The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The embryonic architecture, which draws inspiration from the biological process of ontogeny, has built-in mechanisms for self-repair. The entire genome is stored in the embryonic cells, allowing the data to be replicated in healthy cells in the event of a single cell failure in the embryonic fabric. A specially designed genetic algorithm (GA) is used to evolve the configuration information for embryonic...
The paper brings forward an idea of multi-threaded computation synchronization based on the shared semaphored cache in the multi-core CPUs. It is dedicated to the implementation of multi-core PLC control, embedded solution or parallel computation of models described using hardware description languages. The shared semaphored cache is implemented as guarded memory cells within a dedicated section of...
Driver assistance systems have started becoming a key differentiator in automotive space and all major automotive manufacturers have such systems with various capabilities and stages of implementation. The main building blocks of such systems are similar in nature and one of the major building blocks is road lane detection. Even though lane detection technology has been around for decades, it is still...
In this paper, we show why the descriptions of the sampled signal used in calculation of its spectrum, that are used in the literature, are not correct. And this finding applies to both kinds of descriptions: the ones which follow from an idealized way of modelling of the signal sampling operation as well as those which take into account its non-idealities. The correct signal description, that results...
Audio data compression is used to reduce the transmission bandwidth and storage requirements of audio data. It is the second stage in the audio mastering process with audio equalization being the first stage. Compression algorithms such as BSAC, MP3 and AAC are used as standards in this paper. The challenge faced in audio compression is compressing the signal at low bit rates. The previous algorithms...
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study,...
Effective and safe labour requires good cooperation of all the physiological systems. A proper synchronization of uterine and abdominal muscles is necessary for labour progression. Therefore, a new method for simultaneous monitoring of uterine activities and parturient’s pushing efforts is presented. A high sampled, rectified electrohysterographic signal is divided into a low, uterine passband (0...
The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber...
This work describes a dual band compact fully integrated rectenna circuit for implantable medical devices (IMDs). The implantable rectenna circuit consists of tunnel diode 10×10μm2 QW-ASPAT (Quantum Well Asymmetric Spacer Tunnel Layer diode) was used as the RF-DC rectifier due to its temperature insensitivity and nonlinearity compared with conventional SBD diode. SILVACO atlas software is used to...
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage...
The performance of free-space optical (FSO) communications that using an optical amplifier (OA) in the scheme of an amplify-received (AR)-relaying has a major drawback in the detection of input signal quality under the effects of turbulence. As an OA is based on a fiber-detection (FD) method to receive and delivers a signal at the amplification process stage, there is an opportunity to implement an...
In this article we present a procedure that allows to synthesize optimal circuit representing any reversible function within reasonable size limits. The procedure allows to choose either the NCT or the MCT gate set and specify any number of ancillary qubits to be used in the circuit. We will explore efficacy of this procedure by synthesizing various sources of nonlinearity used in contemporary symmetric...
Wearable antennas are becoming increasingly popular as a result of their wide range of applications, including communication, health parameter monitoring, and so on. If the wearable antenna is built of textile material, it is highly comfortable to wear and has numerous benefits, such as light weight, compact size, and low cost. A 1.3 GHz microstrip antenna made from jeans substrate is presented in...
Energy consumed by the sensor nodes are more sporadic in a sensor networks. A skilled way to bring down energy consumption and extend maximum life-time of any sensor present can be of evenly and unevenly distributed random area networks. Cluster heads are more responsible for the links between the source and destination. Energy consumption are much compare to member nodes of the network. Re-clustering...
QIT–Quantum Information Technologies promises are very serious, greatly exceeding only technical and market levels. Development of QIT in Europe, treated as building a new infrastructural civilization level, requires a broader view of coordination, funding and priority-setting policy. Simple measures used in the case of the development of new technologies, but not creating a significant ecosystem,...
This article discusses four fields of study with the potential to revolutionize our understanding and interaction with biological systems: quantum biophotonics, molecular and supramolecular bioelectronics, quantum-based approaches in gaming, and nano-biophotonics. Quantum biophotonics uses photonics, biochemistry, biophysics, and quantum information technologies to study biological systems at the...
Automatic car license plate recognition (LPR) is widely used nowadays. It involves plate localization in the image, character segmentation and optical character recognition. In this paper, a set of descriptors of image segments (characters) was proposed as well as a technique of multi-stage classification of letters and digits using cascade of neural network and several parallel Random Forest or classification...
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout the years, few methods exist to prevent the attacks. IEEE 802.11 covert channels could be considered a candidate to prevent Wi-Fi attacks since they allow...
In the article, a device for measuring the parameters of the rotational movement of the auger for dewatering solid waste is proposed based on the analysis of signal processing methods and measurement of physical quantities. It can be used in the development of high-performance special vehicles for transporting waste as the main link in the structure of machines for the collection and primary processing...
In the digital society, states’ information security has become one of the key elements of ensuring the competitiveness and sustainable development of the state, guaranteeing its integrity and security in general. An important component of state security is the internal security of the state, which must ensure the personal and public safety of its citizens. Modern Ukraine is building a new system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.