The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the article, three types of proximity sensors that might be used in bicycle rangefinder to measure the distance between the bicycle and an overtaking car are compared. The influence of various factors on the accuracy of the distance measurements obtained using ultrasonic, infrared and laser sensors is tested, among others, light conditions, car surface type and colour, rain, pollination and vibrations.
The article presents the results of the questionnaire research carried out after the first and repeated after the second semester of crisis remote education, conducted at The Maria Grzegorzewska University. Students participating in the study indicate a significant increase in their IT competences and the level of remote education. They declare a similar, high level of commitment and independence...
High definition video transmission is one of the prime demands of modern day communication. Changing needs demand diverse features to be offered by the video codec standards, H.264 fits to these requirements for video compression. In this work, an attempt has been made to optimize the inter prediction along with improved intra prediction to ensure the minimal bit rates thereby reduction in the channel...
Assessment of seismic vulnerability of urban infrastructure is an actual problem, since the damage caused by earthquakes is quite significant. Despite the complexity of such tasks, today’s machine learning methods allow the use of “fast” methods for assessing seismic vulnerability. The article proposes a methodology for assessing the characteristics of typical urban objects that affect their seismic...
More and more street lighting deployments use LED technology as a light source. Unfortunately, the new technology also brings some challenges with it that remain unnoticed until installed at scale. This article presents issues related to capacitive reactive power consumed by LED luminaires. The problem is even more profound if the luminaire is dimmed, because it consumes capacitive reactive power,...
The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers. The cryptographically strong elliptic curves are those for which the discrete logarithm problem is computationally hard. The required mathematical conditions...
The clock synchronization is considered as a key technology in the time-sensitive networking (TSN) of 5G fronthaul. This paper proposes a clock synchronization enhancement method to optimize the link delays, in order to improve synchronization accuracy. First, all the synchronization dates are filtered twice to get the good calculation results in the processor, and then FPGA adjust the timer on the...
Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the...
Due to the severe damages of nuclear accidents, there is still an urgent need to develop efficient radiation detection wireless sensor networks (RDWSNs) that precisely monitor irregular radioactivity. It should take actions that mitigate the severe costs of accidental radiation leakage, especially around nuclear sites that are the primary sources of electric power and many health and industrial applications...
The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a...
In this paper for elliptic curves provided by Huff’s equation H a,b : ax(y² − 1) = by(x² − 1) and general Huff’s equation G a,b : x(ay² − 1) = y(bx² − 1) and degree 2 compression function f(x, y) = xy on these curves, herein we provide formulas for doubling and differential addition after compression, which for Huff’s curves are as efficient as Montgomery’s formulas for Montgomery’s curves By² = x³...
The objective of this paper is to estimate performance of a new approach for spectrum sharing and coordination between terrestrial base stations (BS) and On-board radio access nodes (UxNB) carried by Unmanned Aerial Vehicles (UAV). This approach employs an artificial intelligence (AI) based algorithm implemented in a centralized controller. According to the assessment based on the latest specifications...
The article is devoted to some critical problems of using Bayesian networks for solving practical problems, in which graph models contain directed cycles. The strict requirement of the acyclicity of the directed graph representing the Bayesian network does not allow to efficiently solve most of the problems that contain directed cycles. The modern theory of Bayesian networks prohibits the use of directed...
The article considers the problem of stability of interval-defined linear systems based on the Hurwitz and LienardShipar interval criteria. Krylov, Leverier, and Leverier-Danilevsky algorithms are implemented for automated construction and analysis of the interval characteristic polynomial. The interval mathematics library was used while developing the software. The stability of the dynamic system...
The article presents the possibilities of using popular MEMS inertial sensors in the object tilt angle estimation system and in the system for stabilizing the vertical position of the balancing robot. Two research models were built to conduct the experiment. The models use microcontroller development board of the STM32F3 series with the Cortex-M4 core, equipped with a three-axis accelerometer, magnetometer...
This paper presents the design of a wearable electroencephalography device and signal processing algorithm for early detection and forecasting of the epileptiform activity. The availability of the examination of functional brain activity for a prolonged period, outside of the hospital facilities, can provide new advantages in early diagnosis and intervention systems. In this study, the low-cost five-channel...
This article presents the design of a miniaturized wearable patch antenna to be utilized for the body area network (BAN) applications. To reduce the size of the antenna a crown fractal geometry antenna design technique has been adopted, and which resulted in a size reduction of 26.85%. Further, the polyester cloth has been used as the substrate of the antenna to make the proposed antenna a flexible...
The research carried out in the field of optics and photonics with an idea to design and develop the all optical logic devices in the fascinating material known as photonic crystals (PhCs). The structural investigation reveals that the two dimensional (2-D) PhCs is more suitable for fabrication of optoelectronic components. In this article we have designed basic logic gates in 2-D PhCs as they are...
The article deals with the features and characteristics of intelligent systems for modelling business processes. Their classification was made and criteria for comparison were developed. According to the comparative analysis of existing expert systems for intelligent analysis, a reasonable choice of system for modelling business processes of a particular enterprise has been carried out. In general,...
The article presents the results of the questionnaire research carried out after the first and repeated after the second semester of crisis distance education, conducted at the Academy of Special Education. Academic lecturers participating in the study indicate a significant decrease in the level of commitment, activity, the regularity of work and the quality of performing tasks presented by students...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.