The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless communication is a fundamental requirement because of its low cost, high flexibility and convenience, continuing improvements in speed and connectivity, and accessibility in remote areas. One example is very small aperture terminal (VSAT) communication. A VSAT is a two-way satellite ground station operating at C-band and Ku-band frequencies, with linear and circular polarization in the C...
In this paper, we design and analyse the Circuit for Grover’s Quantum Search Algorithm on 2, 3 and 4-qubit systems, n terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the theoretical implementation of the search algorithm...
In this research, a multi-tasking protection and control device has been designed and implemented has the ability to control and manage automatically the supply of electrical power from various sources to electric appliances connected to the light loading line (3L). At the same time, providing comprehensive protection for the appliances by delaying the supply of power for short period of time during...
In this article, an analysis of an innovative system for filtering signals in the audible range (16 Hz - 20 kHz) on programmable logic devices using a filters with a finite impulse response, is presented. Mentioned system was neat combination of software and hardware platform, where in the program layer a multiple programming languages including VHDL, JavaScript, Matlab or HTML were used to create...
Speech recognition system extract the textual data from the speech signal. The research in speech recognition domain is challenging due to the large variabilities involved with the speech signal. Variety of signal processing and machine learning techniques have been explored to achieve better recognition accuracy. Speech is highly non-stationary in nature and therefore analysis is carried out by considering...
Phase shift interferometry (PSI) derived from interference technique as greater surface characterization technique based on the interference information recorded during a controlled phase shift. This research shows the development of micro/nano structures using phase shift interferometry. (PSI) is the process of developing the complex pattern structure using variable phase angle between two or more...
Ongoing energy measurement is one of the parameters such as: electron beam current, transporter speed, or scanning width, that must be recorded according to the conditions imposed in the accelerator validation procedure. Described measurement method based on the use of a secondary electron collecting electrode has been tested at the electron beam linear accelerator installation typically used for...
Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to enhance the security of data communications between...
Internet of Things (IoT) is the new research paradigm which has gained a great significance due to its widespread applicability in diverse fields. Due to the open nature of communication and control, the IoT network is more susceptible to several security threats. Hence the IoT network requires a trust aware mechanism which can identify and isolate the malicious nodes. Trust Sensing has been playing...
Nowadays, there is a trend to employ adaptive solutions in mobile communication. The adaptive transmission systems seem to answer the need for highly reliable communication that serves high data rates. For efficient adaptive transmission, the future Channel State Information (CSI) has to be known. The various prediction methods can be applied to estimate the future CSI. However, each method has its...
With the rapid development of remote sensing technology, our ability to obtain remote sensing data has been improved to an unprecedented level. We have entered an era of big data. Remote sensing data clear showing the characteristics of Big Data such as hyper spectral, high spatial resolution, and high time resolution, thus, resulting in a significant increase in the volume, variety, velocity and...
The article concerns the opinion on stationary and remote examinations carried out during a pandemic, perceived from the perspective of examiners. The aim of the study was to find out about the perspective of academic teachers on remote examination at The Maria Grzegorzewska University and to compare it with the traditional, stationary exams. The subject of the research were, inter alia, the forms...
Channel coding provides numerous advantages to digital communications. One of such advantages is error correcting capabilities. This, however, comes at the expense of coding rate, which is a function of the codebook’s cardinality |C| or number of coded information bits and the codeword length M. In order to achieve high coding rate, we hereby report a channel coding approach that is capable of error...
A novel compact Ultra-Wide-Band Planar Inverted-L antenna is presented and investigated in this paper. The proposed antenna consists of a square planar radiating element with a U-shaped slot. The radiating element is supported by a shorting wall, and fed by a single 50 Ohms characteristic impedance microstripe line, printed on the top of the FR-4 substrate. The ground plane of the antenna is printed...
Within the maximum likelihood method an optimal algorithm for polarization target selection against the background of interfering signal reflected from the earth’s surface is synthesized. The algorithm contains joint operations of spectral interference rejection and their polarization compensation by means of certain combinations of interchannel subtraction of signals of different polarizations. The...
We describe Urukul, a frequency synthesizer based on direct digital synthesis (DDS), optimized for wave generate control in atomic, molecular and optical (AMO) physics experiments. The Urukul module is a part of the Sinara family of modular, open-source hardware designed for the ARTIQ quantum operating system. The Urukul has 4-channel, sub-Hz frequency resolution, controlled phase steps and accurate...
Chaos is an active topic of study in the field of secure communication systems that have garnered much consideration in recent years because of excessive sensitivity to a simple change in its initial conditions. In this paper, the essential features of the suggested WINDMI chaotic system like the phase portraits of the attractors, bifurcation, PSD, correlation, and balance property of the windmi chaotic...
In this paper, the performance of Low-Density Parity-Check (LDPC) codes is improved, which leads to reduce the complexity of hard-decision Bit-Flipping (BF) decoding by utilizing the Artificial Spider Algorithm (ASA). The ASA is used to solve the optimization problem of decoding thresholds. Two decoding thresholds are used to flip multiple bits in each round of iteration to reduce the probability...
The article concerns the opinion on stationary and remote examinations carried out during the COVID-19 pandemic, perceived from the perspective of the assessed students. The study aimed to find out about the students' perspective on remote final and midterm exams at The Maria Grzegorzewska University and to attempt to compare it with the traditional examination. The subject of the research was, among...
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.