Generalized models, construction methodology and the application of secure wireless sensor networks with random network parameters
A wireless sensor network of distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network. The analysis of models of wireless sensor network with random access is presented.
Подобные документы
The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
??????????? ??????, добавлен 20.05.2016Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
???????, добавлен 24.12.2013Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
?????, добавлен 08.03.2014The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
??????? ???????, добавлен 11.10.2014Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.
??????, добавлен 20.01.2017Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
?????, добавлен 08.03.2014???????? ?????????????? ???????????? ????????? ?????, ?? ?????????? ?????????? (??????). ????????? ? ???? ???????????????? ??????? ??????????: Wireless Fidelity, Bluetooth, Infrared Data Association. ?????? ??????????? ? ??????????? ?????????? ?????????.
???????, добавлен 17.03.2015This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
??????, добавлен 18.09.2024A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
????????? ??????, добавлен 13.07.2020??????? ???????? "???????????? ????", "Wi-Fi". ??????????? ??????????? ???????????? ????? ??????? Wi-Fi, ?? ?????????? ?? ?????? ????????????. ???? ? ????????????? ????? ??????? ? ?????????. ?????? ????? ???????: Access Point, Wireless Bridge, Repeater.
???????????, добавлен 20.09.2015A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
?????, добавлен 08.03.2014This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
?????, добавлен 08.03.2014The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
??????, добавлен 23.06.2016The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
??????? ???????, добавлен 08.02.2013The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test
??????, добавлен 07.11.2018Shadow boxing – a type of training. Total automatization and gamification boxing pose. Investigating an action person. Recurrent convolutional networks for visual recognition. Corrections the performed action in program. Human pose estimation for boxing.
????????? ??????, добавлен 07.12.2019Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
??????, добавлен 11.03.2025- 94. The bias of the initial information flows intensities estimates of the global cyber-physical network
Estimation of input flow intensities measured by the number of devices connected to the CPS (accumulated, living things plus unliving things) as a function of accumulated product flows. Statistics on the number of non-living devices connected to the CPS.
??????, добавлен 07.09.2022 Three types of Italian social networkers through the analysis of latent class conglomerates are shown in this study, based mainly on the level of use of the tools, as well as different covariates which determine the personal profile of social networkers.
??????, добавлен 28.09.2016- 96. ?????????? ?????
???????? ???????? ??? ????????????????? ?????. ??????? ???????? ??????? ????? ?????????? ???????? ?????????. ?????????????? Simple Network Management Protocol, ??? ??????? ????????. ?????????? ???????? get-next. ???????? ? ???? ????????? SNMPv1.
???????? ??????, добавлен 21.11.2013 ?????????? ??????????? ????????? ????? (VPN, Virtual Private Network). ???????????? VPN ?? ???????? ??????????? ????????????????? ??????????, ??????? ??????????, ????????????, ????? ?????????, ?????? ?????????? ?????????. ??????????, ?? ???????? VPN.
???????? ??????, добавлен 28.11.2014??????? ?????????????? ?????????????? ?????????? ????????? ??????, ??????????????????? ?????, ????????? ???????? ??????? ? ?????????? ??????. ?????? ???????? ?????????? Network Management Systems. ??????????? ???????????? ??????????? ? ????????????.
???????? ??????, добавлен 25.02.2016???????????? ? ???????????? ??????????? ???????????? ???????? Fortinet, ?????????????? ?????????????????? ? ??????, ??????? ??????? ??????????????. ???????? ??????????? ? ???????????? ?????????? FortiGate, FortiDDoS, Proventia Network IPS, SPX Appliances.
??????????? ??????, добавлен 29.06.2014The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.
??????, добавлен 28.02.2016
