The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents a novel short-range wireless sensor node architecture, based on Integral Pulse Frequency Modulator (IPFM) and Ultra-Wideband (UWB) pulse generator. Due to the lack of internal clock signal source and multi user implementation without application of a microprocessor, the architecture is simple and energy efficient. Multi-user coding is performed using delay elements, where each user...
In this paper we considered the problem of finding pairs of mutually orthogonal diagonal Latin squares of order 10. First we reduced it to Boolean satisfiability problem. The obtained instance is very hard, therefore we decomposed it into a family of subproblems. To solve the latter we used the volunteer computing project SAT@home. In the course of 10-month long computational experiment we managed...
The newly developed second generations standards for digital video broadcasting (DVB-T2, DVB-S2) emerges as a significant upgrade over its first generation predecessor. Low-Density Parity-Check (LDPC) codes received a lot of attention by their superb error-correcting capability and have been adopted as main error correct coding scheme by second generation Digital Video Broadcasting standards. The...
Random Linear Network coding (RLNC) has emerged as a promising solution for reliable multimedia delivery over mobile cellular networks. In this paper, we deploy Application Layer-RLNC (AL-RLNC) on the top of the existing Hybrid Automatic Repeat Request (HARQ) in 4G Long Term Evolution (LTE) networks. A simple implementation scenario composed of a user equipment, an eNB and a remote host is considered...
In this paper we present a model Cyber Security course primarily designed to address the educational and training needs for developing secure software intensive systems. The course is designed, within a Computer Science curriculum, to satisfy the national requirements of the Information Assurance Workforce Improvement Program (per DoD8570.01-Mfrom 11.10.2015), for Tiers II and III jobs, primarily...
In this paper we present the computational study of one class of discrete models of collective behavior. In the context of these models a set of agents, that form a collective, is represented by a network. Each agent is assigned a special weight function. The behavior of a collective in discrete time moments is specified with a vector function, the coordinates of which are defined by values of agents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.