Концепція функціональних перетворень для формування синтаксичного опису діагоналей трансформанти

dc.citation.epage31
dc.citation.issue1
dc.citation.journalTitleІнфокомунікаційні технології та електронна інженерія
dc.citation.spage23
dc.citation.volume3
dc.contributor.affiliationХарківський національний університет ім. В. Н. Каразіна
dc.contributor.affiliationХарківський національний університет радіоелектроніки
dc.contributor.affiliationХарківський національний університет Повітряних сил ім. І. Кожедуба
dc.contributor.affiliationКиївський національний університет імені Тараса Шевченка
dc.contributor.affiliationV. N. Karazin Kharkiv National University
dc.contributor.affiliationKharkiv National University of Radio Electronics
dc.contributor.affiliationIvan Kozhedub National University of the Air Force
dc.contributor.affiliationTaras Shevchenko National University of Kyiv
dc.contributor.authorБараннік, В.
dc.contributor.authorШульгін, С.
dc.contributor.authorІгнатьєв, О.
dc.contributor.authorОнищенко, Р.
dc.contributor.authorБабенко, Ю.
dc.contributor.authorБараннік, В.
dc.contributor.authorBarannik, Volodymyr
dc.contributor.authorShulgin, Sergii
dc.contributor.authorIgnatyev, Oleksandr
dc.contributor.authorOnyshchenko, Roman
dc.contributor.authorBabenko, Yuriy
dc.contributor.authorBarannik, Valeriy
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-07-22T10:58:38Z
dc.date.created2023-02-28
dc.date.issued2023-02-28
dc.description.abstractОбґрунтовано наявність дисбалансу під час надання відеоінформаційних сервісів за допомогою інфокомунікаційних мереж. Показано, що такий дисбаланс спричинений деструктивними діями протиборчої сторони. Множина таких атак стосується виведення з ладу об’єктів енергетичної та телекомунікаційної інфраструктури. Це призводить до значного падіння пропускної здатності інфокомунікаційної мережі. Відповідно потрібно локалізувати дисбаланс між інформаційним навантаженням інфокомунікаційної мережі та її пропускною здатністю в умовах дії кризових факторів. Для цього необхідно використовувати комплексний підхід. У статті докладно розглянуто напрям щодо створення технологій додаткового зменшення бітового навантаження без втрат семантичної цілісності відеоінформаційних ресурсів. Однак для таких технологій під час зниження інформаційного навантаження мережі існує суперечність. З одного боку, досягається зниження інформаційного навантаження мережі. Але, з іншого боку, виникають втрати цілісності відеоінформації. Отже, потрібно створювати новий клас методів кодування. Відповідно для побудови технологій компресійного кодування необхідно розробити концепцію підходу. Створено теоретичну базу для побудови технології кодування трансформанти за нерівномірним діагональним форматом зі урахуванням її комбінаторної конфігурації, в основу якого покладено систему перетворень, окреслену як двошарове стискаюче кодування трансформант у нерівномірно-діагональному спектральному просторі.
dc.description.abstractThe article justifies the existence an imbalance in the provision of video information services using infocommunication networks. It is shown that such an imbalance is due to the destructive actions of the opposing side. Many these attacks relate to the disabling of energy and telecommunications infrastructure. This leads to a significant drop in the bandwidth of the infocommunication network. Accordingly, it is necessary to localize the imbalance between the information load infocommunication network and its bandwidth in the face of crisis factors. To do this, you must use an integrated approach. The article discusses in detail the direction creating technologies for additional reduction of bit load without losing the semantic integrity of video information resources. However, for such technologies in the process of reducing the information load of the network, there is a contradiction. On the one hand, a reduction in the information load of the network is achieved. But on the other hand, there are losses in the integrity video information. So you need to create a new class of encoding methods. Accordingly, to build compression coding technologies, it is necessary to develop an approach concept. A theoretical basis has been created for constructing the technology of encoding transformants in an uneven diagonal format, taking into account its combinatorial configuration. It is based on a system of transformations that is outlined as a two-layer compressive encoding transformer in an uneven diagonal spectral space.
dc.format.extent23-31
dc.format.pages9
dc.identifier.citationКонцепція функціональних перетворень для формування синтаксичного опису діагоналей трансформанти / В. Бараннік, С. Шульгін, О. Ігнатьєв, Р. Онищенко, Ю. Бабенко, В. Бараннік // Інфокомунікаційні технології та електронна інженерія. — Львів : Видавництво Львівської політехніки, 2023. — Том 3. — № 1. — С. 23–31.
