The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article the author makes an attempt to characterize the main factor – mobility – which is to be taken into consideration while designing the ground radar component (passive and active radars) of the Air Defense systems in order to enable them to operate on the contemporary battlefield. He presents the latest theoretical views on the relationship between the usage of anti-radiation missiles...
The paper presents improvements of the developed system for hot plasma radiation measurement in the soft Xray range based on a Gas Electron Multiplier (GEM) detector. Scope of work consists of a new solution for handling hardware time-synchronization with tokamak systems needed for better synchronization with other diagnostics and measurement quality. The paper describes the support of new modes of...
In this research work, a Cylindrical Surrounding Double-Gate (CSDG) MOSFET design in a stacked-Dual Metal Gate (DMG) architecture has been proposed to incorporate the ability of gate metal variation in channel field formation. Further, the internal gate's threshold voltage (VTH1) could be reduced compared to the external gate (VTH2) by arranging the gate metal work-function in Double Gate devices...
This paper represents a developed cryptographic information protection algorithm based on a substitution permutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a predeveloped S-box tested against differential and linear...
On the basis of a unipolar corona discharge, a method of non-contact and continuous measurement of linear parameters of thin and ultra-thin dielectric fibres and optical fibres (10 to 125 microns) in the process of their manufacture was developed. The measurement method differs from the commonly known methods by high accuracy and reliability of measurement and resistance to changes in the electrical...
The aim of the work is to present the method for designing sparse FIR filters with very low group delay and approximately linear-phase in the passband. Significant reduction of the group delay, e.g. several times in relation to the linear phase filter, may cause the occurrence of undesirable overshoot in the magnitude frequency response. The method proposed in this work consists of two stages. In...
The Internet of Vehicles (IoVs) has become a vital research area in order to enhance passenger and road safety, increasing traffic efficiency and enhanced reliable connectivity. In this regard, for monitoring and controlling the communication between IoVs, routing protocols are deployed. Frequent changes that occur in the topology often leads to major challenges in IoVs, such as dynamic topology changes,...
The article herein presents a new technique of controlling the system of collecting, storing and processing the information from the solar collectors, which might be applied to heating the industrial and domestic compartments for hot water supply. The most profitable usage of the solar collectors in the industry is replacement of a human interference with wireless sensor nets. The solar collector...
The Internet of Vehicles (IoVs) has become a vital research area in order to enhance passenger and road safety, increasing traffic efficiency and enhanced reliable connectivity. In this regard, for monitoring and controlling the communication between IoVs, routing protocols are deployed. Frequent changes that occur in the topology often leads to major challenges in IoVs, such as dynamic topology changes,...
The validation of the measurements quality after on-site diagnostic system installation is necessary in order to provide reliable data and output results. This topic is often neglected or not discussed in detail regarding measurement systems. In the paper recently installed system for soft X-ray measurements is described in introduction. The system is based on multichannel GEM detector and the data...
The paper presents an original architecture and implementation of 9-bit Linearized Pulse Width Modulator (LPWM) for Class-BD amplifier, based on the hybrid method using STM32 microcontroller and Programmable Tapped Delay Line (PTDL). The analog input signals are converted into 12-bit PCM signals, then are directly transformed into 32-bit LBDD DPWM data of the pulse-edge locations within n-th period...
A new model of ideal signal sampling operation is developed in this paper. This model does not use the Dirac comb in an analytical description of sampled signals in the continuous time domain. Instead, it utilizes functions of a continuous time variable, which are introduced in this paper: a basic Kronecker time function and a Kronecker comb (that exploits the first of them). But, a basic principle...
In nuclear facilities, the reading of the sensors is very important in the assessments of the system state. The existence of an abnormal state could be caused by a failure in the sensor itself instead of a failure in the system. So, being unable to identify the main cause of the “abnormal state” and take proper actions may end in unnecessary shutdown for the nuclear facility that may have expensive...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations...
Beamforming training (BT) is considered as an essential process to accomplish the communications in the millimeter wave (mmWave) band, i.e., 30 ~ 300 GHz. This process aims to find out the best transmit/receive antenna beams to compensate the impairments of the mmWave channel and successfully establish the mmWave link. Typically, the mmWave BT process is highly-time consuming affecting the overall...
The paper discusses the characteristics of spatial electromagnetic noise generators, as well as the formation of a broadband noise signal. A number of well-known methods for assessing the quality of masking noise interference and the approaches used in them have been described. Approaches to the measurement of masking noise were also determined in assessing their quality. In conclusion, additional...
A novel approach to a trigger mode in the Gas Electron Multiplier (GEM) detector readout system is presented. The system is already installed at WEST tokamak. The article briefly describes the architecture of the GEM detector and the measurement system. Currently the system can work in two trigger modes: Global Trigger and Local Trigger. All trigger processing blocks are parts of the Charge Signal...
Obstructive Sleep Apnea is one common form of sleep apnea and is now tested by means of a process called Polysomnography which is time-consuming, expensive and also requires a human observer throughout the study of the subject which makes it inconvenient and new detection techniques are now being developed to overcome these difficulties. Heart rate variability has proven to be related to sleep apnea...
In this paper, it has been shown that the spectrum aliasing and folding effects occur only in the case of non-ideal signal sampling. When the duration of the signal sampling is equal to zero, these effects do not occur at all. In other words, the absolutely necessary condition for their occurrence is just a nonzero value of this time. Periodicity of the sampling process plays a secondary role.
In the paper, an overview of the methods and algorithms of synthesis, realization and implementation used by the author to obtain orthogonal 3-D filters with a structure made of Givens rotations has been presented. The main advantage of orthogonal filters, which may have a lower sensitivity to quantization of the coefficients, was indicated. The author proposed a number of possible changes and modifications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.