{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T22:37:57Z","timestamp":1648593477879},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s11633-012-0675-8","type":"journal-article","created":{"date-parts":[[2012,10,10]],"date-time":"2012-10-10T08:55:56Z","timestamp":1349859356000},"page":"518-529","source":"Crossref","is-referenced-by-count":0,"title":["Methods for controlling the authenticity of textual information transfer on the basis of statistical and structural redundancy"],"prefix":"10.1007","volume":"9","author":[{"given":"Akmal R.","family":"Akhatov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,11]]},"reference":[{"key":"675_CR1","first-page":"598","volume-title":"Proceedings of the 14th National Conference on Artificial Intelligence","author":"E. Charniak","year":"1997","unstructured":"E. Charniak. Statistical parsing with a context-free grammar and word statistics. In Proceedings of the 14th National Conference on Artificial Intelligence, ACM, Menlo Park, USA, pp. 598\u2013603, 1997."},{"issue":"4","key":"675_CR2","first-page":"467","volume":"18","author":"P. F. Brown","year":"1992","unstructured":"P. F. Brown, V. D. Pietra, P. V. DeSouza, J. C. Lai, R. L. Mercer. Class-based n-gram models of natural language. Computational Linguistics, vol. 18, no. 4, pp. 467\u2013479, 1992.","journal-title":"Computational Linguistics"},{"key":"675_CR3","first-page":"32","volume-title":"Proceedings of IEEE Southeastcon","author":"R. J. Duncan","year":"1999","unstructured":"R. J. Duncan, V. Mantha, Y. Wu, J. Zhao. Implementation and analysis of speech recognition front-ends. In Proceedings of IEEE Southeastcon, IEEE, Lexington, USA, pp. 32\u201335, 1999."},{"key":"675_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CANET.2006.279244","volume-title":"Proceedings of the 2nd IEEE\/IFIP International Conference in Central Asia on Internet","author":"I. I. Jumanov","year":"2006","unstructured":"I. I. Jumanov, A. R. Akhatov. Improvement of text information processing quality in documents processing systems. In Proceedings of the 2nd IEEE\/IFIP International Conference in Central Asia on Internet, IEEE, Tashkent, Uzbekistan, pp. 1\u20135, 2006."},{"key":"675_CR5","doi-asserted-by":"crossref","unstructured":"I. I. Jumanov, A. R. Akhatov, O. I. Djumanov. An effective quality control of textual information on the basis of statistical redundancy in distributed mobile IT systems and e-applications. In Proceedings of the 3rd IEEE\/IFIP International Conference in Central Asia on Internet, Tashkent, Uzbekistan, pp. 1\u20135, 2007.","DOI":"10.1109\/CANET.2007.4401712"},{"key":"675_CR6","unstructured":"I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Use of N-gram statistics for checking of the texts transfer quality in intellectual information systems. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 153\u2013159, 2008."},{"key":"675_CR7","doi-asserted-by":"crossref","unstructured":"M. Degermark, B. Nordgren, S. Pink. IP Header Compression, RFC 2507, 1999. [Online], Available: http:\/\/www.ietf.org\/rfc\/rfc2507.txt , February 15, 2012.","DOI":"10.17487\/rfc2507"},{"issue":"4","key":"675_CR8","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TCOM.1980.1094698","volume":"28","author":"F. A. Tobagi","year":"1980","unstructured":"F. A. Tobagi. Multi-access protocols in packet communications systems. IEEE Transactions on Communications, vol. 28, no. 4, pp. 468\u2013488, 1980.","journal-title":"IEEE Transactions on Communications"},{"key":"675_CR9","doi-asserted-by":"crossref","unstructured":"S. Casner, V. Jacobson. Compressing IP\/UDP\/RTP Headers for Low-speed Serial Links, RFC 2508, 1999. [Online], Available: http:\/\/www.ietf.org\/rfc\/rfc2508.txt , February 15, 2012.","DOI":"10.17487\/rfc2508"},{"key":"675_CR10","doi-asserted-by":"crossref","unstructured":"M. Wahl. A Summary of the X.500(96) User Schema for Use with LDAPv3, RFC 2256, 1997. [Online], Available: http:\/\/www.ipa.go.jp\/security\/rfc\/RFC2256EN.html , February 15, 2012.","DOI":"10.17487\/rfc2256"},{"key":"675_CR11","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, T. Wright. Transport Layer Security (TLS) Extensions, RFC 3546, 2003. [Online], Available: http:\/\/www.ietf.org\/rfc\/rfc3546.txt , February 15, 2012.","DOI":"10.17487\/rfc3546"},{"key":"675_CR12","unstructured":"I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Definition of transfer efficiency parameters of IPpackets headings for the reliability control. In Proceedings of the 9th International Conference on Electronics, Information and Communication, Tashkent, Uzbekistan, pp. 115\u2013119, 2008."},{"issue":"4","key":"675_CR13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s11633-008-0381-8","volume":"5","author":"L. Yang","year":"2008","unstructured":"L. Yang, X. P. Guan, C. N. Long, X. Y. Luo. Feedback stabilization over wireless network using adaptive coded modulation. International Journal of Automation and Computing, vol. 5, no. 4, pp. 381\u2013388, 2008.","journal-title":"International Journal of Automation and Computing"},{"issue":"4","key":"675_CR14","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/s11633-008-0389-0","volume":"5","author":"X. M. Tang","year":"2008","unstructured":"X. M. Tang, J. S. Yu. Feedback scheduling of model-based networked control systems with flexible workload. International Journal of Automation and Computing, vol. 5, no. 4, pp. 389\u2013394, 2008.","journal-title":"International Journal of Automation and Computing"},{"key":"675_CR15","unstructured":"C. Bormann, C. Burmeister, M. Degermark, H. Fukushima, H. Hannu, L. E. Jonsson, R. Hakenberg, T. Koren, K. Le, Z. Liu, A. Martensson, A. Miyazaki, K. Svanbro, T. Wiebke, T. Yoshimura, H. Zheng. Robust Header Compression, RFC 3095, 2001. [Online], Available: http:\/\/www.ietf.org\/rfc\/rfc3095.txt , February 15, 2012."