Infrared: A Key Technology for Security Systems
نویسندگان
چکیده
منابع مشابه
New technology for food systems and security.
In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Con...
متن کاملA Systems Approach to Information Technology (IT) Infrastructure Design for Utility Management Automation Systems
Almost all of electric utility companies are planning to improve their management automation system, in order to meet the changing requirements of new liberalized energy market and to benefit from the innovations in information and communication technology (ICT or IT). Architectural design of the utility management automation (UMA) systems for their IT-enabling requires proper selection of ...
متن کاملMonitoring Key Parameters in Bioprocesses Using Near-Infrared Technology
Near-infrared spectroscopy (NIRS) is known to be a rapid and non-destructive technique for process monitoring. Bioprocesses are usually complex, from both the chemical (ill-defined medium composition) and physical (multiphase matrix) aspects, which poses an additional challenge to the development of robust calibrations. We investigated the use of NIRS for on-line and in-line monitoring of cell,...
متن کاملchannel estimation for mimo-ofdm systems
تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite fields and elliptic curve groups are considered. The practicality of the resulting systems is co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Optical Technologies
سال: 2012
ISSN: 1687-6393,1687-6407
DOI: 10.1155/2012/838752