Experimental identification of sensitivity of tilt sensor
The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
Подобные документы
An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
статья, добавлен 15.09.2012Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
книга, добавлен 08.03.2014The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024Разработка метода шифрования информации с использованием регистра сдвига с линейной обратной связью (Linear Feedback Shift Register – LFSR) и динамических ключей. Использование нескольких регистров одновременно. Применяемый криптографический ключ.
статья, добавлен 11.07.2022Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
статья, добавлен 15.03.2014Общая характеристика и история образования исследуемой организации, ее внутренняя структура и описание используемого программного обеспечения. Принципы работы с CRM-системой Task Manager, а также панелью управления сайтов JOOMLA, техника безопасности.
отчет по практике, добавлен 18.11.2017Secret stories, codes, and cryptogram puzzles. Historical background to the conspiracy stories. Caesar/shift ciphers. Hints to help crack the cryptograms and puzzles. Answers to all cryptograms, their assignment and application in modern practice.
учебное пособие, добавлен 08.03.2014Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
статья, добавлен 30.08.2016Разработка программы "Find" для определения площади геометрической фигуры заданной функциями. Создание программного продукта на языке Object-Pascal в среде Delphi. Проведение тестирования и отладки программы, вывод информации на экран компьютера.
курсовая работа, добавлен 22.02.2019Исследование услуг, оказываемых компанией "Epam Systems". Анализ и обзор основных возможностей системы тестирования пользователей на предмет знаний и умений работы с продуктами Microsoft. Реализация Find&Replace dialog для симуляции MS Office Word.
реферат, добавлен 17.12.2014Методика выполнения грузовых операций на специализированных судах типа Heavy Lift. Мониторинг и управление параметров судна: количество балласта, угол крена, метацентрическая высота, нагрузка на гак. Проведение грузовых операций с тяжелыми грузами.
статья, добавлен 12.08.2016Обзор системы обнаружения вторжений (Intrusion Detection System) - средства защиты компьютерных систем и сетей от неавторизованного доступа или несанкционированного управления. Отслеживание сетей, хостов в поиске вредоносных действий или нарушения правил.
статья, добавлен 23.01.2019Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
статья, добавлен 15.09.2012Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
учебное пособие, добавлен 08.03.2014Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.
книга, добавлен 08.03.2014Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.
учебное пособие, добавлен 08.03.2014Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
статья, добавлен 19.03.2024Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
статья, добавлен 13.08.2023Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.
статья, добавлен 29.07.2016The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
статья, добавлен 15.09.2012Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
лекция, добавлен 28.12.2013Программный комплекс MMSolver предназначен для решения вариационных неравенств различными итерационными методами. Функциональное назначение программы, область её применения, её назначение. Описание модулей MatrixCalc, Task, Method. Диаграмма классов.
методичка, добавлен 11.01.2020The model of the turbulent boundary layer over a rough surface is presented. The roughness density effect on the shift of the mean velocity logarithmic profile has been estimated in the case of 2D and 3D roughness elements. Surface layer transformation.
статья, добавлен 27.04.2017