The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy hole is regarded as one of the challenging issues in wireless sensor networks (WSNs). According to this problem, nodes that are closer to the sink lose their energy earlier than other nodes. Consequently, it leads to the early breakdown of the network. One approach for preventing this problem is to use mobile sink rather than one or more sinks with fixed positions. Also, using fuzzy logic and...
Random numbers are critical in every cryptographic fields. They can be used as cryptographic key, seed, nonce, initialization vector, etc. In this paper, new (pseudo) random number generator (PRNG or RNG) based on computer's source is proposed. The principle of method consist in collecting (nearly) random sources produced from computer and used it as seed for (pseudo) random number generation. Random...
Face recognition and detection processes are used in where need control by camera. During use of face recognition systems appears following problems: can't find face and not enough information in image, changing illumination, occlusion, face shape and etc. In this paper are given current problems and their solving ways.
In recent years, the number of mobile devices is increasing rapidly. Meanwhile, the amount of malicious software is rising almost exponentially, alongside the diversity and complexity of malware. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop a malware detection model in more efficient and flexible manner. In this paper, we propose a network behavior-based...
For modeling of distribution of electromagnetic waves taking into account a land relief Simulink model founded on formation of a surface of the electromagnetic field on large territories is offered.
A Speech recognition is one of the important process of information technology. Speech recognition plays a key role in many systems like voice control, IP-telephony, personal identification, recognition of individual words and phrases, accepting applications for reference services and searching system. There are many researching companies in this area, which developing and improving methods, algorithms...
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
Fleet management systems have been widely used in the maritime industry. Traditional fleet management systems focus on the whole vessel/ship. With the emergence of the Internet of Things and new smart technologies, smart fleet management systems are now embedded with greater power in comparison with traditional solutions, e.g. can be used to monitor the performance, status and behaviour of not just...
The article deals with the current problem of ensuring security when developing embedded technologies for the Internet of things. The authors analyze modern technological features of this concept; consider the main vulnerabilities of information security. An approach is proposed to protect the data transferred between the physical, logical and virtual components of the dedicated Internet infrastructure...
In the given article described principles of modeling of the transformations elements of power sources control. The classical methods of modeling of transformations circuits do not provide necessary accuracy due to complexity of representation of interdependence between input and output quantities and parameters, and the difficulty in representing inter chain and inter chain dependencies and providing...
Nowadays, vehicles have become a very significant role in transport system which a significant issue in various cities around the world, especially in developing countries resulting in turn traffic congestion, massive delays, increased fuel wastage. There are many alternative systems, such as parking places, building bridges. However at the present time, Intelligent Transport System is becoming more...
In this paper, we introduced a novel authentication scheme for peer-aware communication (PAC) networks. PAC devices (PDs) can communicate without infrastructure, because PDs are able to communicate in an ad hoc manner. Due to the absence of infrastructure, there are no certification authorities (CAs) or trusted third parties. Therefore, PDs have to have the ability to authenticate each other even...
Features of using the energy of electromagnetic radiation for modern electronics are considered. The structure of the sensor with a receiver of radio emission energy, the methods of use and the field of application of radio emission energy receiverst.
Article is dedicated to problem of creating the geometric database of products, that required for integration CAD and PDM technologies applicable in product lifecycle management process. As example are considered agricultural machinery tools' geometric data. Cite the forms of geometric data those applying in this process and structural analysis of the cluster system's connections of the components...
In given paper offered methods and algorithms of determination of complexity of test questions for formation a database system of the adaptive test control for objective estimation of knowledge of students (pupils) in the course of training learning systems.
The paper presents an overview of contemporary approaches to application of virtual reality systems for training of operating personnel for man-machine systems. Special emphases are made on application issues of virtual and alternate reality systems connected with probable cognitive dissonance in operation of real physical objects. The prospects of virtual reality application in professional training...
The software composition using high-granularity entities nowadays is a common practice. The process of software composition is supported by various CASE tools. First tools were made on the basis of very simple formalisms (e.g. intuitionistic propositional logic). During the years the tools evolved to more efficient ones, which are able to deal with concurrency, multiparty sessions and other advanced...
This paper is devoted to the analysis and research of methods for encoding BMP images using the Haar wavelet, as well as parallel programming and the development of parallel pixel processing algorithms based on the OpenMP standard.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.