The paper analyzes the use of Arnold transform for digital image scrambling. The proposed algorithm is implemented as part of the developed Luka library of medical image processing in the DICOM format, and provides additional cryptographic and steganographic protection of the patient’s personal data. The issues of evaluating the effectiveness of the developed software module using the structural similarity index are considered.
Keywords: Arnold transform, scrambling, peak signal to noise ratio, standard deviation, structural similarity index, DICOM, SSIM
Considered an important component of corporate networks - the default gateway. The main objective of the project is to minimize the time of convergence by ensuring high availability in order to ensure the continuity of the head office connection to remote offices. An analysis is made of the operation of one of the technological solutions, as well as estimates of the probability of failure-free operation for the default gateway with redundancy and without.
Keywords: HSRP, fault tolerance, high availability, failure, convergence, routing, protocol, load reserve, redundancy, business continuity
The paper analyzes various planning approaches that are part of the QoS QoS assurance subsystem in LTE networks in situations of network traffic congestion. Using different strategies for different types of traffic allows operators to offer different levels of quality of service for voice users. Evaluations of the efficiency of packet transfer scheduling algorithms are given.
Keywords: LTE, Long-Term Evolution, scheduling algorithms, FIFO, Round Robin, Shortest Job First, Random Early Detection, RED, RR, SJF, QoS, VoIP, CSFB, VoLTE
An important component of electronic document management and training systems is considered - a full-text search engine that allows to implement convenient means of searching for information of interest on the contents of electronic documents. Estimates of the efficiency of full-text search in databases are given.
Keywords: Database, full-text search, database management system, MySQL, PostgreSQL, Oracle
In this work, we carried out a study of algorithms implemented by the system of human identification based on various criteria. Three main approaches to face recognition are considered. The advantages and disadvantages of approaches revealed during implementation are given.
Keywords: Databases, face recognition, pattern recognition, hidden Markov models, principal component analysis, neural networks