dc.identifier.citationenConcept functional transformations for formation of syntactic description diagonals transformant / Volodymyr Barannik, Sergii Shulgin, Oleksandr Ignatyev, Roman Onyshchenko, Yuriy Babenko, Valeriy Barannik // Infocommunication Technologies and Electronic Engineering. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 3. — No 1. — P. 23–31.
dc.identifier.doidoi.org/10.23939/ictee2023.01.023
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/111435
dc.language.isouk
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofІнфокомунікаційні технології та електронна інженерія, 1 (3), 2023
dc.relation.ispartofInfocommunication Technologies and Electronic Engineering, 1 (3), 2023
dc.relation.references[1] Barannik V., Jancarczyk D.,Babenko Yu., Stepanko O., Nikodem J., Zawislak S. A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020): proceedings of IEEE 5nd International Symposium, 2020, pp. 1–5. DOI: 10.1109/IDAACS-SWS50031.2020.9297068.
dc.relation.references[2] Barannik V.. Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings of the IEEE 2nd International Conference, 2020, pp. 72–76. DOI: 10.1109/ATIT50783.2020.9349356.
dc.relation.references[3] Barannik D. Stegano-Compression Coding in a Non-Equalible Positional Base. Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings of the IEEE 2nd International Conference, 2020, pp. 83–86. DOI: 10.1109/ATIT50783.2020.9349328.
dc.relation.references[4] Barannik, V. V., Barannik, D., Tarasenko, D., Podlesny, S., Kulitsa, O. The video stream encoding method in infocommunication systems. IEEE 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (IEEE TCSET 2018), 2018, pp. 538–541. DOI: 10.1109/TCSET.2018. 8336259.
dc.relation.references[5] Albert Lekakh, Tatyana Belikova, Oleksii Dovbenko, Oleksandr Dodukh. Method of Increasing the Capacity of Information Threat Detection Filters in Modern Information and Communication Systems. Advanced Information and Communications Technologies (AICT 2019): proceedings of the IEEE 3rd International Conference, 2019, pp. 426–429. DОI: 10.1109/AIACT.2019.8847754.
dc.relation.references[6] Kobayashi, H. and Kiya, H.: Bitstream-Based JPEG Image Encryption with File-Size Preserving. In.: IEEE 7th Global Conference on Consumer Electronics (GCCE), pp. 1–4 (2018). DOI: 10.1109/gcce.2018.8574605.
dc.relation.references[7] Shamir A., Rivest R. L., Adleman L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978, Vol. 21, iss. 2, pp. 120–126. DOI: 10.1145/359340.359342.
dc.relation.references[8] V. Barannik, V. Tverdokhleb, N. Kharchenko, O. Kulitsa, “The issue of timely delivery of video traffic with controlled loss of quality”, in 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, pp. 902–904. DOI: 10.1109/TCSET.2016.7452220.
dc.relation.references[9] Belikova T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Advanced Trends in Information Theory (ATIT): proceedings of the 2nd IEEE International Conference, 2020, pp. 87–91. URL: https://ieeexplore.ieee.org/document/9349300.
dc.relation.references[10] Kiya H., Kurihara K., Watanabe O. An encryption-then-compression system for JPEG XR standard. Broadband Multimedia Systems and Broadcasting (BMSB): proceedings of the IEEE International Symposium, 2016, pp. 1–5. DOI: 10.1109/BMSB.2016.7521997.
dc.relation.references[11] X., Au O. C. , Zhou J., Liu Tang Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security. 2014, Vol. 9, No. 1, pp. 39–50. DOI: 10.1109/TIFS.2013.2291625.
dc.relation.references[12] Barannik V., Gurzhii P., Belikova T., The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents. Advanced Trends in Information Theory (ATIT`2019): proceedings of the IEEE International Conference, 2019, pp. 656–661. DOI: 10.1109/ATIT49449.2019.9030432.
dc.relation.references[13] Barannik, V., Barannik, N., Sidchenko, S., Khimenko, A. The method of masking overhead compaction in video compression systems, Radioelectronic and Computer Systems, 2021, No. 2, pp. 51–63. DOI: https://doi.org/10.32620/reks.2021.2.05.
dc.relation.references[14] A. Skodras, C. Christopoulos, and T. Ebrahimi, “The jpeg 2000 still image compression standard”, in IEEE Signal processing magazine, 2001, Vol. 18 (5), pp. 36–58.
dc.relation.references[15] Minemura, K. and Moayed, Z. and Wong, K. and Qi, X. and Tanaka, K.: JPEG image scrambling without expansion in bitstream size. In.: 19th IEEE International Conference on Image Processing, pp. 261–264 (2012) DOI: 10.1109/ICIP.2012.6466845.
