787 results found.
Year: 2007, Volume: 7, Issue: 2
... secured using a Feistel It is clear that all confidential information reside on main based cipher. Because the information not require higher system must be stored using an cryptographic algorithm that levels of protection even a DES or XDES system can be have as key one derived from the system administrator used to encrypt communication. password. Because ...
Terms matched: 1 - Score: 11 - 867k
Year: 2007, Volume: 7, Issue: 2
... consists in communication on physical layer, corrupting routing transmitting the information on multiple carriers (pseudo) protocols on network layer and putting down some randomly switched. The algorithm that sets the random services on application layer. sequence of used carriers is known only by transmitter and receiver. FHSS not only ensure a certain level of ...
Terms matched: 1 - Score: 3 - 432k
Year: 2007, Volume: 7, Issue: 1
... a NN that mimics the plant behavior. The Model Reference Control window (see Figure 9) is used to generate training data for the Model Reference Controller training algorithm. The system can be simulated once the Plant Identification Figure 9. Model Reference Control window of Fast Reference Controller. and the Controller Training are complete. ...
Terms matched: 1 - Score: 3 - 506k
Year: 2007, Volume: 7, Issue: 1
... criteria of the practical stability, on the base of which it was developed the algorithm with j= 1 we'll consider that C1= E1 – is the single ... 1,2, .., M j, are suitable for direct use as algorithms of the digital stability area determination. The obtained results are where proved on ...
Terms matched: 2 - Score: 29 - 484k
Year: 2007, Volume: 7, Issue: 1
... safety system. Also it is suggested an II. THE MODERN MECHANISMS FOR THE algorithm for design of the model for the adaptive network ADAPTIVE NETWORK SAFETY CONTROL safety ... network safety level. The profiles are generated Nowadays, there are no any discrete algorithms that on the criteria for the information security evaluation. operate simultaneously with qualitative ...
Terms matched: 2 - Score: 14 - 418k
Year: 2007, Volume: 7, Issue: 1
... (e.g. a sheet of paper with light grey photographing surface to prevent the detection text and/or images) as exactly as possible. Reasons for this algorithm to interpret the surface as a "dot" or as the are to be found in uneven lighting conditions, shadowing, whitest point of the photograph. ...
Terms matched: 1 - Score: 12 - 2,112k
Year: 2007, Volume: 7, Issue: 1
... (PP1 or QQ1 in Figure 2) links these curves, characterised by a slope proportional with the magnetic permeability in the turning. Figure 2 shows how this algorithm works: the point will trace the curve OP, then the red curve is generated, it is computed the point P1 (or P2), and ...
Terms matched: 1 - Score: 10 - 535k