Experimental identification of sensitivity of tilt sensor
The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
Подобные документы
The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.
статья, добавлен 14.01.2017The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
дипломная работа, добавлен 31.10.2016The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
статья, добавлен 30.04.2018The purpose of the scientific work is to identify the features of the use of cloud computing in higher educational institutions for colleges and universities. The risks and benefits of cloud architecture are considered. Analysis main activities.
статья, добавлен 06.04.2022Overview of software designed to solve engineering problems. Identify the features of Microsoft Office programs, Pascal, AutoCAD, KOMPAS, MATLAB, MATLAB Simulink and MATLAB Plots which are used for graphing, solving equations, functions, matrices.
презентация, добавлен 16.01.2016Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016Mathematical model of dynamics of tensions of respiratory gases taking into account hypometaboliс, that develops in the organism of man on a highland. Character of changes of the modes of functioning of organism at transients and in steady-states.
статья, добавлен 30.01.2017The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.
статья, добавлен 28.08.2016Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
статья, добавлен 16.08.2023Designing for maximum usability. The essential characteristics of rules in the form of standards and guidelines in order to enhance the interactive properties of the system. Principles of flexibility and robustness. HCI design patterns and golden rules.
презентация, добавлен 28.12.2013The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
статья, добавлен 19.09.2024Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
книга, добавлен 13.03.2014Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
статья, добавлен 30.08.2022Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.
доклад, добавлен 04.12.2011Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
дипломная работа, добавлен 28.08.2016- 41. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
лекция, добавлен 28.12.2013 Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.
статья, добавлен 30.04.2018Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014- 45. Task models
Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.
лекция, добавлен 28.12.2013 To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
статья, добавлен 29.01.2016The dimension reduction as a way to overcome the errors of the measurement when dealing with vector data in high-dimensional spaces and as a modelling tool of map. A techniques for dimension. The implementation of neural's networks for these techniques.
научная работа, добавлен 08.02.2013Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.
книга, добавлен 15.09.2012Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
статья, добавлен 28.08.2016