The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof...
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream...
In the literature, Saleh’s description of the AM/AM and AM/PM conversions occurring in communication power amplifiers (PAs) is classified as a representation without memory. We show here that this view must be revised. The need for such revision follows from the fact that the Saleh’s representation is based on the quadrature mapping which, as we show here, can be expanded in a Volterra series different...
The modelling of FMCW SAR systems, due to long signal duration time, commonly used start-stop approximation for pulsed radars causes errors in the image. Continuous motion of the radar platform results in additional range-azimuth couplings and range walk term that should be considered in processing of signal from this type of radar. The paper presents an analysis of the following algorithms: Time...
Dynamic data transfer demands are often being a challenge for present communication networks, as they appear in unpredictable time and must be satisfied prior to deadline. Important kind are the multi-target demands occurring in task of replication, backup, database synchronization or file transferring in pear-to-pear networks. Optimal scheduling usually depends of the nature of transport network...
In this paper, we proposed an efficient full adder circuit using 16 transistors. The proposed high-speed adder circuit is able to operate at very low voltage and maintain the proper output voltage swing and also balance the power consumption and speed. Proposed design is based on CMOS mixed threshold voltage logic (MTVL) and implemented in 180nm CMOS technology. In the proposed technique the most...
Channel assignment in 2.4 GHz band of 802.11 standard is still important issue as a lot of 2.4 GHz devices are in use. This band offers only three non-overlapping channels, so in crowded environment users can suffer from high interference level. In this paper, a greedy algorithm inspired by the Prim’s algorithm for finding minimum spanning trees (MSTs) in undirected graphs is considered for channel...
This paper compares accuracy of indoor positioning systems using one of three selected ISM bands: 433, 868 or 2400 MHz. Positioning is based on Received Signal Strength Indication (RSSI), received by majority of ISM RF modules, including lowcost ones. Investigated environment is single, indoor space (e.g. office, hall) and personal use, thus 2-dimensional (2D) coordinate system is used. Obtained results,...
This paper presents analysis of object location accuracy of a mobile device on the basis of the iBeacon technology. The research starts with radio signal strength indicator analysis along the corridor in order to create a path loss model for iBeacon. Two cases are taken into account: line of sight and non-line of sight for model creation. For both cases two tests: Chi-square, Shapiro-Wilk have been...
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
The main aim of this paper is to propose Cubic Spline-Quantum Neural Network (CS-QNN) model for analysis and classification of Electroencephalogram (EEG) signals. Experimental data used here were taken from seven different electrodes. The work has been done in three stages, normalization of the signals, extracting the features by Cubic Spline Technique (CST) and classification using Quantum Neural...
Radio is by far the most accessible medium. With its mobility and availability, it attracts listeners by its simplicity and friendliness. The present information situation is characterized by the convergence of computers, mobile devices, telecommunication and broadcasting technologies and the divergence of different ways of delivering and storing media. Consumers are overwhelmed by new electronic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.