The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of today communication networks depends also on effective hash function. A cryptographic hash function is used to realize a transformation of input to a fixed-size value. This value is called the hash value. One way hash function could be generated also by an artificial neural network (ANN). Theoretical analysis of the possibility of using artificial neural network and chaotic maps for hashing...
SNAP is a program for symbolic analysis of linear or linearized circuits and systems developed at Brno University of Technology, provided as freeware. The paper presents a new version of the program, which contains a new schematic editor and rewritten simulation engine. A unique property of SNAP is a system of libraries that allows user definition of new behavioral models, including non-electrical...
The collection and analysis of event logs allows detection and debugging of operating system and application configuration errors. An appropriate selection of event logs allows you to detect cyber-attacks and prevent potential damage. In the article, we focused on the selection and optimization of event logs for the Microsoft Windows operating system. We have experimentally verified the structure...
Processing of information from the sensors and the resources available to the commander are very important for his decision-making process. Quality of information for decision-making process has a great importance. This article focuses on the description of the modeling of signal processing from sensors in a probabilistic model of recognition Custom / Foreign Identification Friendly or Foe and access...
This article is about the changes made in education of IT for three decades in Poland Authors describe the first rapid decade of education of IT in secondary schools, later evolution of this subject and changes in priority of educating youths at schools. At the end authors give example of latest approach where education of IT is present at almost every level of education.
Presented paper explains general purpose approach to the parallel pixel processing on GPU. It presents essential dataset structuring, correct type assignment and kernel configuration for CUDA application interface. Paper also explains data movement and optimal computation saturation. Transfers are also analyzed in correlation with the computation especially for the embarrassingly parallel problem...
To achieve optimal data routing along fiber optics, analytical and algorithmic methods are used. When some degradation factors cause temporary optical fiber impairment, optimization of data routing is an essential problem. However, the temporality is quite vague and, some network parameters are difficult to quantify. While optimizing temporarily changed route in an optical network, any cooperating...
Presented paper deals with a model of the electromagnetic sources localization in near-field sources region and verification of selected algorithms for correct modelling estimations. The localization is performed from cross-correlation matrix of planar sensors network signals and further cross-correlation matrix decomposition — Multiple Signal Classification (MUSIC). The whole mathematical model from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.