Entity

Time filter

Source Type


Abbasova T.S.,Financial and Technical Academy | Artyushenko V.M.,Financial and Technical Academy | Samarov K.L.,Financial and Technical Academy
Biosciences Biotechnology Research Asia | Year: 2014

Various metrics of evaluation of the quality of the transmitted video information are considered. Algorithms for calculating the objective and subjective ratings of the video information are described, including RMSE, PSNR, PQR, VQM. The main problems are given that appeared in the process of quality assessment and related to the desyncronization of the images and other negative effects associated with the transmission of the video information over the wireless communication channels. In conclusion, a brief comparison of the considered metrics is performed. Source


Moroz A.P.,Financial and Technical Academy | Beluchenko I.M.,Financial and Technical Academy | Samarov K.L.,Financial and Technical Academy | Strenakuk Y.V.,Financial and Technical Academy
Biosciences Biotechnology Research Asia | Year: 2014

The article deals with the singularities of application of error-control codes based on the generator matrices and generator polynoms, which have proven to be efficient with binary code. It shows that the anti-jamming methods used for binary codes based on application of generator matrices and generator polynoms, can be used of anti-jamming of transmissions with triple code. Based on the analysis of the materials, we concluded that the triple code is one of the most compact forms of representation of large numbers. Source


Moroz A.P.,Financial and Technical Academy | Poserenin S.P.,Financial and Technical Academy | Stroitelev V.N.,Financial and Technical Academy | Vasilyev N.A.,Financial and Technical Academy
Biosciences Biotechnology Research Asia | Year: 2014

On-line training methods while training the specialists in the higher school is analysed; visual data analysis in information systems is considered; methods of qualitative evaluation of the on-line analytical processing methods effective use are presented. Basing on the analysed material we drew a conclusion that the advantages of combining consist in the combination of different methods of visualization in order to overcome disadvantages of one o them. Source


Beluchenko I.M.,Financial and Technical Academy | Zinoviev V.N.,Financial and Technical Academy | Strenakuk Y.V.,Financial and Technical Academy | Vatutin V.M.,Financial and Technical Academy
Biosciences Biotechnology Research Asia | Year: 2014

The article deals with the singularities of the triple code application at transmission of digital information; shows the possibility of anti-jam protection of the triple code using methods developed for the binary code, in particular, methods of encryption based on the generator matrix and generator polynoms; and shows that methods of syndrome decoding are applicable for channel decoding. Source

Discover hidden collaborations