The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automating the tasks that require manpower has been considered as an area of active research in science and technology. Challenges in designing such systems include accuracy in the parameters of performance, minimal hardware, cost-efficiency, and security. The efficiency of drones designed for replacing humans is often evaluated using their weight, flying time, and power consumption. Herein, the prototypebased...
In this paper, we show that the signal sampling operation considered as a non-ideal one, which incorporates finite time switching and operation of signal blurring, does not lead, as the researchers would expect, to Dirac impulses for the case of their ideal behavior.
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general...
This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network. Research questions found looping caused by traffic issues when sending data in the MPLS service layer-2 tunneling service. Furthermore, this research...
Localization is one of the oldest mathematical and technical problems that have been at the forefront of research and development for decades. In a wireless sensor network (WSN), nodes are not able to recognize their position. To solve this problem, studies have been done on algorithms to achieve accurate estimation of nodes in WSNs. In this paper, we present an improvement of a localization algorithm...
On fifth-generation wireless networks, a potential massive MIMO system is used to meet the ever-increasing request for high-traffic data rates, high-resolution streaming media, and cognitive communication. In order to boost the trade-off between energy efficiency (EE), spectral efficiency (SE), and throughput in wireless 5G networks, massive MIMO systems are essential. This paper proposes a strategy...
The paper focuses on the optimization of IEEE 802.11ax dense networks. The results were obtained with the use of the NS-3 simulator. Various network topologies were analyzed and compared. The advantage of using MSDU and MPDU aggregations in a dense network environment was shown. The process of improving the network performance for changes in the transmitter power value, CCA Threshold, and antenna...
This study expands on prior studies on wireless telecommunication generations by examining the technological differences and evolutional triggers that characterise each Generation (from 1G to 5G). Based on a systematic literature review approach, this study examines fifty (50) articles to enhance our understanding of wireless generation evolution. Specifically, this study analyses i) the triggers...
The embryonic architecture, which draws inspiration from the biological process of ontogeny, has built-in mechanisms for self-repair. The entire genome is stored in the embryonic cells, allowing the data to be replicated in healthy cells in the event of a single cell failure in the embryonic fabric. A specially designed genetic algorithm (GA) is used to evolve the configuration information for embryonic...
The paper brings forward an idea of multi-threaded computation synchronization based on the shared semaphored cache in the multi-core CPUs. It is dedicated to the implementation of multi-core PLC control, embedded solution or parallel computation of models described using hardware description languages. The shared semaphored cache is implemented as guarded memory cells within a dedicated section of...
Driver assistance systems have started becoming a key differentiator in automotive space and all major automotive manufacturers have such systems with various capabilities and stages of implementation. The main building blocks of such systems are similar in nature and one of the major building blocks is road lane detection. Even though lane detection technology has been around for decades, it is still...
In this paper, we show why the descriptions of the sampled signal used in calculation of its spectrum, that are used in the literature, are not correct. And this finding applies to both kinds of descriptions: the ones which follow from an idealized way of modelling of the signal sampling operation as well as those which take into account its non-idealities. The correct signal description, that results...
Audio data compression is used to reduce the transmission bandwidth and storage requirements of audio data. It is the second stage in the audio mastering process with audio equalization being the first stage. Compression algorithms such as BSAC, MP3 and AAC are used as standards in this paper. The challenge faced in audio compression is compressing the signal at low bit rates. The previous algorithms...
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study,...
Effective and safe labour requires good cooperation of all the physiological systems. A proper synchronization of uterine and abdominal muscles is necessary for labour progression. Therefore, a new method for simultaneous monitoring of uterine activities and parturient’s pushing efforts is presented. A high sampled, rectified electrohysterographic signal is divided into a low, uterine passband (0...
The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber...
This work describes a dual band compact fully integrated rectenna circuit for implantable medical devices (IMDs). The implantable rectenna circuit consists of tunnel diode 10×10μm2 QW-ASPAT (Quantum Well Asymmetric Spacer Tunnel Layer diode) was used as the RF-DC rectifier due to its temperature insensitivity and nonlinearity compared with conventional SBD diode. SILVACO atlas software is used to...
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage...
The performance of free-space optical (FSO) communications that using an optical amplifier (OA) in the scheme of an amplify-received (AR)-relaying has a major drawback in the detection of input signal quality under the effects of turbulence. As an OA is based on a fiber-detection (FD) method to receive and delivers a signal at the amplification process stage, there is an opportunity to implement an...
In this article we present a procedure that allows to synthesize optimal circuit representing any reversible function within reasonable size limits. The procedure allows to choose either the NCT or the MCT gate set and specify any number of ancillary qubits to be used in the circuit. We will explore efficacy of this procedure by synthesizing various sources of nonlinearity used in contemporary symmetric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.