scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Electronics and Telecommunications in 2016"


Journal ArticleDOI
TL;DR: The article examines the efficiency of selected machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions and the results are compared with other SDN-based IDS.
Abstract: We propose a concept of using Software Defined Network (SDN) technology and machine learning algorithms for monitoring and detection of malicious activities in the SDN data plane. The statistics and features of network traffic are generated by the native mechanisms of SDN technology. In order to conduct tests and a verification of the concept, it was necessary to obtain a set of network workload test data. We present virtual environment which enables generation of the SDN network traffic. The article examines the efficiency of selected machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions. The results are compared with other SDN-based IDS.

36 citations


Journal ArticleDOI
TL;DR: This paper presents analysis of object location accuracy of a mobile device on the basis of the iBeacon technology, which enhanced knowledge about positioning based on the popular iBeacons technology.
Abstract: This paper presents analysis of object location accuracy of a mobile device on the basis of the iBeacon technology. The research starts with radio signal strength indicator analysis along the corridor in order to create a path loss model for iBeacon. Two cases are taken into account: line of sight and non-line of sight for model creation. For both cases two tests: Chi-square, Shapiro-Wilk have been performed. It has also been checked if the HCI (Host Controller Interface) is a source with a memory. Acquired data have been filtered with different type of filters, e.g. median, moving average and then compared. Next, the authors evaluated the indoor positioning trilateration algorithms with the use of created model for exemplary hall. The RSSI map (radiomap) was created and the logarithm propagation model was designed. The logarithmic model estimated distance with average error 1.09m for 1 – 9m and 1.75m for 1-20m and after trilateration, the positions with average error 2.45m was achieved. A statistical analysis for acquiring data led to the final conclusion which enhanced knowledge about positioning based on the popular iBeacon technology.

23 citations


Journal ArticleDOI
TL;DR: This paper evaluates performance of different solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen) using standard benchmark tools to compare efficiency of main hardware components.
Abstract: Virtualization of operating systems and network infrastructure plays an important role in current IT projects. With the number of services running on different hardware resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their competitors. In this paper we evaluate performance of different solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard benchmark tools to compare efficiency of main hardware components, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented.

23 citations


Journal ArticleDOI
TL;DR: 3D scanning introduces novel volumetric method, which is compared with standard methods and is more accurate compared to present ones, and its accuracy is evaluated and experimentally verified.
Abstract: This paper deals with application of 3D scanning technology in medicine. Important properties of 3D scanners are discussed with emphasize on medical applications. Construction of medical 3D scanner according to these specifications is described and practical application of its use in medical volumetry is presented. Besides volumetry, such 3D scanner is usable for many other purposes, like monitoring of recovery process, ergonomic splint manufacturing or inflammation detection. 3D scanning introduces novel volumetric method, which is compared with standard methods. The new method is more accurate compared to present ones. Principles of this method are discussed in paper and its accuracy is evaluated and experimentally verified.

20 citations


Journal ArticleDOI
TL;DR: In this article, an antenna system combining sensing and communication tasks is proposed to be integrated into cognitive radio front-ends, where the sensing task is performed by the means of an ultra-wideband quasi-omnidirectional antenna.
Abstract: Dynamic spectrum access has been proposed as the effective solution to overcome the spectrum scarcity issue, supported by cognitive radio technology. Sensing and communication functions are both the most important tasks in cognitive radio systems. In this paper, an antenna system combining sensing and communication tasks is proposed to be integrated into cognitive radio front-ends. Sensing task is performed by the means of an ultra-wideband quasi-omnidirectional antenna. Whilst the communication task is ensured by using a narrowband antenna. Both antennas have been designed on the same layer of a FR4 substrate, for manufacturing cost constraint. Therefore, the isolation between them must take into consideration. The measured mutual coupling of less than -18dB is achieved over the whole impedance bandwidth. The proposed sensing antenna covers a wide range frequency bands ranging from 2 to 5.5GHz. While the communication antenna operates at 2.8GHz, and by adding inductors to the antenna, the resonant frequency can be tuned from 2.6 to 2.7GHz. The whole antenna system was designed, fabricated, and tested. Measurement and simulation results prove the feasibility of the proposed structure for cognitive radio applications.

