The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper are analyzed articles that are indexed on Web of Science with the main topic of the conference “Communication and Information Technologies” (CIT). The articles were chosen the most cited ones. The first step of analysis summarizes statistics of the articles and the second step was oriented to detailed analysis using the software Tovek Tools. The contextual analysis was depicted in the...
Automatic Modulation classification lays important role in the systems of electromagnetic spectrum monitoring. However performance of the algorithms is depreciated due to inaccurate estimation of signal parameters. The problem of unknown parameters is well documented in the literature however, authors usually propose improved algorithms in order to maximize probability of correct classification when...
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work considering German law and industrial requirements, with the aim of developing a self-implemented IT security assessment designed to identify threats and aid in increasing their security level. This is necessary because micro-enterprises contributing to the national economy have...
The paper deals with an analytical model of the transmitter-blocking technique for mitigating short-time fades on free-space optical links. Due to the effect of atmospheric turbulence, the optical channel is characterized by received power fades in the order of tens of milliseconds, during which the transmitted data is lost. Under certain conditions, the propagation through turbulent channel is reciprocal,...
This paper describes Network Enabled Capability (NEC) within Command & Control (C2) systems. In the first part we present the need to transform military operations of Industrial Age to Information Age military operations and the related NCW (Network Centric Warfare). In the next part of the paper we discuss OODA (Observe, Orient, Decide, Act) Loop as a means of optimizing NEC within Command &...
Time Difference Of Arrival (TDOA) method is very often used inside electronic intelligence systems. TDOA method requires the high signal to noise ratio at the output of the intermediate frequency amplifier for target localization, usually around 12 dB or more. At low signal-to-noise ratio TDOA is inaccurate and especially in case of the active jamming it is nearly impossible. The multilateral TDOA...
In this paper we propose a method for planning military scenarios in the Military Scenario Definition Language (MSDL) which is based on the concepts of grammatical engineering, abstract and concrete syntax and semantics and language processors.
In the recent year's low power computing systems have gained popularity. Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the new optimization of structure of network transmission protocol, the routing optimization in transmission...
The paper describes the state-of-the-art of Long Short-Term Memory (LSTM) neural networks with fixation to context utilization in text documents. Context in text documents is utilized mainly in the natural language processing, machine reading, but also in other areas, for example in the information retrieval. In the areas where the context is taken into account, the LSTM finds wide appliance because...
Adaptive processing of radar data in a data processor is the processing of radar data using adaptive, cognitive, intelligent or smart filtering. Filters or so-called filter banks are used for filtration. We can observe, track and display targets captured by radar with these filters included. These filters also serve to process the tracked targets (distance, course, flight level, speed, measurement...
Countless various malware families provide huge variety of functionalities which allow them to do many malicious activities. This conditions led to development of many different analysis methods. In this paper, we focused on reverse engineering, which is elementary part of static analysis. We evaluate current Java bytecode decompilers. We evaluate the output from current Java bytecode decompilers...
Emerging of SDR technology gives new possibilities to developers of radio equipment They can implement new types of modulations and error correction mechanisms in the way not available till now. All that enables reaching higher data rates, longer ranges and in case of the narrowband radio enables using it in BMS system to deliver basic services like digitized voice and BFT. This article presents selected...
This article deals with a noise analysis of inertial sensors, especially with accelerometers. Accelerometers and gyroscopes are inertial sensors which are parts of inertial measurement units IMUs. An inertial navigation uses outputs from three accelerometers and from three gyroscopes to positions, orientations computations. For better accuracy of navigation and guidance systems is necessary to evaluate...
This work deals with theory of PI controller and short introduction to DSP implementation. It starts with the most necessary information about mathematics and design of controller applicable to DC motor controlling using the inverse dynamic control method. Then MatLab Simulink is used to verify obtained results following with description of conversion from continuous controller to a discreet one....
The paper deals with the use of modelling and simulation tools for preparation and implementation of exercises of Integrated Rescue System components and crisis management bodies with the main emphasis on the use of means of constructive simulation using SIMEX simulator. A scenario of multiple traffic accident was prepared for the crisis management authorities. Activities performed by crisis management...
The widespread need for radio broadband services (such as video broadcasting) requires the use of radio that is capable to deliver such services. Unfortunately, beside benefits of using broadband radios (higher bit rates) there are also disadvantages, ie less range of operation in comparison to the narrowband radios range and less resistance to jamming (broadband operation results in increase of detection...
The paper is focused on use of Pulse Coupled Neural Network (PCNN) in the image steganography based on the research in the field of invariant image recognition. In general, steganography deals with data concealing in the cover mediums which can be freely accessible or transmitted by various communication channels without any restriction. A suitable position of hidden message is crucial for a successful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.