},{"issue":"7","key":"675_CR16","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"J. Cox","year":"1999","unstructured":"J. Cox, M. Miller, A. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, vol. 87, no. 7, pp. 1127\u20131141, 1999.","journal-title":"Proceedings of the IEEE"},{"key":"675_CR17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Proceedings of the 1st International Workshop on Information Hiding","author":"R. J. Anderson","year":"1996","unstructured":"R. J. Anderson. Stretching the limits of steganography. In Proceedings of the 1st International Workshop on Information Hiding, ACM, London, UK, vol. 1174, pp. 39\u201348, 1996."},{"key":"675_CR18","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/ICIP.1996.560422","volume-title":"Proceedings of International Conference on Image Processing","author":"I. Pitas","year":"1996","unstructured":"I. Pitas. A method for signature casting on digital images. In Proceedings of International Conference on Image Processing, IEEE, Lausanne, Switzerland, vol. 3, pp. 215\u2013218, 1996."},{"key":"675_CR19","first-page":"2061","volume-title":"Proceedings of the International Conference on Acoustics, Speech and Signal Processing","author":"B. Chen","year":"1999","unstructured":"B. Chen, G. W. Wornell. An information-theoretic approach to the design of robust digital watermarking systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing, IEEE, Phoenix, USA, vol. 4, pp. 2061\u20132064, 1999."},{"key":"675_CR20","unstructured":"I. I. Jumanov, A. R. Akhatov. Estimation of reliability for the system of mistakes dynamic control at transfer and processing of the text information. In Proceedings of International School and Conference on Foliations, Dynamical Systems, Singularity Theory and Perverse Sheaves, Uzbekistan, Samarkand, pp. 80\u201385, 2010."},{"issue":"1","key":"675_CR21","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s11633-010-0123-6","volume":"7","author":"H. Al-Bahadili","year":"2010","unstructured":"H. Al-Bahadili, S. M. Hussain. A bit-level text compression scheme based on the ACWalgorithm. International Journal of Automation and Computing, vol. 7, no. 1, pp. 123\u2013131, 2010.","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"675_CR22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11633-010-0031-9","volume":"7","author":"Q. C. Wang","year":"2010","unstructured":"Q. C. Wang, Y. H. Gong, C. H. Yang, C. H. Li. Robust object tracking under appearance change conditions. International Journal of Automation and Computing, vol. 7, no. 1, pp. 31\u201338, 2010.","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"675_CR23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s11633-010-0017-7","volume":"7","author":"S. E. I. Baba","year":"2010","unstructured":"S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17\u201322, 2010.","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"675_CR24","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.jspi.2004.02.010","volume":"133","author":"B. Y. Ryabko","year":"2005","unstructured":"B. Y. Ryabko, V. A. Monarev. Using information theory approach to randomness testing. Journal of Statistical Planning and Inference, vol. 133, no. 1, pp. 95\u2013110, 2005.","journal-title":"Journal of Statistical Planning and Inference"},{"key":"675_CR25","first-page":"382","volume-title":"Proceedings of Data Compression Conference","author":"B. Ryabko","year":"2004","unstructured":"B. Ryabko, J. Astola. Universal coding of function spaces as a model for signal compression. In Proceedings of Data Compression Conference, IEEE, Snowbird, Utah, pp. 382\u2013388, 2004."},{"issue":"2","key":"675_CR26","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1134\/S1054661808020090","volume":"18","author":"K. V. Vorontsov","year":"2008","unstructured":"K. V. Vorontsov. Combinatorial probability and the tightness of generalization bounds. Pattern Recognition and Image Analysis, vol. 18, no. 2, pp. 243\u2013259, 2008.","journal-title":"Pattern Recognition and Image Analysis"},{"key":"675_CR27","unstructured":"A. R. Akhatov. Technique for definition N-gram mistakes estimations in the automated systems of information processing. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 146\u2013153, 2008."},{"issue":"1","key":"675_CR28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s11633-010-0023-9","volume":"7","author":"J. Sun","year":"2010","unstructured":"J. Sun, Y. J. Xing. An effective image retrieval mechanism using family-based spatial consistency filtration with object region. International Journal of Automation and Computing, vol. 7, no. 1, pp. 23\u201330, 2010.","journal-title":"International Journal of Automation and Computing"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0675-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-012-0675-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0675-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T11:10:40Z","timestamp":1562238640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-012-0675-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["675"],"URL":"https:\/\/doi.org\/10.1007\/s11633-012-0675-8","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10]]}}}