17 citations


Journal ArticleDOI
TL;DR: This article tries to confirm that it is possible to use successfully OpenBCI in BCI projects, and reviews past works of other authors and compares it with the results, obtained using EEG mentioned before.
Abstract: The paper presents a process of stimuli design for SSVEP-based brain computer-interface. A brain computerinterface can be used in direct communication between a brain and a computer, without using muscles. This device is useful for paralyzed people to communicate with the surrounding environment. Design process should provide high accuracy recognition of presented stimuli and high user comfort. It is widely known how to make stimuli for BCI which are using high-grade EEG. Over recent years cheaper EEGs are becoming more and more popular, for example OpenBCI, which uses ADS1299 amplifier. In this article we review past works of other authors and compare it with our results, obtained using EEG mentioned before. We try to confirm that it is possible to use successfully OpenBCI in BCI projects.

16 citations


Journal ArticleDOI
TL;DR: The article presents the methods of searching non-disjoint decomposition using SMTBDD diagrams, and analyzes the techniques of choosing cutting levels as far as effective technology mapping is concerned.
Abstract: The main purpose of the paper is to suggest a new form of BDD – SMTBDD diagram, methods of obtaining, and its basic features. The idea of using SMTBDD diagram in the process of logic synthesis dedicated to FPGA structures is presented. The creation of SMTBDD diagrams is the result of cutting BDD diagram which is the effect of multiple decomposition. The essence of a proposed decomposition method rests on the way of determining the number of necessary ‘g’ bounded functions on the basis of the content of a root table connected with an appropriate SMTBDD diagram. The article presents the methods of searching non-disjoint decomposition using SMTBDD diagrams. Besides, it analyzes the techniques of choosing cutting levels as far as effective technology mapping is concerned. The paper also discusses the results of the experiments which confirm the efficiency of the analyzed decomposition methods.

16 citations


Journal ArticleDOI
TL;DR: This work focuses on security aspects of VLC communication, starting from basic physical characteristics of the communication channel, and discusses MAC-level security mechanisms as defined in the IEEE 802.15.7 standard.
Abstract: — Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Originally developed as a physical media for PANs (Personal area Networks) it evolved into universal WLAN technology with a capability to transport internet suite of network and application level protocols. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard. This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems — PDES 2015.

15 citations


Journal ArticleDOI
TL;DR: In this paper, the influence of thermal sintering conditions (temperature, time) on the resistance of paths made with inkjet printing on flexible substrates by using two electrically conductive inks was presented.
Abstract: The sintering of elements performed with the inkjet printing technique is one of the stages of flexible printed circuit manufacturing process. It is a crucial factor to determining the printed paths conductivity playing often an important role in the printed circuit. In this paper the study of the influence of thermal sintering conditions (temperature, time) on the resistance of paths made with inkjet printing on flexible substrates by using two electrically conductive inks was presented. The results of the investigations show that the sintering temperature is the main factor determining the paths resistance. Therefore, in some applications the sintering temperature higher than the one specified by the ink manufacturer can be used to decrease the paths resistance and to improve some circuit parameters. However, it should be noticed that the effective resistance decrease occurs only up to a certain temperature due to the appearance cracks in the printed paths.

14 citations


Journal ArticleDOI
TL;DR: Comparison of prototype location system built with standard components of 2.4 and 5 GHz WLAN network infrastructure is presented to research of how much accuracy (and usefulness) can be expected from standard WLAN hardware.
Abstract: This paper presents comparison of prototype location system built with standard components of 2.4 and 5 GHz WLAN network infrastructure. The system can be used for personal or other objects’ positioning, both for indoor and outdoor environments. The system is local, i.e. its operational area is limited to WLAN network operating range. The system is based on standard and widely available WLAN components (access points, network adapters). The goal is to avoid any hardware and software modifications. Also position calculation should not be power hungry operation. Method of location is based in Received Signal Strength Indication (RSSI) returned by most of RF ICs (including WLAN). The main focus is research of how much accuracy (and usefulness) can be expected from standard WLAN hardware. Both static and dynamic scenarios have been tested and compared.

13 citations


Journal ArticleDOI
TL;DR: In this paper, a new method for information hiding in open social networks is introduced, called StegHash, which is based on the use of hashtags in various open social network to connect multimedia files (like images, movies, songs) with embedded hidden messages.
Abstract: — In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.

Journal ArticleDOI
TL;DR: A method of tuning the parameters of the continuous controller is presented, which is optimal according to the ITAE criterion, and the behavior of control systems with discrete controllers whose parameters were tuned using the mentioned method are described.
Abstract: The paper deals with an analysis of automatic control system with continuous and discrete PID controllers. A method of tuning the parameters of the continuous controller is presented, which is optimal according to the ITAE criterion. The behavior of control systems with discrete controllers whose parameters were tuned using the mentioned method are described. The impact of changes in the sampling period of controlled signal on the control quality is shown. Changes of the values of optimal parameters of discrete PID controllers in relation to changes of the sampling rate of controlled signal are characterized.

