operating algorithm
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 5)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Vol 22 (2) ◽  
pp. 278-283
Author(s):  
B.S. Dzundza ◽  
O.B. Kostyuk ◽  
Z.M. Dashevsky

An effective electrical circuit and an operating algorithm have been developed, and a working sample of a thermoelectric precision thermostat has been designed with the possibility of autonomous operation, continuous monitoring and recording of the temperature log using a computer or smartphone. It is shown that the developed algorithm provides effective shockless control and an accuracy of maintaining the temperature of 0.03°C, with a power consumption of 3-7 W. A design and a specialized computer control system for a multistage cryogenic thermoelectric cooler have been developed.


Author(s):  
S. B. Timofeev ◽  

The article presents the analysis of methodological approaches put into practice in psychological researches and devoted to transformation potential of videogames. There are certain grounds for suppositions concerning the reasons of contradictory scientific speculations about the peculiarities of computer games impact on gamers. The article gives the description of the original model of videogames analysis according to which a videogame is presented as a complex of components reflecting the presence and the degree of intensity of game peculiarities and mechanisms. The author explained the advantages of its application, and operating algorithm. “The Witcher 3: Wild Hunt” videogame has been analyzed as an example to demonstrate transformation potential. The study showed that the experience of playing “The Witcher 3: Wild Hunt” contributes to a high level of internality in frustration and professional and social internality of gamers, as well as their firm stand in taking risk.


2019 ◽  
Vol XXII (2) ◽  
pp. 296-304
Author(s):  
Rogobete M.

There are different methods by which a message hashing could be embedded in a communications network, therefore different approaches are described in this research to protect the hash value of a message. The structure of a cryptographically secure function (SHA-512) is presented along with the low-level algorithm sequence. Subsequently is detailed the Hash-based Message Authentication Code (HMAC) produced by concatenating a secret key and message, after which the composite message is hashed. However, the HMAC numerical structure and the specific operating algorithm are explained in detail to the logical gate level. Finally, several considerations regarding the low-level implementation of the code are concluded.


Author(s):  
Józef GACEK ◽  
Grzegorz LEŚNIK

The paper presents the results of theoretical and experimental tests aimed at developing sets of data. These sets are necessary for compiling firing tables and the operating algorithm for the ballistic computer of a fire control system intended for the mortar system currently used by the Polish Armed Forces as well as the mortar system currently under development. Economy, time saving and the development of numerical methods justify the use of computer simulations for the process of developing software for fire control systems. The theoretical results can only be used for this purpose if their level of compliance with experimental results of live fire tests is acceptable.


Sign in / Sign up

Export Citation Format

Share Document