419 research outputs found
Initial dynamics of the EKG during an electrical defibrillation of the heart
In tests on 11 mature dogs, immobilized by means of an automatic blocking and synchronization system, artefact free EKG were obtained, beginning 0.04-0.06 sec after passage of a defibrillating current. Different versions of the start of fibrillation were noted, in application of the defibrillating stimulus in the early phase of the cardiac cycle. A swinging phenomenon, increasing amplitude, of fibrillation was noted for 0.4-1.5 sec after delivery of a subthreshold stimulus. Conditions for a positive outcome of repeated defibrillation were found, and a relationship was noted between the configuration of the exciting process with respect to the lines of force of the defibrillating current and the defibrillation threshold. It was shown that the initial EKG dynamics after defibrillation is based on a gradual shift of the pacemaker from the myocardium of the ventricles to the sinus node, through phases of atrioventricular and atrial automatism
Parallel Fast Walsh Transform Algorithm and Its Implementation with CUDA on GPUs
Some of the most important cryptographic characteristics of the Boolean and vector Boolean functions (nonlinearity, autocorrelation, differential uniformity) are connected with the Walsh spectrum. In this paper, we present several algorithms for computing the Walsh spectrum implemented in CUDA for parallel execution on GPU. They are based on the most popular sequential algorithm. The algorithms differ in the complexity of implementations, resources used, optimization strategies and techniques. In the end, we give some experimental results
Wireless network security and cracking security key
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module), wireless security is an ever increasing issue for many organizations. In other words wireless networks add another entry point into a network for hackers. Because this technology is relatively new there is many security vulnerabilities.
In this paper, we study security on the wireless network and its vulnerability, also we give examples of how hackers can crack security key, explode vulnerabilities and attack the wireless network. We consider the weak points of these networks in order to suggest ways and methods to ensure a good protection
- …