Journal ArticleDOI
TL;DR: In this article, the complete methodology of designing T-and modified ring resonators in the UHF band is presented, and a dedicated software tool has been elaborated in order to determine material parameters of contemporary substrates.
Abstract: The complete methodology of designing T- and modified ring resonators in the UHF band are presented in the paper. On the basis of proposed algorithms, the dedicated software tool has been elaborated in order to determine material parameters of contemporary substrates. The program is implemented in the Mathcad environment and it includes the base of information on known materials used in electronic products. Also, test sample series for selected substrate materials (IS680, FR408, I-SPEED PCB ISOLA and A6-S LTCC FERRO) and operating frequencies from 1 GHz to 3 GHz are analyzed in details. The special test stand with a vector network analyzer has been applied in experiments. The obtained data of relative permittivity measurements and model calculations are described, discussed and concluded.

Journal ArticleDOI
TL;DR: A feasibility study is presented into the effect of traffic type influence on performance of routing algorithm while the routing algorithm is treated as one of the mechanisms to support QoS in the network.
Abstract: Providing a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of these new and mixed traffic types shows that this traffic is self-similar. Network mechanisms used for delivery of quality of services may depend on traffic type especially from the performance point of view. This paper presents a feasibility study done into the effect of traffic type influence on performance of routing algorithm while the routing algorithm is treated as one of the mechanisms to support QoS in the network.

Journal ArticleDOI
TL;DR: In this article, the authors present a case study of user expectations related with today's digital media, particularly radio transmission, as well as the economic, technological, regulatory and frequency management factors.
Abstract: Radio is by far the most accessible medium. With its mobility and availability, it attracts listeners by its simplicity and friendliness. The present information situation is characterized by the convergence of computers, mobile devices, telecommunication and broadcasting technologies and the divergence of different ways of delivering and storing media. Consumers are overwhelmed by new electronic gadgets appearing every year. They are astonished by new technical innovations that are being designed to ease their life and change their habits. Even the broadcasting sector itself is facing significant changes, especially a growing competition between the private and public sector. This article reviews the current status of analog and digital broadcasting technologies. It analyzes a case study of user expectations related with today’s digital media, particularly radio transmission. We discuss the principal possibilities, limitations and user expectations related with digital audio broadcasting, as well as the economic, technological, regulatory and frequency management factors.

Journal ArticleDOI
TL;DR: This article illustrates modeling of flexible neural networks for handwritten signatures preprocessing in proposed flexible neural network architecture, in which some neurons are becoming crucial for recognition and adapt to classification purposes.
Abstract: This article illustrates modeling of flexible neural networks for handwritten signatures preprocessing. An input signature is interpolated to adjust inclination angle, than descriptor vector is composed. This information is preprocessed in proposed flexible neural network architecture, in which some neurons are becoming crucial for recognition and adapt to classification purposes. Experimental research results are compared in benchmark tests with classic approach to discuss efficiency of proposed solution.

Journal ArticleDOI
TL;DR: SocialRouting - the social-based routing algorithm designed for DTN, which uses the social properties of wireless mobile nodes is the novel way of message routing that is based on message ferrying between separated parts of the network.
Abstract: Delay and Disruptive Tolerant Networks (DTN) are relatively a new networking concept that could provide a robust communication in wide range of implementations from the space to battlefield or other military usage. However in such dynamic networks, which could be considered as a set of intermittently connected nodes, message forwarding strategy is a key issue. Existing routing solutions concentrate mainly on two major routing families flooding and knowledge based algorithms. This paper presents SocialRouting - the social-based routing algorithm designed for DTN. The use of the social properties of wireless mobile nodes is the novel way of message routing that is based on message ferrying between separated parts of the network. Proposed idea has been extensively tested using simulation tools. The simulations were made based on especially designed for measurements in DTN scenarios and compared with popular solutions.

Journal ArticleDOI
TL;DR: This paper compares accuracy of indoor positioning systems using one of three selected ISM bands: 433, 868 or 2400 MHz, and investigates how much accuracy (and usefulness) can be expected from standard RF modules working at typical ISM frequencies.
Abstract: This paper compares accuracy of indoor positioning systems using one of three selected ISM bands: 433, 868 or 2400 MHz. Positioning is based on Received Signal Strength Indication (RSSI), received by majority of ISM RF modules, including low-cost ones. Investigated environment is single, indoor space (e.g. office, hall) and personal use, thus 2-dimensional (2D) coordinate system is used. Obtained results, i.a. average positioning error, are compared with similar measurements taken at outdoor, open space environment. The system is local, i.e. its operational area is limited by range of used RF modules – typical a few tens of meters. The main focus is research of how much accuracy (and usefulness) can be expected from standard RF modules working at typical ISM frequencies.

