Papers by Boris A Assanovich
Multi-Agent Approach for Monitoring of Computer Networks
Several structures of autoencoders used for the efficient data coding with unsupervised learning ... more Several structures of autoencoders used for the efficient data coding with unsupervised learning and applied to solving the tasks of classification and removing the internal noise from data used in problems of biometric and emotional recognition have been analyzed in this paper. Smile type recognition and biometric identification experiments using the transformed features from UvA-NEMO Smile Database and Caltech Faces datasets showed the possibility of improving the classification accuracy by 10%

IntechOpen eBooks, Mar 21, 2023
Due to the current level of telecommunications development, fifth-generation (5G) communication s... more Due to the current level of telecommunications development, fifth-generation (5G) communication systems are expected to provide higher data rates, lower latency, and improved scalability. To ensure the security and reliability of data traffic generated from wireless sources, 5G networks must be designed to support security protocols and reliable communication applications. The operations of coding and processing of information during the transmission of both binary and non-binary data in nonstandard communication channels are described. A subclass of linear binary codes is considered, which are both Varshamov-Tenengolz codes and are used for channels with insertions and deletions of symbols. The use of these codes is compared with Hidden Markov Model (HMM)-based systems for detecting intrusions in networks using flow watermarking, which provide high true positive rate in both cases. The principles of using Bose-Chadhuri-Hocquenhgem (BCH) codes, non-binary Reed-Solomon codes, and turbo codes, as well as concatenated code structures to ensure noise immunity when reproducing information in Helper-Data Systems are considered. Examples of biometric systems organization based on the use of these codes, operating on the basis of the Fuzzy Commitment Scheme (FCS) and providing FRR < 1% for authentication, are given.
Application of Turbo Codes for Data Transmission in UWB Using PSK Modulated Complex Wavelets
The use of binary and non-binary turbo codes to improve the performance of UWB data transmission ... more The use of binary and non-binary turbo codes to improve the performance of UWB data transmission with the use of complex wavelet signals with Phase Shift Keying (PSK) of different dimension is proposed. Simulation results demonstrating the efficiency of turbo codes used to improve the noise immunity of BPSK and 8PSK data transmission over the AWGN channel are presented.
A novel watermarking scheme for intrusion tracing in networks based on QIM modulation and linear ... more A novel watermarking scheme for intrusion tracing in networks based on QIM modulation and linear error-correcting subcodes suitable for pattern recognition and combating with substitution, deletion and insertion errors in channels with invisible embedded watermarks is proposed in this paper. Statistical and computational experiments demonstrate that proposed scheme outperforms the known coded IPD-based flow watermarking schemes and has a significant advantage in detection rate and implementation complexity, but slightly inferior to the code rate, and hence to processing time for intrusion tracing.
Authentication System Based on Biometric Data of Smiling Face from Stacked Autoencoder and Concatenated Reed-Solomon Codes
Communications in computer and information science, 2022
Modification of pulse position modulation for high data UWB systems and multi-user communication
15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824)
ABSTRACT This paper proposes a concatenated single-pulse modulation (C-PPM) for UWB systems by in... more ABSTRACT This paper proposes a concatenated single-pulse modulation (C-PPM) for UWB systems by increasing the number of pulses in time symbol interval. Further adaptation of orthogonal codes to bipolar signal PPM is studied. The results obtained considered the possible application for high data transmission systems and multi-user environments.
Embedding bits in compressed data for selective encryption and watermarking
2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, 2008
A new approach of compressed data encryption and/or watermarking by the use of Meta source coding... more A new approach of compressed data encryption and/or watermarking by the use of Meta source coding and block composition with bit insertion to watermark and protect data from visualization while decoding is proposed. The value of added redundancy to data blocks is calculated and the practical application of proposed approach for encryption with the use of JPEG image processing is demonstrated.
