Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations...
In this covid19 pandemic the number of people gathering at public places and festivals are restricted and maintaining social distancing is practiced throughout the world. Managing the crowd is always a challenging task. It requires monitoring technology. In this paper, we develop a device that detects and provide human count and detects people who are not maintaining social distancing. The work depicted...
Electromagnetic theoretical concepts, which are represented mathematically, are usually challenging to grasp by students. In this study, we explore an interactive technology-based teaching tool to develop further students’ mastery of electromagnetic concepts through learning development and visualization of electromagnetic problems. This visualization of the problems will help students analyse, evaluate,...
In the era of continuous advancement in wireless technologies, path loss, also known as channel attenuation, is a drop in signal strength from the transmitter to the receiver. Path loss modelling is critical in designing fixed and mobile communication systems for various applications. This paper focuses on the received power (dBm) and free space path loss (FSPL) on various distances and frequencies...
Europe has to face strong competitive challenges in the field of QIT from other regions of the world. The tools for the effective implementation of the challenges related to the start, we hope, of building a quantum civilization are both common and individual in particular European countries. Joint projects in the field of QIT, usually narrowly focused, are announced by large European Agencies and...
Wireless sensor network (WSN) plays a crucial role in many industrial, commercial, and social applications. However, increasing the number of nodes in a WSN increases network complexity, making it harder to acquire all relevant data in a timely way. By assuming the end node as a base station, we devised an Artificial Ant Routing (AAR) method that overcomes such network difficulties and finds an ideal...
In a massive multiple-input multiple-output (MIMO) system, a large number of receiving antennas at the base station can simultaneously serve multiple users. Linear detectors can achieve optimal performance but require large dimensional matrix inversion, which requires a large number of arithmetic operations. Several low complexity solutions are reported in the literature. In this work, we have presented...
In the paper, the BTS (Background Traffic Simulator) tool is proposed to capture network traffic and then reproduce it in a simulations using the ns-3 simulator extension module. This new method of generating background traffic allows for repetitive testing of simulation scenarios under real network conditions. The authors described the differences between the previously available methods and the...
A double balanced passive mixer-based receiver operating in the 3-5 GHz UWB for medical applications is described in this paper. The receiver front-end circuit is composed of an inductorless low noise amplifier (LNA) followed by a fully differential voltage-driven double-balanced passive mixer. A duty cycle of 25% was chosen to eliminate overlap between LO signals, thereby improving receiver linearity...
A new method of Electrocardiogram (ECG) features extraction is proposed in this paper. The purpose of this study is to detect the main characteristics of the signal: P, Q, R, S, and T, then localize and extract its intervals and segments. To do so we first detect peaks, onsets and offsets of the signal's waveform by calculating the slope change (SC) coefficients and consequently, the peaks of the...
In modern conditions in the field of medicine, raster image analysis systems are becoming more widespread, which allow automating the process of establishing a diagnosis based on the results of instrumental monitoring of a patient. One of the most important stages of such an analysis is the detection of the mask of the object to be recognized on the image. It is shown that under the conditions of...
In the current smart tech world, there is an immense need of automating tasks and processes to avoid human intervention, save time and energy. Nowadays, mobile phones have become one of the essential things for human beings either to call someone, connect to the internet, while driving people need mobile phones to receive or make a call, use google maps to know the routes and many more. Normally in...
Customer churn prediction is used to retain customers at the highest risk of churn by proactively engaging with them. Many machine learning-based data mining approaches have been previously used to predict client churn. Although, single model classifiers increase the scattering of prediction with a low model performance which degrades reliability of the model. Hence, Bag of learners based Classification...
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes the IS event processing substage. In addition, the proposed detailing of the "Event Handling" subprocess allows for covering...
One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the...
In this article, a 3D printed rectangular dielectric resonator antenna which is capable of polarization reconfiguration has been designed. Dielectric resonator is composed of environment friendly and biodegradable material, which is Polylactic Acid. In the proposed model, the polarization can be switch from a linear to a circular by changing the state of a switch, electonically. The antenna switch...
Respiratory rate measurement is important under different types of health issues. The need for technological developments for measuring respiratory rate has become imperative for healthcare professionals. The paper presents an approach to respiratory monitoring, with the aim to improve the accuracy and efficacy of the data monitored. We use multiple types of sensors on various locations on the body...
Health informatics is characterized by the need to securely store, process and transmit large amounts of sensitive medical data while ensuring interoperability with other systems. Among many standards used in such systems there are two which have gained interest in recent years and cover most of those needs: openEHR and HL7 FHIR. In this paper, both standards are discussed and compared with each other...
In a smart city environment, Intelligent Transportation System (ITS) enables the vehicle to generate and communicate messages for safety applications. There exists a challenge where the integrity of the message needs to be verified before passing it on to other vehicles. There should be a provision to motivate the honest vehicles who are reporting the true event messages. To achieve this, traffic...
The cellular users, on high speed railways and highways, travel at a very high speed and follow a nearly straight path, in general. Thus, they typically undergo a maximum frequency of handovers in the cellular environment. This requires a very fast triggering of the handover. In the existing method of handover in 5G cellular communication, for high speed users, neither the decision-making of handover...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.