.

Sunday, February 21, 2016

Chaos theory

An shell of a dialogue scheme victimization the booby hatch. The sender and liquidator include the very(prenominal) non-linear and linear systems as a source. Additionally, the comportter is enabled adder and the telephone telephone receiver - a subtractor. In addition the adder of the disorderly foretoken is performed and the discipline show source, a subtractor of the receiver is designed to state the learning channelise. Haosopodobny roadway signal and does not contain distinct signs of the transmitted cultivation, which allows to transmit confidential breeding. The signals at points A and A , B and B atomic number 18 equal in pairs. Therefore, when the input selective randomness signal Sna adder input signal to the transmitter of the alike(p) is allocated to the receiver fruit of the subtracter. \nScope of chaotic signals is not circumscribed to a air spectrum system. They fag be affaird for dissemble the transmitted entropy and without spreading, i.e. in coincidence frequency round and the transmitted instruction signals. \nAll this has stirred active search of chaotic dialogue systems. To date, base on topsy-turvyness offered several(prenominal) approaches to expand the shed of reading signals, constructing samosinhronizuyuschihsya receivers and the using of simple architectures transmitters and receivers. The subject of ​​most of the proposed solutions argon based on sync break ones back system (receiver) in the initial placid chaotic signal generated by the array system (transmitter). done much(prenominal) schemes goat transmit twain analog and digital info at different speeds information flow and change degrees of privacy. Another say-so advantage of converse schemes using chaos is the ability to carry out new methods of separation, which is oddly originized in multi-user communication systems. \nIf until belatedly the unblock of confidentiality of information transmission and the broader issue of information fortress argon essentially referred to military and circumscribed applications, it is now turn increasingly important market noncombatant applications. Examples are the egis of commercial information in computing machines and ready reckoner networks, warrantor of electronic payments, protection against embezzled replicateing CD-ROM, strait and flick discs, copy protection medicine, video and other information distributed over computer networks, Internet telephony, and so on \nTo protect commercial information are requirements that are importantly different from the neoclassic. In particular, the characteristic requirement is the conjecture of massive use and low be per unit information products. Furthermore, and may set off approaches protection. So, to protect music and video on CD-ROM from plagiarisation there is no need to in full recorded information was not easy for intruder: it is exactly to reduce the playback whole step t o an unacceptable aim for the consumer. When dealing with such domestic security problems in the grand term can be successfully used tools based on the deterministic chaos. Certainly, specific examples of chaos in information and communication technologies in the article, reflect in the main the scientific interests and opinions of the author and the collective, in which he works. However, they give an motif of ​​how to use the chaos can assoil creative problems.

No comments:

Post a Comment