Journal ArticleDOI
TL;DR: In this paper, the impact of spherical shaping of the constellations bound instead of the traditional, hyper-cubical bound was analyzed and balanced constellation schemes were obtained with the N -dimensional simplex merging algorithm.
Abstract: Packing constellations points in higher dimensions, the concept of multidimensional modulation exploits the idea drawn from geometry for searching dense sphere packings in a given dimension, utilising it to minimise the average energy of the underlying constellations. The following work analyses the impactof spherical shaping of the constellations bound instead of the traditional, hyper-cubical bound. Balanced constellation schemes are obtained with the N -dimensional simplex merging algorithm. The performance of constellations of dimensions 2, 4 and 6 is compared to the performance of QAM modulations of equivalent throughputs in the sense of bits transmitted per complex (two- dimensional) symbols. The considered constellations give an approximately 0.7 dB to 1 dB gain in terms of BER over a standard QAM modulation.

Journal ArticleDOI
TL;DR: In this article, the authors presented an idea and practical solution of the phased antenna array dedicated to UHF read/write devices for the synthesis of a determined IZ in anti-collision RFID system.
Abstract: The interrogation zone IZ is the most important parameter when RFID systems are considered. Its predictability is determined by the construction and parameters of antenna built in a read/write device. The IZ should be of sufficient size and appropriate to requirements established for an application of object automated identification. The method of shaping an antenna radiation pattern provides effective yet unconventional opportunities in this area. The idea and practical solution of the phased antenna array dedicated to UHF read/write devices are presented in the paper. On the basis of tests carried out, the authors pointed out the possibility of using developed devices for the synthesis of a determined IZ in anti-collision RFID system.

Journal ArticleDOI
TL;DR: This paper summarizes the experience and the learning outcomes of students of the "Informatics" specialty at the Episkop Konstantin Preslavsky University of Shumen (Bulgaria) on the problems of computer and network security as a component of their professional training.
Abstract: This paper summarizes the experience and the learning outcomes of students of the "Informatics" specialty at the Episkop Konstantin Preslavsky University of Shumen (Bulgaria) on the problems of computer and network security as a component of their professional training. It is a continuous process starting from the "Computer steganography" course and turning into diploma papers, masters programs, specializations and PhDs in computer and network steganography. The outcome of this training would be bachelors and masters theses, practical activities of experimentation of stego software and steganology in a parallel computing environment, joint scientific publications of lecturers and students.

Journal ArticleDOI
TL;DR: Particle Swarm Optimization (PSO) algorithm is introduced to the field of VLSI to find minimum leakage vector and it is found that PSO based approach is best in finding MLV compared to Genetic based implementation as PSO technique uses less runtime compared to GA.
Abstract: Leakage power is the dominant source of power dissipation in nanometer technology. As per the International Technology Roadmap for Semiconductors (ITRS) static power dominates dynamic power with the advancement in technology. One of the well-known techniques used for leakage reduction is Input Vector Control (IVC). Due to stacking effect in IVC, it gives less leakage for the Minimum Leakage Vector (MLV) applied at inputs of test circuit. This paper introduces Particle Swarm Optimization (PSO) algorithm to the field of VLSI to find minimum leakage vector. Another optimization algorithm called Genetic algorithm (GA) is also implemented to search MLV and compared with PSO in terms of number of iterations. The proposed approach is validated by simulating few test circuits. Both GA and PSO algorithms are implemented in Verilog HDL and the simulations are carried out using Xilinx 9.2i. From the simulation results it is found that PSO based approach is best in finding MLV compared to Genetic based implementation as PSO technique uses less runtime compared to GA. To the best of the author’s knowledge PSO algorithm is used in IVC technique to optimize power for the first time and it is quite successful in searching MLV.

Journal ArticleDOI
TL;DR: In this article, the authors present a new method for detecting a source point of time based network steganography -moveSteg, which allows finding the source of steganographic stream in network that is managed by us.
Abstract: This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is managed by us.

Journal ArticleDOI
TL;DR: By addition of the edge detection methods, the pseudocoloring improvement over material based approach is proposed, which fills and sharpen colour layers over the image, making it easier to interpret.
Abstract: An X-ray scanning and image processing have a vast range of applications in the security. An image of a content of some package being passed for example to an airplane or to the court house may help to figure out if there are any dangerous objects inside that package and to avoid possible threatening situation. As the raw X-ray images are not always easy to analyze and interpret, some image processing methods like an object detection, a frequency resolution increase or a pseudocolouring are being used. In this paper, we propose a pseudocoloring improvement over material based approach. By addition of the edge detection methods we fill and sharpen colour layers over the image, making it easier to interpret. We demonstrate the effectiveness of the methods using real data, acquired from a professional dual energy X-ray scanner.

