статья  Using of signals with rectangular envelope of spectrum with a minimum peak-factor for information security

The possibility of signal using with rectangular envelope of spectrum for the problems of information transmitting with protection from unauthorized interference. Local minima of the peakfactors in the multidimensional dependence from the initial phases.

Нажав на кнопку "Скачать архив", вы скачаете нужный вам файл совершенно бесплатно.
Перед скачиванием данного файла вспомните о тех хороших рефератах, контрольных, курсовых, дипломных работах, статьях и других документах, которые лежат невостребованными в вашем компьютере. Это ваш труд, он должен участвовать в развитии общества и приносить пользу людям. Найдите эти работы и отправьте в базу знаний.
Мы и все студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будем вам очень благодарны.

Чтобы скачать архив с документом, в поле, расположенное ниже, впишите пятизначное число и нажмите кнопку "Скачать архив"

 #####   #####     #    #####     #   
#     # #     #   ##   #     #   ##   
      # #     #  # #   #     #  # #   
 #####   #####     #    #####     #   
#       #     #    #   #     #    #   
#       #     #    #   #     #    #   
#######  #####   #####  #####   ##### 
                                      

Введите число, изображенное выше:

Рубрика Коммуникации, связь, цифровые приборы и радиоэлектроника
Вид статья
Язык английский
Дата добавления 18.02.2016
Размер файла 793,1 K

Подобные документы

  • Signal is a carrier of new information for the observer. Concept and classification detector signals, their variety and functional features. The detection abilities of different detector’s types, methodology and milestones of their determination.

    контрольная работа [1,1 M], добавлен 27.04.2014

  • Signals, channels and communication networks. Enabling Any-to-Any Communication. Next-Generation Mobile Networks. Challenges of Reinventing the Networking Infrastructure. Leading the Way by Providing Innovative Solutions. The review of similar schemes.

    курсовая работа [629,0 K], добавлен 07.12.2015

  • Выбор и расчет трансформатора. Запуск виртуальной установки (мостового) выпрямителя (моста Греца) при работе на асинхронный двигатель. Моделирование трёхфазного инвертора. Просмотр тока в нагрузке с помощью пакета расширения Signal Proccessing Toolbox.

    контрольная работа [3,6 M], добавлен 29.06.2011

  • Initial data for the term paper performance. Order of carrying out calculations. Analyze uncompensated system. Synthesize the real PD-compensator ( ) which would guarantee desired phase margin at gain crossover frequency . Analyze compensated system.

    курсовая работа [658,7 K], добавлен 20.08.2012

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • The computer systems and unique possibilities for fulfillment before unknown offenses. The main risks and threats to information systems security in the internet. Internet as a port of escape of the confidential information and its damage minimization.

    контрольная работа [19,6 K], добавлен 17.02.2011

  • Occurrence of new crimes in connection with development of new technologies and computerizations. The review and the characteristic of the most widespread internet crimes, ways of struggle against them. Methods of protection of the personal information.

    эссе [15,3 K], добавлен 15.03.2012

  • The material and technological basis of the information society are all sorts of systems based on computers and computer networks, information technology, telecommunication. The task of Ukraine in area of information and communication technologies.

    реферат [29,5 K], добавлен 10.05.2011

  • Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.

    лабораторная работа [3,2 M], добавлен 09.04.2016

  • The basic principles and the protection of power lines patterns used in this process methods. Physical basics of high-power transformers in substations. Justification of the information received. Diagram illustrating the operation of the protection.

    презентация [628,0 K], добавлен 18.02.2016

  • Ability of the company to reveal and consider further action of competitive forces and their dynamics. Analysis of environment and the target market. Functional divisions and different levels in which еhe external information gets into the organization.

    статья [10,7 K], добавлен 23.09.2011

  • The results of theoretical analysis and computer simulation of the amplitude and phase errors of the narrowband signal. Vector representation of input and output signals. Standard deviation of the phase. Probability distribution laws of the phase error.

    реферат [469,7 K], добавлен 06.04.2011

  • The global ecological problems and the environmental protection. Some problems of "Greenhouse effect". Explanation how ecological problems influence on our life. Ecological situation nowadays. Climate and weather. Environmental protection in Ukraine.

    курсовая работа [898,6 K], добавлен 13.02.2011

  • The definition of term "economic security of enterprise" and characteristic of it functional components: technical and technological, intellectual and human resources component, information, financial, environmental, political and legal component.

    презентация [511,3 K], добавлен 09.03.2014

  • A database is a store where information is kept in an organized way. Data structures consist of pointers, strings, arrays, stacks, static and dynamic data structures. A list is a set of data items stored in some order. Methods of construction of a trees.

    топик [19,0 K], добавлен 29.06.2009

  • Information access and exchange. Cognitively Salient Relations for Multilingual Lexicography. Work in Cognitive Sciences. Transcription and Normalization. Mapping to Relation Types. Clustering by Property Types. Information about synonyms and antonyms.

    реферат [24,6 K], добавлен 28.03.2011

  • Research methods are strategies or techniques to conduct a systematic research. To collect primary data four main methods are used: survey, observation, document analysis and experiment. Several problems can arise when using questionnaire. Interviewing.

    реферат [16,7 K], добавлен 18.01.2009

  • Study of the problems of local government in Ukraine. Analysis of its budgetary support, personnel policy, administrative-territorial structure. The priority of reform of local self-management. The constitution of Palestine: "the state in development".

    реферат [15,9 K], добавлен 10.02.2015

  • The digital nervous system. The best way to put distance between company and the crowd. Accurate information about sales. A standardized system of accounts for the entire GM organization. Achieving advantage over competitors in the information age.

    анализ книги [19,8 K], добавлен 16.06.2012

  • Web Forum - class of applications for communication site visitors. Planning of such database that to contain all information about an user is the name, last name, address, number of reports and their content, information about an user and his friends.

    отчет по практике [1,4 M], добавлен 19.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.