Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Hereby there is given the speaker identification basic system. There is discussed application and usage of the voice interfaces, in particular, speaker voice identification upon robot and human being communication. There is given description of the information system for speaker automatic identification according to the voice to apply to robotic-verbal systems. There is carried out review of algorithms...
The continuous growth of smart communities and ever-increasing demand of sending or storing videos, have led to consumption of huge amount of data. The video compression techniques are solving this emerging challenge. However, H.264 standard can be considered most notable, and it has proven to meet problematic requirements. The authors present (BPMM) as a novel efficient Intra prediction scheme. We...
Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate...
In this article is revealed the systems of a good delivery witch implement unmanned aerial vehicles during providing the service. the one channel systems of a goods delivery are a goal of this research work. the close analysing of their functional features, the classification, the types and parameters of different systems from this band are presented. in addition, the modelling of the different types...
Signal attenuation caused by the propagation path between the compromising emanation source (the location of secured IT equipment) and the location of the antenna of the potential infiltrating system has a direct influence on the electromagnetic safety of IT equipment. The article presents original analytical relationships necessary to estimate the attenuation values introduced by the propagation...
As the delivery of good quality software in time is a very important part of the software development process, it's a very important task to organize this process very accurately. For this, a new method of the searching associative rules were proposed. It is based on the classification of all tasks on three different groups, depending on their difficulty, and after this, searching associative rules...
This paper presents the design of a compact protocol for fixed-latency, high-speed, reliable, serial transmission between simple field-programmable gate arrays (FPGA) devices. Implementation of the project aims to delineate word boundaries, provide randomness to the electromagnetic interference (EMI) generated by the electrical transitions, allow for clock recovery and maintain direct current (DC)...
In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable...
Arriving at a good combination of coding and modulation schemes that can achieve good error correction constitutes a challenge in digital communication systems. In this work, we explore the combination of permutation coding (PC) and pulse amplitude modulation (PAM) for mitigating channel errors in the presence of background noise and jitter. Since PAM is characterised with bi-polar constellations,...
The copy-move forgery detection (CMFD) begins with the preprocessing until the image is ready to process. Then, the image features are extracted using a feature-transform-based extraction called the scale-invariant feature transform (SIFT). The last step is features matching using Generalized 2 Nearest-Neighbor (G2NN) method with threshold values variation. The problem is what is the optimal threshold...
In this paper, we show that signal sampling operation can be considered as a kind of all-pass filtering in the time domain, when the Nyquist frequency is larger or equal to the maximal frequency in the spectrum of a signal sampled. We demonstrate that this seemingly obvious observation has wide-ranging implications. They are discussed here in detail. Furthermore, we discuss also signal shaping effects...
In direct-detection OFDM systems, the nonlinear effects caused by optical modulation and fiber transmission can degrade the system performance severely. In this study, we propose a new nonlinear companding transform to improve the performance of direct detection optical OFDM transmission systems. The demonstration is realized by Monte-Carlo simulation of the intensity modulation and direct detection...
Daniel Bernstein and Tanja Lange [9] proved that two given addition formulas on twisted Edwards elliptic curves ax² + y² = 1 + dxy are complete (i.e. the sum of any two points on a curve can be computed using one of these formulas). In this paper we give simple verification of completeness of these formulas using a program written in Magma, which is based on the fact that completeness means that some...
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and nonlinear feedback shift registers (NLFSR) and their combination. It is currently known how to construct LFSR to generate a bit sequence with a maximum...
With the advent of massive MIMO and mmWave, Antenna selection is the new frontier in hybrid beamforming employed in 5G base stations. Tele-operators are reworking on the components while upgrading to 5G where the antenna is a last-mile device. The burden on the physical layer not only demands smart and adaptive antennas but also an intelligent antenna selection mechanism to reduce power consumption...
This article presents methods and algorithms for the computation of isogenies of degree ℓⁿ. Some of these methods are obtained using recurrence equations and generating functions. A standard multiplication based algorithm for computation of isogeny of degree ℓⁿ has time complexity equal to O(n²M (n log n)), where M (N) denotes the cost of integers of size N multiplication. The memory complexity of...
An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cyber security facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection...
DC-DC converters are popular switch-mode electronic circuits used in power supply systems of many electronic devices. Designing such converters requires reliable computation methods and models of components contained in these converters, allowing for accurate and fast computations of their characteristics. In the paper, a new averaged model of a diode-transistor switch containing an IGBT is proposed...
The subject of the article is the design and practical implementation of the wireless mesh network. IQRF radio modules were used for the network design. The IQRF® technique has enabled the construction of a mesh network with the possibility of reconfiguration. The theoretical part contains a description of the IQRF® hardware solutions used. The practical scope includes the design part, where the configuration...
This paper details a hardware implementation of a distributed Ɵ(1) time algorithm allows to select dynamically the master device in ad-hoc or cluster-based networks in a constant time regardless the number of devices in the same cluster. The algorithm allows each device to automatically detect its own status; master or slave; based on identifier without adding extra overheads or exchanging packets...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.