Two schemes for block-based transmission of variable-length codes
2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, 2008
ABSTRACT This paper investigates the error span limitation of variable-length codes (VLC) by plac... more ABSTRACT This paper investigates the error span limitation of variable-length codes (VLC) by placing them into fixed length blocks. Two schemes of block composition are examined: the use of zero bits padding and appended marker code (first scheme) and then padding bits only (second scheme). It is observed that the error span is limited in both schemes but the second scheme with reduced overhead performs better when the sequential decoding of VLC is exploited.
Forming block structures from variable-length codes
Proceedings IEEE International Symposium on Information Theory,
ABSTRACT A novel method of coding and forming block structures from arbitrary variable-length cod... more ABSTRACT A novel method of coding and forming block structures from arbitrary variable-length codes (VLC) by adding special marker codes and making fixed length blocks obtained from variable length codewords is proposed and its symbol error rate in a binary symmetric channel (BSC) for known VLC with and without forward error correction (FEC) is presented.
Metod for Error Span Limitation in the Entropy Coded Data
2006 International Conference on Microwaves, Radar & Wireless Communications, 2006
ABSTRACT This paper presents a method for error span limitation in entropy-coded data transmitted... more ABSTRACT This paper presents a method for error span limitation in entropy-coded data transmitted over wireless communication channel. The method applies block composition from modified Huffman codes with reduced overhead introduced in block structures.
Data Transmission in UWB with the Use of Pulse Spectrum Modulation
2006 International Conference on Microwaves, Radar & Wireless Communications, 2006
A method of spectral modulation for ultra-wideband communication based on orthonormal transform w... more A method of spectral modulation for ultra-wideband communication based on orthonormal transform with the use of sine functions is proposed. The results obtained show its better BER performance than conventional scheme in AWGN channel. The proposed scheme is of lower complexity and has additional error detection opportunities in the frequency band.
Error Recovery for Huffman Codes Placed into Blocks
A method to recover symbol losses when Huffman codes are placed into fixed-length blocks and tran... more A method to recover symbol losses when Huffman codes are placed into fixed-length blocks and transmitted through a communication channel with bit inversion errors is proposed. The results obtained show that error performance may be improved only by exploiting the resynchronization technique, without the use of forward error control coding.
<title>Use of laser pulse position modulation for information transmission</title>
International Conference on Lasers, Applications, and Technologies 2007: Advanced Lasers and Systems, 2007
ABSTRACT The application of a single-pulse position modulation (SPPM) and a new concatenated sing... more ABSTRACT The application of a single-pulse position modulation (SPPM) and a new concatenated single-pulse position modulation (CPPM) for data transmission in optical indoor channels is shown. The numerical analysis of the extended multi-pulse position modulation (MPPM) and CPPM for information transmission done in aspects of bandwidth, power efficiency and symbol error probability (SER) has shown the better performance of CPPM and MPPM than SPPM at the cost of increased bandwidth. The obtained simulation results of SER for modulation schemes are close to theoretical SER evaluation and have shown the increase of power spectral density (PSD) of MPPM in comparison with SPPM.
Lecture Notes in Computer Science, 2013
An invisible flow watermarking QIM scheme based on linear errorcorrecting subcodes for channels w... more An invisible flow watermarking QIM scheme based on linear errorcorrecting subcodes for channels with substitution and deletion errors is proposed in this paper. The evaluation of scheme demonstrates similar to known scheme performance but with lower complexity as soon as its implementation is mainly based on linear decoding operations.
Variable-length codes can provide compression for data communication. Such codes may be used not ... more Variable-length codes can provide compression for data communication. Such codes may be used not only when the source statistics is known but also when we do not know the source probability distribution, and a source with equal symbol probabilities (equiprobable symbols) can or has to be assumed. This paper presents variable-length codes with code words that differ in length by at most one code symbol. Such codes suit the efficient encoding of sources with equiprobable symbols. We accommodate non-binary codes and present an iterative algorithm for the construction of such codes. We also calculate the average codeword length for such codes, which extends Krichevski's result for binary codes [5]. Finally, we propose a scheme that allows the code to be communicated efficiently from transmitter to receiver.
Uploads
Papers by Boris A Assanovich