Article Fingerprint
ReserarchID
NE9NN
We examine applications of expanded algorithms of formant analysis of modern number theory for protection of binary information from hacking and intentional distortion in various IT-systems. These include real-time confidential conversations and information exchange between server and client through local or external networks, as well as phone and mobile communications based on a modified RSA-m cryptosystem, which realizes quick change of keys and guarantees the degree of secrecy in short or medium term.
Vyacheslav Kunev. 2026. \u201cReal-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 22 (GJRE Volume 22 Issue F1): .
Crossref Journal DOI 10.17406/gjre
Print ISSN 0975-5861
e-ISSN 2249-4596
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 101
Country: Moldova
Subject: Global Journal of Research in Engineering - F: Electrical & Electronic
Authors: Vyacheslav Kunev (PhD/Dr. count: 0)
View Count (all-time): 238
Total Views (Real + Logic): 1868
Total Downloads (simulated): 50
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
We examine applications of expanded algorithms of formant analysis of modern number theory for protection of binary information from hacking and intentional distortion in various IT-systems. These include real-time confidential conversations and information exchange between server and client through local or external networks, as well as phone and mobile communications based on a modified RSA-m cryptosystem, which realizes quick change of keys and guarantees the degree of secrecy in short or medium term.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.