The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On 2-3 May 2022 ARIES – Accelerator Research and Innovation for European Science and Society held its last annual conference in CERN summarizing 6 year long effort on the smart development of particle accelerator infrastructures in Europe. The whole series of Integrating Activities on accelerator infrastructures started in 2003 with preparations of CARE, then followed by EuCARD, TIARA, EuCARD2 and...
Structural health monitoring of aircraft assures safety, integrity and reduces cost-related concerns by reducing the number of times maintenance is required. Under aerodynamic loading, aircraft is subjected to strain, in turn causing damage and breakdown. This paper presents a review of experimental works, which focuses on monitoring strain of various parts of aircraft using optical fibre sensors...
A testbench is built to verify a functionality of a shift register IC (Integrated Circuit) from stuck-at-faults, stuck-at-1 as well as stuck-at-0. The testbench is supported by components, i.e., generator, interface, driver, monitor, scoreboard, environment, test, and testbench top. The IC consists of sequential logic circuits of D-type flip-flops. The faults may occur at interconnects between the...
The article presents precision and numerically stable method of calculation of the characteristic impedance of cylindrical multilayer waveguides used in high-precision wideband measuring instruments and standards, especially calculable thermal converters of AC voltage and precision wideband current shunts. Most of currently existing algorithms of characteristic impedance calculation of such waveguides...
An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI...
This paper presents how to design and simulate a passband rectangular waveguide filters based on direct coupled resonators operating at 12 GHz. The modeled filters are characterized by a cross coupling that produces a single attenuation pole at finite frequency used to shape the bandpass response. Resonators provide bandpass filter designs with a pseudo-elliptic response using HFSS simulators. Transmission...
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms). Comparing to other post-quantum algorithms, the main advantages of these protocols are smaller keys, the similar idea as in the ECDH, and a large basis of expertise about elliptic curves. The main disadvantage of...
The article concerns the experiences of academic teachers related to hybrid education at the end of the SARS-CoV-2 coronavirus pandemic. The aim of the study was to understand the lecturers' perspective on hybrid education implemented in the first semester of the 2021/2022 academic year at The Maria Grzegorzewska University and an attempt to compare it with traditional education and distance education...
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present...
This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network...
In today’s fast-paced world, where everyone/everything is moving towards an online platform, the need to provide high-speed data to all is inevitable. Hence, introducing the emerging 5G technology with orthogonal frequency division multiplexing integrated with massive MIMO technology is the need of the hour. A 640 port Massive MIMO (m-MIMO) antenna with high evenly spread gain and very low delay,...
This work present an efficient hardware architecture of Support Vector Machine (SVM) for the classification of Hyperspectral remotely sensed data using High Level Synthesis (HLS) method. The high classification time and power consumption in traditional classification of remotely sensed data is the main motivation for this work. Therefore presented work helps to classify the remotely sensed data in...
The liver is a vital organ of the human body and hepatic cancer is one of the major causes of cancer deaths. Early and rapid diagnosis can reduce the mortality rate. It can be achieved through computerized cancer diagnosis and surgery planning systems. Segmentation plays a major role in these systems. This work evaluated the efficacy of the SegNet model in liver and particle swarm optimization-based...
To improve the user’s localization estimation in indoor and outdoor environment a novel radiolocalization system using deep learning dedicated to work both in indoor and outdoor environment is proposed. It is based on the radio signatures using radio signals of opportunity from LTE an WiFi networks. The measurements of channel state estimators from LTE network and from WiFi network are taken by using...
Outage and Success performances of an amplify-and-forward relay-assisted D2D communication system over a κ-μ shadowed fading wireless link are presented here. Co-channel interference (CCI) is assumed to affect the D2D signals at relay and destination nodes. The system is analyzed with two scenarios, namely, with diversity combining and without diversity combining. Selection combining (SC) based diversity...
Various methods are used to obtain a superior palmprint recognition system. After selecting a palmprint image filter, using Gabor orientation scale pairs is an option to support the refinement of the verification process. Many researchers use the [8×5] pair for the value of the Gabor orientation scale in the field of palmprint recognition. However, from the experiments conducted, other Gabor pairs...
Soldiers are the backbone of any armed force. They usually lose their lives due to the lack of medical assistance in emergency situations. Furthermore, army bases face problems due to the inability to track soldiers’ locations in the field. Hence, this paper proposes an interactive graphical user interface module (IGUIM) for soldiers’ bioinformatics acquisition and emergency reaction during combat,...
This work describes a 4-bit Flash ADC with low power consumption. The performance metrics of a Flash ADC depend on the kind of comparator and encoder used. Hence openloop comparator and mux-based encoder are used to obtain improved performance. Simulation results show that the simulated design consumes 0.265mW of power in 90nm CMOS technology using cadence-virtuoso software. The circuit operates with...
This paper presents a simulation study of the simultaneous reconstruction of the non-smooth strain distribution of an optical fiber Bragg grating and its temperature, which is based on the reflection spectrum of the reflected beam of the grating. The transition matrix method was used to model the reflection spectrum of the grating, and the nonlinear NelderMead optimization method was used to simultaneously...
The paper presents a new second-cycle Electronics and Telecommunications study program that has been running in Lodz University of Technology since 2020. The concept of the program uses the Project Based Learning approach and it is based on three main projects implemented throughout the curriculum. The inspiration was the programs of three foreign universities and extensive research of various groups...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.