Experimental identification of sensitivity of tilt sensor
The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
Подобные документы
An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
??????, добавлен 15.09.2012Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
?????, добавлен 08.03.2014The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
??????, добавлен 25.06.2024?????????? ?????? ?????????? ?????????? ? ?????????????? ???????? ?????? ? ???????? ???????? ?????? (Linear Feedback Shift Register – LFSR) ? ???????????? ??????. ????????????? ?????????? ????????? ????????????. ??????????? ????????????????? ????.
??????, добавлен 11.07.2022Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
??????, добавлен 15.03.2014????? ?????????????? ? ??????? ??????????? ??????????? ???????????, ?? ?????????? ????????? ? ???????? ????????????? ???????????? ???????????. ???????? ?????? ? CRM-???????? Task Manager, ? ????? ??????? ?????????? ?????? JOOMLA, ??????? ????????????.
????? ?? ????????, добавлен 18.11.2017Secret stories, codes, and cryptogram puzzles. Historical background to the conspiracy stories. Caesar/shift ciphers. Hints to help crack the cryptograms and puzzles. Answers to all cryptograms, their assignment and application in modern practice.
??????? ???????, добавлен 08.03.2014Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
??????, добавлен 30.08.2016?????????? ????????? "Find" ??? ??????????? ??????? ?????????????? ?????? ???????? ?????????. ???????? ???????????? ???????? ?? ????? Object-Pascal ? ????? Delphi. ?????????? ???????????? ? ??????? ?????????, ????? ?????????? ?? ????? ??????????.
???????? ??????, добавлен 22.02.2019???????????? ?????, ??????????? ????????? "Epam Systems". ?????? ? ????? ???????? ???????????? ??????? ???????????? ????????????? ?? ??????? ?????? ? ?????? ?????? ? ?????????? Microsoft. ?????????? Find&Replace dialog ??? ????????? MS Office Word.
???????, добавлен 17.12.2014???????? ?????????? ???????? ???????? ?? ?????????????????? ????? ???? Heavy Lift. ?????????? ? ?????????? ?????????? ?????: ?????????? ????????, ???? ?????, ???????????????? ??????, ???????? ?? ???. ?????????? ???????? ???????? ? ???????? ???????.
??????, добавлен 12.08.2016Optimization using intellectual centers based on artificial intelligence of the information infrastructure of universities in the conditions of wartime challenges. Creation of reliable and adaptive information systems that support educational activities.
??????, добавлен 06.12.2024Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
??????, добавлен 15.09.2012????? ??????? ??????????? ????????? (Intrusion Detection System) - ???????? ?????? ???????????? ?????? ? ????? ?? ????????????????? ??????? ??? ???????????????????? ??????????. ???????????? ?????, ?????? ? ?????? ??????????? ???????? ??? ????????? ??????.
??????, добавлен 23.01.2019Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
??????? ???????, добавлен 08.03.2014Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.
?????, добавлен 08.03.2014Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.
??????? ???????, добавлен 08.03.2014Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.
??????, добавлен 29.07.2016The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
??????, добавлен 15.09.2012Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
??????? ???????, добавлен 08.03.2014Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
??????, добавлен 28.12.2013Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
?????, добавлен 08.03.2014??????????? ???????? MMSolver ???????????? ??? ??????? ???????????? ?????????? ?????????? ????????????? ????????. ?????????????? ?????????? ?????????, ??????? ?? ??????????, ?? ??????????. ???????? ??????? MatrixCalc, Task, Method. ????????? ???????.
?????????, добавлен 11.01.2020