The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the recent year's low power computing systems have gained popularity. Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the new optimization of structure of network transmission protocol, the routing optimization in transmission...
Countless various malware families provide huge variety of functionalities which allow them to do many malicious activities. This conditions led to development of many different analysis methods. In this paper, we focused on reverse engineering, which is elementary part of static analysis. We evaluate current Java bytecode decompilers. We evaluate the output from current Java bytecode decompilers...
Emerging of SDR technology gives new possibilities to developers of radio equipment They can implement new types of modulations and error correction mechanisms in the way not available till now. All that enables reaching higher data rates, longer ranges and in case of the narrowband radio enables using it in BMS system to deliver basic services like digitized voice and BFT. This article presents selected...
The widespread need for radio broadband services (such as video broadcasting) requires the use of radio that is capable to deliver such services. Unfortunately, beside benefits of using broadband radios (higher bit rates) there are also disadvantages, ie less range of operation in comparison to the narrowband radios range and less resistance to jamming (broadband operation results in increase of detection...
The paper is focused on use of Pulse Coupled Neural Network (PCNN) in the image steganography based on the research in the field of invariant image recognition. In general, steganography deals with data concealing in the cover mediums which can be freely accessible or transmitted by various communication channels without any restriction. A suitable position of hidden message is crucial for a successful...
In this paper we propose a method for planning military scenarios in the Military Scenario Definition Language (MSDL) which is based on the concepts of grammatical engineering, abstract and concrete syntax and semantics and language processors.
The paper deals with the use of modelling and simulation tools for preparation and implementation of exercises of Integrated Rescue System components and crisis management bodies with the main emphasis on the use of means of constructive simulation using SIMEX simulator. A scenario of multiple traffic accident was prepared for the crisis management authorities. Activities performed by crisis management...
This article is about the changes made in education of IT for three decades in Poland Authors describe the first rapid decade of education of IT in secondary schools, later evolution of this subject and changes in priority of educating youths at schools. At the end authors give example of latest approach where education of IT is present at almost every level of education.
To achieve optimal data routing along fiber optics, analytical and algorithmic methods are used. When some degradation factors cause temporary optical fiber impairment, optimization of data routing is an essential problem. However, the temporality is quite vague and, some network parameters are difficult to quantify. While optimizing temporarily changed route in an optical network, any cooperating...
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work considering German law and industrial requirements, with the aim of developing a self-implemented IT security assessment designed to identify threats and aid in increasing their security level. This is necessary because micro-enterprises contributing to the national economy have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.