dc.relation.references[16] JPEG image scrambling without expansion in bitstream size [Text] / K. Minemura, Z. Moayed, K. Wong, X. Qi, K. Tanaka // 19 th IEEE International Conference on Image Processing. 2012, pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.references[17] JPEG image scrambling without expansion in bitstream size [Text] / K. Minemura, Z. Moayed, K. Wong, X. Qi, K. Tanaka. Image Processing: proc. 19 th IEEE Int. Conf., 30 Sept. – 3 Oct. 2012. Orlando, FL, USA, 2012. pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.references[18] Бараннік В. В., Шульгін С. С., Бараннік Н. В., Бабенко Ю. М., Пугачев Р. В. Проблематичні аспекти забезпечення дистанційного відеосервісу в кризовій ситуації. Кібербезпека. освіта, наука, техніка, 2020. № 1(1), С. 13–22.
dc.relation.references[19] Deshmukh, M., Nain N., Ahmed M. An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic [Text]. Advanced Information Networking and Applications: proc. IEEE 30 th Int. Conf. (AINA), 23–25 March 2016. Crans-Montana, Switzerland, 2016, pp. 690–697. DOI: 10.1109/aina.2016.56.
dc.relation.references[20] Rivest, R. L., Shamir A., Adleman L. M. A method for obtaining digital signatures and public-key cryptosystems [Text]. Communications of the ACM, 1978, Vol. 21, Iss. 2, pp. 120–126. DOI: 10.1145/359340.359342.
dc.relation.references[21] Barannik V., Barannik D. Barannik N., Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020): proceedings of 15 th IEEE International Conference, 2020, pp. 699–702. DOI: 10.1109/TCSET49122.2020.235522.
dc.relation.references[22] Barannik V., Havrylov D., Barannik V., Sorokun A. Development Second and Third Phase of the Selective Frame Processing Method. Advanced Information and Communications Technologies (AICT`2019): proceedings of the 3rd International Conference, 2019, pp. 54–57. DOI: 10.1109/AIACT.2019.8847897.
dc.relation.references[23] Wong K. W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos, 2009, Vol. 184, pp. 333–354. DOI: 10.1007/978-3-540-95972-4_16.
dc.relation.references[24] Barannik V., Slobodyanyuk O., Gurzhii P., Shulgin S., Krasnorutsky A., Korolyova N. Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings IEEE 2nd International Conference, 2020, pp. 38–43. DOI: 10.1109/ATIT50783.2020.9349257.
dc.relation.references[25] Wong K., Qi X., Minemura K., Moayed Z., Tanaka K. JPEG image scrambling without expansion in bitstream size. Image Processing: proceedings of the 19 th IEEE International Conference, 2012, pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.references[26] V. Barannik, S. Shulgin, V. Himenko, V. Kolesnyk, P. Hurzhii and S. Podlesny, Method of Encoding Video Frames in Infocommunication Systems. IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET 2022), 2022, pp. 521–524. DOI: 10.1109/TCSET55632. 2022.9767028.
dc.relation.references[27] Barannik V. V., Karpenko S. Method of the 3-D image processing. Modern Problems of Rodio Engineering, Telecommunicotions ond Cоmputer Scіence (IEEE TCSET 2008): proceedings of IEEE Internotiоnol Cоnference, 2008, pp. 378–380.
dc.relation.references[28] Шульгін С. С. Технологія кодування трансформованих відеосегментів в нерівноваговому діагонально-позиційному просторі. Наукоємні технології, 2022, № 2(54), С. 147–154.
dc.relation.references[29] Barannik V., Khimenko V., Barannik N. Method of indirect information hiding in the process of video compression. Radioelectronic and Computer Systems, 2021, No. 4, pp. 119–131. DOI: https://doi.org/10.32620/reks.2021.4.
dc.relation.references[30] Бараннік В. В., Бараннік Д. В., Шульгін С. С., Колесник В. О. Метод виявлення значимої інформації в просторово-часовій області відеознімку. Сучасна спеціальна техніка, 2022, № 4, С. 22–33.
dc.relation.referencesen[1] Barannik V., Jancarczyk D.,Babenko Yu., Stepanko O., Nikodem J., Zawislak S. A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020): proceedings of IEEE 5nd International Symposium, 2020, pp. 1–5. DOI: 10.1109/IDAACS-SWS50031.2020.9297068.
dc.relation.referencesen[2] Barannik V.. Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings of the IEEE 2nd International Conference, 2020, pp. 72–76. DOI: 10.1109/ATIT50783.2020.9349356.
