Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 7

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available remote Modelling the flight dynamics of aerial target imitator
EN
This article is concerned with the issue related to studying the dynamic properties of the aerial target imitator. Applying the modelling principles, the structure and technical data of aerial target imitator were described and utilising the PRODAS software a physical model of the aerial imitator was developed based on the conducted simulation studies. Mass, aerodynamic and basic parameters of flight path were determined. Then, experimental studies of basic dynamic characteristics were discussed. The comparison of results obtained from experimental and theoretical studies proves the correctness of the developed model.
PL
W artykule przedstawiono zagadnienia związane z badaniem własności dynamicznych imitatora celu powietrznego. Stosując zasady modelowania, opisano budowę i dane techniczne imitatora oraz wykorzystując program PRODAS, opracowano model fizyczny imitatora, w oparciu o który przeprowadzono badania symulacyjne. Wyznaczono charakterystyki masowe, aerodynamiczne oraz podstawowe parametry toru lotu. Następnie omówiono badania doświadczalne podstawowych charakterystyk dynamicznych. Porównanie wyników uzyskanych z badań eksperymentalnych i teoretycznych świadczy o poprawności opracowanego modelu.
PL
Przez tysiąclecia tworzono, udoskonalano i łamano dziesiątki rozwiązań, których jedynym celem było uniemożliwienie odczytania informacji przez postronnych. Doprowadziło to do powstania dwóch przeciwstawnych w swoich działaniach dziedzin - kryptografii i kryptoanalizy. W dobie komputerów zrezygnowano ze wszystkich dotychczasowych rozwiązań i wprowadzono zupełnie nowe, z których za najbezpieczniejsza można uznać RSA i szyfry oparte o krzywe eliptyczne. Oba są uznawane za niemożliwe do złamania. Wynika to bezpośrednio z zależności matematycznych użytych w ich definicji. W dotychczasowych badaniach wykazano już kilka ich słabości, lecz nadal nie ma rozwiązania, które działałoby w każdym jednym przypadku. Z uwagi na to postanowiono przyjrzeć się głębiej słabym punktom szyfrów eliptycznych z uwzględnieniem wszystkich dotychczas dostępnych informacji.
EN
For millennia, dozens of solutions, which sole purpose was to prevent outsiders from reading information, have been developed, refined and broken. This led to the emergence of two opposing fields - cryptography and cryptanalysis. In the age of computers, all existing solutions have been abandoned and new ones have been introduced, with the most secure ones RSA and ciphers based on elliptic curves. Both considered impossible to break. This result directly from the math used in their definitions. Some previous researches have already shown some of their weaknesses, but there is still no solution that would work in every single case. Because of this, it was decided to take a closer look at the weak points of elliptic ciphers, taking into account all the information available to date.
EN
The paper focuses on three significant aspects which can improve safety of data and also increasing privacy of users using tablets and smartphones. The chosen platforms are Android and Windows Phone. The aim of the work is to develop library independent from operating system API that enables encrypting and hiding the data stored in mobile device. Also applications that demonstrate functions of the library was developed. The library will be used in securing data from NFC modules used as RFID readers.
EN
In this paper we present analysis of how contact data is managed by Windows on mobile phones and our approach in making it more private. Aim of this work was to design and develop application that can store contacts locally in memory of device with installed Windows Phone 8.1 operating system. That application can be used to create, edit, and remove contacts without usage of Microsoft cloud services. Developed application also allows to send text messages, e-mails, and call to saved telephone number.
5
Content available Intelligent touch based user authentication
EN
Many researches had shown that touch based authentication is something possible to implement in many devices. This research focuses mainly on making a progress in this field by using more advanced methods such as SVM, kNN, kmeans or neural networks in attempt to build system for both recognizing and learning user’s behavior.
6
Content available Touch screen based user identification
EN
The main subject of this work was to find a new way of user identification based on his interactions with a touch screen of a detecting device such as smartphone, tablet or operating panel. The entire identification process was performed in implemented mobile software and the identification was based on certain mathematical criteria. No additional external device was connected to the portable device for user recognition process.
EN
The purpose of this work was to analyze built-in security and privacy protection methods in mobile devices such as smartphones and tablets with Windows and Android operating systems. It was performed only with default settings and without any external software such as antiviruses.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.