Journal ArticleDOI
TL;DR: In Rician-fading scenario, cognitive radio networks with a source in a secondary system transmitting its confidential information to a legitimate destination in the presence of an eavesdropper are considered and analytical expression for probability of non-zero secrecy capacity is derived.
Abstract: In Rician-fading scenario, cognitive radio networks (CRNs) with a source (S) in a secondary system transmitting its confidential information to a legitimate destination (D) in the presence of an eavesdropper, are considered in this paper. Under CRNs, the interference power reaching at primary user (PU) is limited by some pre-defined threshold. Secrecy outage not only occurs when the achievable secrecy capacity for S-D link is smaller than a target rate, but also occurs in the case that the interference power at PU is greater than that threshold. Analytical expression of secrecy outage probability has been derived and verified with simulation results. In addition, we have also derived the analytical expression for probability of non-zero secrecy capacity.

Journal ArticleDOI
TL;DR: The design and test results of apicosecond-precision time interval measurement module, integrated as a System-on-Chip in an FPGA device, and comparison to traditional ways of building a measurement instrument are depicted.
Abstract: We presents the design and test results of a picosecond-precision time interval measurement module, integrated as a System-on-Chip in an FPGA device. Implementing a complete measurement instrument of a high precision in one chip with the processing unit gives an opportunity to cut down the size of the final product and to lower its cost. Such approach challenges the constructor with several design issues, like reduction of voltage noise, propagating through power lines common for the instrument and processing unit, or establishing buses efficient enough to transport mass measurement data. The general concept of the system, design hierarchy, detailed hardware and software solutions are presented in this article. Also, system test results are depicted with comparison to traditional ways of building a measurement instrument.

Journal ArticleDOI
TL;DR: A new conception of building probabilistic models of communication delays in wireless networks that basis on using a delta function sequence to describe retransmissions between a transmitter and a receiver is presented.
Abstract: The paper presents a new conception of building probabilistic models of communication delays in wireless networks that basis on using a delta function sequence to describe retransmissions between a transmitter and a receiver. It is assumed that the access time of the transmitter is described by a probability density function and the communication channel established in the wireless medium is disturbed by passive or active factors which cause that the transmission can be not correct and the sent data have to be retransmitted. Theoretical considerations have been verified by measurement results obtained by using the experimental system developed for investigating delays caused by external disturbances influencing the wireless transmission. A method of identification of the proposed model parameters and verification of the identified values has been presented.

Journal ArticleDOI
TL;DR: The work is based upon the discrete wavelet transform (DWT) version of wavelet package transform (WPT) and was built based on the wavelet packet from the WaveLab 850 library of the Stanford University (USA).
Abstract: This article deals with the noise detection of discrete biosignals using orthogonal wavelet packet. More specifically, it compares the usefullness of Daubechies wavelets with different vanishing moments for the denoising and compression of the digitalized surface electromyography (sEMG). The work is based upon the discrete wavelet transform (DWT) version of wavelet package transform (WPT). A noise reducing algorithm is proposed to detect unavoidable noise in the acquired data. With the help of a seminorm the noise of a sequence is defined. Using this norm it is possible to rearrange the wavelet basis, which can illuminate the differences between the coherent and incoherent parts of the sequence, where incoherent refers to the part of the signal that has either no information or contradictory information. In effect, the procedure looks for the subspace characterised either by small components or by opposing components in the wavelet domain. This method was developed for the monitoring during rehabilitation. The proposed method is general for signal processing and was built based on the wavelet packet from the WaveLab 850 library of the Stanford University (USA).

Journal ArticleDOI
TL;DR: Using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server can be used to steal data or confidential enterprise information secretly.
Abstract: This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.

Journal ArticleDOI
TL;DR: The article presents the concept of Mobile MPLS-TP with the use of OAM channels to support the mobility of users and optimize "Handoff" procedure in a hierarchical network topology.
Abstract: MPLS architecture for transport networks play the significant role in the development of next generation networks, in particular with regard to the guarantee of continuity of communications "end-to-end" through a variety of heterogeneous segments of the telecommunications network. The article presents the concept of Mobile MPLS-TP with the use of OAM channels to support the mobility of users and optimize "Handoff" procedure in a hierarchical network topology.