Krasnodar Military School named S.M. Shtemenko
Author list of organization
List of articles written by the authors of the organization
-
IDEOLOGY OF THE RUSSIAN STATEHOOD AND DOMESTIC PHILOSOPHICAL TRADITION
DescriptionThe ideology of the Russian statehood has essential value both in connection with globalization tendencies, and in connection with problems of development of the Russian civil identity. In the article we give an assessment of shortcomings of ideological process of the USSR in connection with the nihilistic attitude towards domestic spiritual tradition. The main lines of traditional Russian philosophy essential from the point of view of history of ideological consciousness in Russia are considered
-
Description
The article deals with the peculiarities of the formation process of moral and combat cadets’ qualities and specific features of training for active service in peacetime or in times of conflict. Cadets’ moral qualities are presented as special moral orientation of personality inherent in soldiers’ moral character traits, as well as their worldview, ideals and other socially beneficial interests, their sense of duty, patriotism, internationalism, hatred for external and internal enemies, self-sacrifice, personal responsibility for their Homeland. An attempt has been made to investigate the moral and psychological development of cadets, to study the process of cadets’ upbringing by their direct and superior commanders
-
ORGANIZATION OF A CONCEPT DICTIONARY FOR IDENTIFICATION SYSTEM OF DATA WITH LIMITED DISTRIBUTION
DescriptionThe article deals with the problem of efficiency increase of the control of the information with limited distribution, which circulates in general purpose information networks, by means of working out an automated identification system of data with limited distribution. The purpose of working out the system is timely identification and prevention of leakage of information with limited distribution. There is a technique to construct a dictionary as a phase of working out an automated identification system of data with limited distribution suggested. It describes: 1) an order of association of the word forms having one semantic value in concepts which are designated by simple numbers; 2) the order of association of concepts in the data designated by natural numbers, thus the data identifier is a product of concept identifiers; 3) an order of representation of word forms their graphic bases; 4) designation of intraphrase connectors in concepts presented by word-combinations; 5) an order of representation of word forms in the form of abstract type of data - prefix tree; 6) an order of association of concepts of the formalizable document in the general prefix tree of graphic bases of word forms; 7) an order of identification of graphic bases in the tree. It defines: 1) restrictions on the size of the dictionary at the use of 64-digit processors, in a case if the operational system does not support arithmetics of repeated accuracy; 2) a maximum quantity of concepts of an analyzed fragment of the text; 3) the maximum value of the identifier of concepts and a maximum quantity of concepts of the dictionary. There is a table presented, illustrating the correlation between these three values
-
DATA INTEGRITY IN THE AUTOMATED SYSTEM BASED ON LINEAR SYSTEMS HASHES
DescriptionTo protect your data (data integrity) in the automated systems, we provide a solution of the problem, which is to reduce redundancy control of information (hash codes, electronic signatures). We impose restrictions on the maximum number of violations of the integrity of the records in the data block. It is known, that with an increase in data protection the amount of control information (coefficient of redundancy) also increases. We introduce the concept of linear systems of hash codes (LSHC). On the basis of the mathematical apparatus of the theory of systems of vectors we have developed an algorithm for constructing LSHC, which allows (for a given level of data protection, i.e. integrity) to reduce the redundancy of the control information. Rules (principles) of building LSHC comply with the rules of construction in coding theory (Hamming codes). The article provides an algorithm for data integrity in LSHC. The use of algorithms ensures the necessary level of data protection and the requirements specification of customers