dc.relation.referencesen[3] Barannik D. Stegano-Compression Coding in a Non-Equalible Positional Base. Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings of the IEEE 2nd International Conference, 2020, pp. 83–86. DOI: 10.1109/ATIT50783.2020.9349328.
dc.relation.referencesen[4] Barannik, V. V., Barannik, D., Tarasenko, D., Podlesny, S., Kulitsa, O. The video stream encoding method in infocommunication systems. IEEE 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (IEEE TCSET 2018), 2018, pp. 538–541. DOI: 10.1109/TCSET.2018. 8336259.
dc.relation.referencesen[5] Albert Lekakh, Tatyana Belikova, Oleksii Dovbenko, Oleksandr Dodukh. Method of Increasing the Capacity of Information Threat Detection Filters in Modern Information and Communication Systems. Advanced Information and Communications Technologies (AICT 2019): proceedings of the IEEE 3rd International Conference, 2019, pp. 426–429. DOI: 10.1109/AIACT.2019.8847754.
dc.relation.referencesen[6] Kobayashi, H. and Kiya, H., Bitstream-Based JPEG Image Encryption with File-Size Preserving. In., IEEE 7th Global Conference on Consumer Electronics (GCCE), pp. 1–4 (2018). DOI: 10.1109/gcce.2018.8574605.
dc.relation.referencesen[7] Shamir A., Rivest R. L., Adleman L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978, Vol. 21, iss. 2, pp. 120–126. DOI: 10.1145/359340.359342.
dc.relation.referencesen[8] V. Barannik, V. Tverdokhleb, N. Kharchenko, O. Kulitsa, "The issue of timely delivery of video traffic with controlled loss of quality", in 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, pp. 902–904. DOI: 10.1109/TCSET.2016.7452220.
dc.relation.referencesen[9] Belikova T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Advanced Trends in Information Theory (ATIT): proceedings of the 2nd IEEE International Conference, 2020, pp. 87–91. URL: https://ieeexplore.ieee.org/document/9349300.
dc.relation.referencesen[10] Kiya H., Kurihara K., Watanabe O. An encryption-then-compression system for JPEG XR standard. Broadband Multimedia Systems and Broadcasting (BMSB): proceedings of the IEEE International Symposium, 2016, pp. 1–5. DOI: 10.1109/BMSB.2016.7521997.
dc.relation.referencesen[11] X., Au O. C. , Zhou J., Liu Tang Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security. 2014, Vol. 9, No. 1, pp. 39–50. DOI: 10.1109/TIFS.2013.2291625.
dc.relation.referencesen[12] Barannik V., Gurzhii P., Belikova T., The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents. Advanced Trends in Information Theory (ATIT`2019): proceedings of the IEEE International Conference, 2019, pp. 656–661. DOI: 10.1109/ATIT49449.2019.9030432.
dc.relation.referencesen[13] Barannik, V., Barannik, N., Sidchenko, S., Khimenko, A. The method of masking overhead compaction in video compression systems, Radioelectronic and Computer Systems, 2021, No. 2, pp. 51–63. DOI: https://doi.org/10.32620/reks.2021.2.05.
dc.relation.referencesen[14] A. Skodras, C. Christopoulos, and T. Ebrahimi, "The jpeg 2000 still image compression standard", in IEEE Signal processing magazine, 2001, Vol. 18 (5), pp. 36–58.
dc.relation.referencesen[15] Minemura, K. and Moayed, Z. and Wong, K. and Qi, X. and Tanaka, K., JPEG image scrambling without expansion in bitstream size. In., 19th IEEE International Conference on Image Processing, pp. 261–264 (2012) DOI: 10.1109/ICIP.2012.6466845.
dc.relation.referencesen[16] JPEG image scrambling without expansion in bitstream size [Text], K. Minemura, Z. Moayed, K. Wong, X. Qi, K. Tanaka, 19 th IEEE International Conference on Image Processing. 2012, pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.referencesen[17] JPEG image scrambling without expansion in bitstream size [Text], K. Minemura, Z. Moayed, K. Wong, X. Qi, K. Tanaka. Image Processing: proc. 19 th IEEE Int. Conf., 30 Sept, 3 Oct. 2012. Orlando, FL, USA, 2012. pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.referencesen[18] Barannik V. V., Shulhin S. S., Barannik N. V., Babenko Yu. M., Puhachev R. V. Problematychni aspekty zabezpechennia dystantsiinoho videoservisu v kryzovii sytuatsii. Kiberbezpeka. osvita, nauka, tekhnika, 2020. No 1(1), P. 13–22.
