending on the influence on its medium. The results of the analysis revealed the main problems of application of software methods and methods of demagnetization of the information carrier. The issue of guaranteed destruction of information from modern SSD devices, which are actively used in the formation of new systems of information accumulation and processing, became particularly relevant in the article. In today's conditions of development of the Armed Forces of Ukraine, methods of mechanical and thermal destruction are more commonly used today. In the medium term, the vector of the use of information elimination methods will change towards the methods of physical impact by the pulsed magnetic field and the software methods that allow to store the information storage device, but this today requires specialists to develop new ways of protecting information in order to avoid its leakage.


Sign in / Sign up

Export Citation Format

Share Document