AI is only as good as the data behind it.

Incomplete recordings = unreliable insights.

Thatโ€™s why Revcord focuses on secure, dependable recordings firstโ€”then builds AI tools like ReVI on top of that foundation.

#AI #PublicSafety #DataIntegrity

โ—Update on Plagiarism and Falsification in Scientific Publications

Today, I officially submitted requests for the retraction of articles to the editorial boards of the journals "Land Reclamation and Water Management" and "Bulletin of NUWM".

โ—Key facts of misconduct:
๐Ÿ”น Plagiarism: Unauthorized use of my original relief map (2015) without citation.
๐Ÿ”น Falsification: Intentional removal (retouching) of the authorโ€™s stamp with coordinates and date-time on site photographs.
๐Ÿ”น Duplication: Publication of identical material in 2021 and 2024.

Next steps:
In the event of attempts to covertly remove the articles without an official retraction notice, relevant complaints will be forwarded directly to @crossref and the international members of the editorial boards.

#OpenScience #ResearchMisconduct #AcademicMastodon #ScientificIntegrity #Hydrology #Geoscience #GIS #FediScience #Plagiarism #SvystunovaGully #COPE #Crossref #DataIntegrity #ImageManipulation #AcademicChatter #ResearchEthics #EarthScience #HigherEducation

The Hamming Quasi-Cyclic (HQC) Algorithm: An Overview

Hamming Quasi-Cyclic (HQC) ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์˜ค๋ฅ˜ ์ •์ • ์ฝ”๋“œ ๋ถ„์•ผ์—์„œ ํšจ์œจ์„ฑ๊ณผ ๊ฐ•๋ ฅํ•œ ์„ฑ๋Šฅ์„ ๊ฒฐํ•ฉํ•œ ํ˜์‹ ์  ๋ฐฉ๋ฒ•์œผ๋กœ, ํŠนํžˆ ์ฝ”๋“œ ๊ธฐ๋ฐ˜ ์•”ํ˜ธํ•™๊ณผ ํฌ์ŠคํŠธ ์–‘์ž ๋ณด์•ˆ์— ์ ํ•ฉํ•˜๋‹ค. HQC๋Š” ์ค€์ˆœํ™˜ ๊ตฌ์กฐ๋ฅผ ํ™œ์šฉํ•ด ์ธ์ฝ”๋”ฉ๊ณผ ๋””์ฝ”๋”ฉ ๊ณผ์ •์„ ์ตœ์ ํ™”ํ•˜๋ฉฐ, ํ†ต์‹ ๊ณผ ๋ฐ์ดํ„ฐ ์ €์žฅ์—์„œ ๋ฐ์ดํ„ฐ ๋ฌด๊ฒฐ์„ฑ์„ ๋ณด์žฅํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•œ๋‹ค. ๊ธฐ์กด์˜ Reed-Solomon, Turbo ์ฝ”๋“œ ๋Œ€๋น„ ๊ณ„์‚ฐ ํšจ์œจ์„ฑ๊ณผ ์–‘์ž ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋‚ด์„ฑ์„ ๊ฐ–์ถ”๊ณ  ์žˆ์–ด ์ฐจ์„ธ๋Œ€ ๋ณด์•ˆ ํ†ต์‹ ์— ์œ ๋งํ•˜๋‹ค. ๋‹ค๋งŒ, ๊ณ„์‚ฐ ๋ณต์žก์„ฑ๊ณผ ๊ธฐ์กด ์‹œ์Šคํ…œ๊ณผ์˜ ํ†ตํ•ฉ ๋ฌธ์ œ ๋“ฑ ๊ตฌํ˜„์ƒ์˜ ๋„์ „ ๊ณผ์ œ๊ฐ€ ์กด์žฌํ•œ๋‹ค.

https://entropiq.com/hqc/

#errorcorrection #postquantumcryptography #hammingquasicyclic #codebasedcryptography #dataintegrity

The Hamming Quasi-Cyclic (HQC) Algorithm: An Overview    - EntropiQ

Learn about the innovative Hamming Quasi-Cyclic Algorithm and its applications in code-based cryptography.

EntropiQ

โ— While preparing a literature review for my monograph on the hydrogeochemical impact of mine waters, I discovered the unauthorized use of my original materials in articles published in 2021 and 2024. Both publications were prepared with the primary involvement of staff from the Institute of Water Problems and Land Reclamation of the National Academy of Agricultural Sciences of Ukraine (IWPLR NAASU).

An analysis revealed facts that go beyond a simple copyright violation:
๐Ÿ”น Data Falsification: Original photo metadata (date, time, GPS) was intentionally retouched to conceal their 2015 origin and authorship.
๐Ÿ”น Methodological Anachronism: Using 2015 data for 2024 modeling renders results invalid by ignoring the major infrastructure overhaul launched in early 2025.
๐Ÿ”น Institutional Failure: This misconduct by state academy staff signals a systemic collapse of research quality control and ethical oversight within the institutions.

#ScientificMisconduct #SvystunovaGully #ResearchEthics #DataIntegrity #Plagiarism

๐Ÿš€๐ŸŽฉ Behold! The magical realm of Lakehouse architecture! Apparently, disabling FPW in #Postgres speeds up writes by 5xโ€”because who needs data integrity anyway, right? ๐Ÿ™„ Meanwhile, the #Databricks blog is a masterclass in how to disguise a sales pitch as an innovation breakthrough. ๐Ÿค‘
https://www.databricks.com/blog/how-lakebase-architecture-delivers-5x-faster-postgres-writes #LakehouseArchitecture #DataIntegrity #InnovationBreakthrough #HackerNews #ngated
How lakebase architecture delivers 5x faster Postgres writes

In a

Databricks

RE: https://mastodon.social/@arstechnica/116518027082154811

This technique is commonly used for insider detection. Plant a unique canary in a datasource someone has access to and see which canary shows up and you have the leaker.

Another technique inverted to this purpose to spot manipulation without using obvious hashes or digital signatures is to insert a specific message into a plaintext that may be formatted wrong or not comply with the uniformity then get a HMAC signature out of it. Loop through the data and check if the MAC is created. This is called Chaffing and Winnowing:
https://en.wikipedia.org/wiki/Chaffing_and_winnowing

#cryptography #insiderdetection #espionage #dataintegrity #manipulation

Transaction logs enable point-in-time recovery in financial databases. By replaying log entries up to a specific moment, a system can reconstruct its exact state before a failure, data corruption, or erroneous transaction.

#TransactionLog #Fintech #DataIntegrity

Pessimistic Locking is a concurrency control strategy that locks a resource before accessing it. It assumes conflicts are likely, preventing other transactions from reading or modifying locked data until the lock is released.

#DistributedSystems #Fintech #DataIntegrity

Innovations Shaping the Future of Clinical Trials: Genelife Perspective

Learn about the innovations shaping the future of working of Clinical research organisation (CRO) in India and Globally