Research in the field of quantum physics and electronics, with aim of designing and building quantum devices and quantum Internet, is carried out by scientists from many countries. Recently, the interests of researchers have been directed both to creation of wired networks (by connecting quantum devices via fiber optic cables) and through wireless devices (up to satellites located in Earth orbit). This investigation examines history of quantum devices development and quantum Internet both in foreign countries and in Russian Federation, and provides the diagram of connection between two quantum processors via router. The data on articles, reports and results of workshops (training events) published in scientific journals in bibliographic and abstract database Scopus are analyzed, and graphical dependencies are built on their basis. The data obtained show that interest of scientific community in the topic under consideration has grown significantly over the past decade. The article describes in detail the features, advantages and disadvantages of quantum Internet, which can accelerate the development of new-generation telecommunication networks, improve the research quality and obtain the specific results in this area.
Grape bushes are one of the most important cultivated plants, which are subject to various diseases leading to significant losses in agriculture. The use of robotic systems and neural networks helps improve the diagnosis and management of these problems, reducing time and resources, increasing accuracy and efficiency. New technologies open up new prospects for agriculture, improving crop yields and quality, reducing costs and improving the economic performance of enterprises. This paper presents a deep learning-based model for leaf lesion recognition in grape plants. As part of the study, an experiment was conducted on a dataset to test the effectiveness of the proposed architecture. The results showed that the new model exhibits effective recognition, outperforming most existing methods.
KEYWORDS: Video, Data hiding, Video processing, Video compression, Video coding, Image quality standards, Data processing, Standards development, RGB color model, Data storage
Research in the field of steganographic methods of information hiding in order to remain undetectable both statistically and for human perception is relevant, since using such files it is possible to hide various information using such content as container. During the investigation, the algorithms for embedding information in video stream were considered. Based on this, the method of embedding information into video file was chosen, specifically the process of writing characters of source text into the pixels of frames obtained from the video file. Key application in the software is defined also. The implementation of software tool for the process of hiding and extracting information in video stream to ensure the safe transmission of hidden information is the result of this article.
KEYWORDS: Binary data, Computer security, Data conversion, Information security, Cryptography, Data communications, Acoustics, Statistical analysis, Network security, Data hiding
In recent years, the random number generators in engineering applications have attracted the attention of many researchers. One of the most important aspects is to obtain some sequences of both truly random and pseudorandom numbers that can be applicated in the various fields of cryptography, signal processing, and in many other fields of engineering. At the production of pseudorandom number generators, chaotic maps are the source of entropy to create some randomness. Most of the methods based on chaotic maps have been attacked easily in recent years with the help of nonlinear prediction (forecasting), as well as analysis of the phase space on the map. A true random number generator is actual area of research when using in it the encryption. Encryption of any data with random source ensures the security of information. The purpose of this article is to develop the self-generated truly random numbers for audio encryption. For this aim, a sound encryption system was created. Digital audio data is converted to binary form. The XOR operation is performed to develop for truly random number generator. The testing systems NIST 800–22 Test Suite and TestU01 are ap-plied to the bit stream. The source data and the encryption key are evaluated for randomness. Audio encryption is performed with the generated bits. This article proves that the self–generated audio encryption system can be implemented. Statistical analysis and data distribution show that the encryption process with self–generation is successful. In this paper, the authors propose the model of sound encryption of self-generated true random number.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.