The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents a wideband nine-port reflectometer realized as a cascade connection of six- and five-port reflectometers. It is shown that such a solution allows for a convenient adjustment of circuits’ parameters in order to provide significantly reduced measurement uncertainty with respect to other reported reflectometers. Simultaneously, the proposed network features a simple and flexible design...
The paper deals with multiple soft fault diagnosis of linear analog circuits. A fault verification method is developed that allows estimating the values of a set of the parameters considered as potentially faulty. The method exploits the transmittance of the circuit and is based on a diagnostic test leading to output signal in discrete form. Applying Z-transform a diagnostic equation is written which...
The paper discusses actual task of ensuring the quality of services in information networks with fractal traffic. The generalized approach to traffic management and quality of service based on the account of multifractal properties of the network traffic is proposed. To describe the multifractal traffic properties, it is proposed to use the Hurst exponent, the range of generalized Hurst exponent and...
The industry standard BSIM3v3 and BSIM4.0 have been replaced by BSIM6.0 compact MOSFET model for deep submicron technology node. The BSIM6.0 is next generation, defacto industry standard model for bulk MOSFET. This model is charge based which is continuous from weak to strong inversion of operation. The core of analytical and physical BSIM6 model[3] is charge, with drain current equation expressed...
This article is devoted to the development of the scrambler circuit. Nowadays, new WiFi standard IEEE 802.11 is being put into operation, so that there is a huge need in modern, energy-efficient algorithms, which will be used in the data transmission. Consequently, some of the scrambler circuits, which could be implemented for the IEEE 802.11 standard are described with its comparison. In addition,...
The paper concerns the study of the effect of thermal phenomena on characteristics of the IGBT. The used measurement set-ups and the results of measurements of dc characteristics of the selected transistor obtained under different cooling conditions are presented. The influence of the ambient temperature and the applied cooling system on the shape of these characteristics is discussed. In particular,...
Singular network condition is proposed to study oscillators. It states that a circuit is a potential oscillator if and only if the rank of the network matrix of size n X n is (n -1) at the frequency of oscillations. The dual (if it exists) and adjoint circuit of an oscillator are also oscillators. Limitations of Barkhausen’s approach are pointed out. It is explained that there are many ways to generate...
Efficient access to the spectral resources becomes a challenge for future military wireless communication systems. It requires spectral situation awareness, knowledge of current regulations, local policies and hardware platform limitations. It can be achieved by cognitive radios, realizing cognitive cycle, consisting typically of continuous observation, orientation, reasoning and decision making....
Together with the rise of importance of devices employing wireless networks based on the principle of radio frequency data transfers, also the discussion on harmfulness of the electromagnetic radiation has occurred. The authors of this paper obviously cannot provide unambiguous answers to stop this discussion. On the other way, they can provide the reader of this paper with real data obtained by measurements...
Science - research transformation of the Internet of Things (IoT) has a number of colours and shadows, many dimensions including technical, social, community, financial, economic and civilization. This transformation has many wide development roads but also numerable pitfalls and traps. It does not take place solely at the level of scientific and technical progress and innovation. It preliminarily...
Military wireless tactical systems has faced the problem of limited spectrum resources. This is a reason why Cognitive Radio (CR) is one of the most popular topic studied by research institutes in the field of mobile telecommunications. CR technology is based on cognitive cycle, used for making decisions based on observation and orientation. To support this activity, radios need also information on...
In this paper, some of the existing classifications of the Saleh’s and related models of the AM/AM and AM/PM conversions occurring in communication power amplifiers (PA) are reviewed. It is shown that these classifications are inconsistent and must be refined. Obviously, carrying out such a refinement properly needs a good knowledge and correct understanding of the mechanisms leading to the AM/AM...
This paper shows effective method of linear distortions compensation in zero-IF receivers. With application of frequency domain processing a computation efficient method was developed that allows to correct quadrature mismatch in Zero-IF receiver along with gain and group delay independent of receiving signal type. Method was implemented and tested on hardware platform confirming its effectiveness...
EPOS is a generator which allows one to simulate various types of collisions of divers systems with different initial parameters. It considers the parton-based Gribov-Regge theory. So far the EPOS model has been used to describe higher collision energies obtained with RHIC or LHC data. On the other hand, there is another program under investigation: Beam Energy Scan conducted at Brookhaven National...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence of a dualuse source node and an eavesdropper. Specifically, the source has dual roles in the dual-hop communication: 1) to transmit confidential information in the first hop; 2) to generate jamming signal to interfere the eavesdropper in the second hop. Moreover, the multi-antenna relay deploys a power-splitting...
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such as pseudo-random bit sequences generator, key wrapping or one pass authentication, especially in weak devices (WSN, IoT, etc.). Analysis of the function showed that successful preimage attacks are possible for low round hashes,...
The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well as decision-making process of registering a given event, are context-aware. Non-repudiation is equipped with context-awareness by using widely utilized network tools. The aim of this paper is to present timing results for selected tools execution and to complete...
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in the class of ARX ciphers. The practical application of the algorithm is demonstrated on round-reduced variants of block ciphers from the SPECK family. More specifically, we report the best differential trails, up to 9 rounds, for SPECK32.
The convolution operation used in deterministic network calculus differs from its counterpart known from the classic systems theory. A reason for this lies in the fact that the former is defined in terms of the so-called min-plus algebra. Therefore, it is oft difficult to realize how it really works. In these cases, its graphical interpretation can be very helpful. This paper is devoted to a topic...
This paper presents a new OpenFlow controller: the Distributed Active Information Model (DAIM). The DAIM controller was developed to explore the viability of a logically distributed control plane. It is implemented in a distributed way throughout a software-defined network, at the level of the switches. The method enables local process flows, by way of local packet switching, to be controlled by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.