Using of signals with rectangular envelope of spectrum with a minimum peak-factor for information security
The possibility of signal using with rectangular envelope of spectrum for the problems of information transmitting with protection from unauthorized interference. Local minima of the peakfactors in the multidimensional dependence from the initial phases.
| Рубрика | Коммуникации, связь, цифровые приборы и радиоэлектроника |
| Предмет | Link |
| Вид | статья |
| Язык | английский |
| Прислал(а) | Liubchyk |
| Дата добавления | 18.02.2016 |
| Размер файла | 793,1 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
Подобные документы
Signal is a carrier of new information for the observer. Concept and classification detector signals, their variety and functional features. The detection abilities of different detector’s types, methodology and milestones of their determination.
контрольная работа [1,1 M], добавлен 27.04.2014Signals, channels and communication networks. Enabling Any-to-Any Communication. Next-Generation Mobile Networks. Challenges of Reinventing the Networking Infrastructure. Leading the Way by Providing Innovative Solutions. The review of similar schemes.
курсовая работа [629,0 K], добавлен 07.12.2015Выбор и расчет трансформатора. Запуск виртуальной установки (мостового) выпрямителя (моста Греца) при работе на асинхронный двигатель. Моделирование трёхфазного инвертора. Просмотр тока в нагрузке с помощью пакета расширения Signal Proccessing Toolbox.
контрольная работа [3,6 M], добавлен 29.06.2011Initial data for the term paper performance. Order of carrying out calculations. Analyze uncompensated system. Synthesize the real PD-compensator ( ) which would guarantee desired phase margin at gain crossover frequency . Analyze compensated system.
курсовая работа [658,7 K], добавлен 20.08.2012Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.
реферат [20,9 K], добавлен 19.12.2013The computer systems and unique possibilities for fulfillment before unknown offenses. The main risks and threats to information systems security in the internet. Internet as a port of escape of the confidential information and its damage minimization.
контрольная работа [19,6 K], добавлен 17.02.2011Occurrence of new crimes in connection with development of new technologies and computerizations. The review and the characteristic of the most widespread internet crimes, ways of struggle against them. Methods of protection of the personal information.
эссе [15,3 K], добавлен 15.03.2012The material and technological basis of the information society are all sorts of systems based on computers and computer networks, information technology, telecommunication. The task of Ukraine in area of information and communication technologies.
реферат [29,5 K], добавлен 10.05.2011Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.
лабораторная работа [3,2 M], добавлен 09.04.2016The basic principles and the protection of power lines patterns used in this process methods. Physical basics of high-power transformers in substations. Justification of the information received. Diagram illustrating the operation of the protection.
презентация [628,0 K], добавлен 18.02.2016


