<p>A generalized model of information protection of a database management system is proposed, which can be used to implement database protection under any database management system. This model development methodology consists of four stages: requirements gathering, database analysis, “multi-level relational logical construction and a specific logical construction. The first three steps define actions for analyzing and developing a secure database, thus creating a generalized and secure database model”.</p>
In this article done the review for results of research on algorithms for iterative transformations of noise-immune codes. where the similar decoding procedures provide a significant increase in the efficiency of soft decoders classification of such algorithms is given. The optimality of the algorithm is proved by the criterion of the rate of achievement of the final result when using the step-by-step correction of soft solutions.
Modern telecommunication technologies play a decisive role in the methods of organization and structure of the construction of existing and projected mobile IAUs or specialized control systems designed to collect a given set of information about managed objects and, in accordance with the objective function, to manage these objects.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.