Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channel of next generation wireless network and its security issues are discussed. In NOMA, signals for all user equipment (UEs) are superimposed before transmission and then decoded at each UE implementing SIC. SIC relies on decoding and subtracting the signals in sequence until...
The article deals with an approach to determining the state of information security based on the analysis of spurious emission of electromagnetic components. Attention is drawn to the possibility of the formation of the data, obtain samples for the analysis of the state of the information security. An experiment in result of which the amplitude-frequency characteristics of the analyzed radiation....
Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure...
Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing “broadcast storm”, in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential...
The task we consider is counteraction to the information security incidents. The special feature of the described solution is an integrated application of the methods ensuring implementation of the preventive measures aimed at increasing the complexity of information security threat implementation on a compact device. It provides tasks required for support of wireless communication channels in an...
The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder information security were identified. The analysis of system...
In this paper we propose a method for solving the SLAM problem for mobile robot when moving in an unknown environment. Our method takes computational advantages of the FastSLAM algorithm. To estimate the position of the robot, we use a particle filter. The weights for the set of particles that characterize the expected position of the robot, are determined by the condition number of the plane homography...
This work describes a new approach to the mobile robot orientation in space and its obstacle determination. The method uses color beacons placed on the environmental objects for position determination. For obstacle detection the computer vision algorithm is used. All the system functions using one single camera. Both algorithms developed are investigated under different conditions.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.