dc.relation.referencesen[19] Deshmukh, M., Nain N., Ahmed M. An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic [Text]. Advanced Information Networking and Applications: proc. IEEE 30 th Int. Conf. (AINA), 23–25 March 2016. Crans-Montana, Switzerland, 2016, pp. 690–697. DOI: 10.1109/aina.2016.56.
dc.relation.referencesen[20] Rivest, R. L., Shamir A., Adleman L. M. A method for obtaining digital signatures and public-key cryptosystems [Text]. Communications of the ACM, 1978, Vol. 21, Iss. 2, pp. 120–126. DOI: 10.1145/359340.359342.
dc.relation.referencesen[21] Barannik V., Barannik D. Barannik N., Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020): proceedings of 15 th IEEE International Conference, 2020, pp. 699–702. DOI: 10.1109/TCSET49122.2020.235522.
dc.relation.referencesen[22] Barannik V., Havrylov D., Barannik V., Sorokun A. Development Second and Third Phase of the Selective Frame Processing Method. Advanced Information and Communications Technologies (AICT`2019): proceedings of the 3rd International Conference, 2019, pp. 54–57. DOI: 10.1109/AIACT.2019.8847897.
dc.relation.referencesen[23] Wong K. W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos, 2009, Vol. 184, pp. 333–354. DOI: 10.1007/978-3-540-95972-4_16.
dc.relation.referencesen[24] Barannik V., Slobodyanyuk O., Gurzhii P., Shulgin S., Krasnorutsky A., Korolyova N. Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings IEEE 2nd International Conference, 2020, pp. 38–43. DOI: 10.1109/ATIT50783.2020.9349257.
dc.relation.referencesen[25] Wong K., Qi X., Minemura K., Moayed Z., Tanaka K. JPEG image scrambling without expansion in bitstream size. Image Processing: proceedings of the 19 th IEEE International Conference, 2012, pp. 261–264. DOI: 10.1109/ICIP.2012.6466845.
dc.relation.referencesen[26] V. Barannik, S. Shulgin, V. Himenko, V. Kolesnyk, P. Hurzhii and S. Podlesny, Method of Encoding Video Frames in Infocommunication Systems. IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET 2022), 2022, pp. 521–524. DOI: 10.1109/TCSET55632. 2022.9767028.
dc.relation.referencesen[27] Barannik V. V., Karpenko S. Method of the 3-D image processing. Modern Problems of Rodio Engineering, Telecommunicotions ond Computer Science (IEEE TCSET 2008): proceedings of IEEE Internotionol Conference, 2008, pp. 378–380.
dc.relation.referencesen[28] Shulhin S. S. Tekhnolohiia koduvannia transformovanykh videosehmentiv v nerivnovahovomu diahonalno-pozytsiinomu prostori. Naukoiemni tekhnolohii, 2022, No 2(54), P. 147–154.
dc.relation.referencesen[29] Barannik V., Khimenko V., Barannik N. Method of indirect information hiding in the process of video compression. Radioelectronic and Computer Systems, 2021, No. 4, pp. 119–131. DOI: https://doi.org/10.32620/reks.2021.4.
dc.relation.referencesen[30] Barannik V. V., Barannik D. V., Shulhin S. S., Kolesnyk V. O. Metod vyiavlennia znachymoi informatsii v prostorovo-chasovii oblasti videoznimku. Suchasna spetsialna tekhnika, 2022, No 4, P. 22–33.
dc.relation.urihttps://ieeexplore.ieee.org/document/9349300
dc.relation.urihttps://doi.org/10.32620/reks.2021.2.05
dc.relation.urihttps://doi.org/10.32620/reks.2021.4
dc.rights.holder© Національний університет “Львівська політехніка”, 2023
dc.subjectвідеосервіси
dc.subjectкодування відеосегментів
dc.subjectтрансформанта
dc.subjectнерівномірні діагоналі
dc.subjectvideo services
dc.subjectvideo segment coding
dc.subjecttransformer
dc.subjectuneven diagonals
dc.subject.udc621.126
dc.titleКонцепція функціональних перетворень для формування синтаксичного опису діагоналей трансформанти
dc.title.alternativeConcept functional transformations for formation of syntactic description diagonals transformant
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2023v3n1_Barannik_V-Concept_functional_transformations_23-31.pdf
Size:
1022.25 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2023v3n1_Barannik_V-Concept_functional_transformations_23-31__COVER.png
Size:
1.17 MB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.96 KB
Format:
Plain Text
Description: