scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Electronics and Telecommunications in 2020"


Journal ArticleDOI
TL;DR: The paper presents a positioning system being a part of the platform developed within the IONIS European project, whose main function is providing the platform with data on user mobility and localization, which would be used to analyze his/her behavior and detect dementia wandering symptoms.
Abstract: Localization systems are an important component of Ambient and Assisted Living platforms supporting persons with cognitive impairments. The paper presents a positioning system being a part of the platform developed within the IONIS European project. The system’s main function is providing the platform with data on user mobility and localization, which would be used to analyze his/her behavior and detect dementia wandering symptoms. An additional function of the system is localization of items, which are frequently misplaced by dementia sufferers. The paper includes a brief description of system’s architecture, design of anchor nodes and tags and exchange of data between devices. both localization algorithms for user and item positioning are also presented. Exemplary results illustrating the system’s capabilities are also included.

10 citations


Journal Article
TL;DR: This work proposes a machine learning-based on Convolutional Neural Network (CNN) for the transmission line faults (TLFs) application, which is more suitable for pattern recognition compared to conventional ANN and ANN with Discrete Wavelet Transform (DWT) feature extraction.
Abstract: To improve power system reliability, a protection mechanism is highly needed. Early detection can be used to prevent failures in the power transmission line (TL). A classification system method is widely used to protect against false detection as well as assist the decision analysis. Each TL signal has a continuous pattern in which it can be detected and classified by the conventional methods, i.e., wavelet feature extraction and artificial neural network (ANN). However, the accuracy resulting from these mentioned models is relatively low. To overcome this issue, we propose a machine learning-based on Convolutional Neural Network (CNN) for the transmission line faults (TLFs) application. CNN is more suitable for pattern recognition compared to conventional ANN and ANN with Discrete Wavelet Transform (DWT) feature extraction. In this work, we first simulate our proposed model by using Simulink® and Matlab®. This simulation generates a fault signal dataset, which is divided into 45.738 data training and 4.752 data tests. Later, we design the number of machine learning classifiers. Each model classifier is trained by exposing it to the same dataset. The CNN design, with raw input, is determined as an optimal output model from the training process with 100% accuracy.

10 citations


Journal Article
TL;DR: The present paper contains a literature review of available descriptions of theoretical basis of the memristor structures, used materials, structure configurations and discussion about future prospects and limitations.
Abstract: The paper contains a short literature review on the subject of special type of thin film structures with resistive-switching memory effect. In the literature, such structures are commonly labeled as "memristors". The word "memristor" originates from two words: "memory" and "resistor". For the first time, the memristor was theoretically described in 1971 by Leon Chua as the 4th fundamental passive electronics element with a non-linear current-voltage behavior. The reported area of potential usage of memristor is enormous. It is predicted that the memristor could find application, for example in the domain of nonvolatile random access memory, flash memory, neuromorphic systems and so forth. However, in spite of the fact that plenty of papers have been published in the subject literature to date, the memristor still behaves as a "mysterious" electronic element. It seems that, one of the important reasons that such structures are not yet in practical use, is unsufficient knowledge of physical phenomena determining occurrence of the switching effect. The present paper contains a literature review of available descriptions of theoretical basis of the memristor structures, used materials, structure configurations and discussion about future prospects and limitations.

9 citations


Journal ArticleDOI
TL;DR: An innovative low cost fertigation system for assisting the cultures by using data-processing electronic boards and wireless sensors network (WSN) connected to a remote software platform.
Abstract: Nowadays, the technological innovations affect all human activities; also the agriculture field heavily benefits of technologies as informatics, electronic, telecommunication, allowing huge improvements of productivity and resources exploitation. This manuscript presents an innovative low cost fertigation system for assisting the cultures by using data-processing electronic boards and wireless sensors network (WSN) connected to a remote software platform. The proposed system receives information related to air and soil parameters, by a custom solar-powered WSN. A control unit elaborates the acquired data by using dynamic agronomic models implemented on a cloud platform, for optimizing the amount and typology of fertilizers as well as the irrigations frequency, as function also of weather forecasts got by on-line weather service.

6 citations


Journal Article
TL;DR: Simulation results demonstrate that the Proportional Fair provides a comparable performance to the delay–aware Maximum-Largest Weighted Delay First for simultaneously providing satisfactory transmission reliability of the Guaranteed Bit rate and Non-Guaranteed Bit Rate healthcare contents whilst maximizing the downlink 5G performance.
Abstract: This paper models the downlink Fifth Generation (5G) network that supports a flexible frame structure and a shorter Round Trip Time (RTT) for Hybrid Automatic Repeat Request (HARQ). Moreover, the design of the renowned Time Division Multiple Access (TDMA) packet scheduling algorithms is revised to allow these algorithms to support packet scheduling in the downlink 5G. Simulation results demonstrate that the Proportional Fair provides a comparable performance to the delay–aware Maximum-Largest Weighted Delay First for simultaneously providing satisfactory transmission reliability of the Guaranteed Bit Rate (GBR) and Non-Guaranteed Bit Rate (Non-GBR) healthcare contents whilst maximizing the downlink 5G performance.

6 citations


Journal ArticleDOI
TL;DR: Four traffic models with modifications are proposed that can be applied to model typical traffic types that are used in industrial systems, such as Time-Triggered traffic, Audio-Video Bridging traffic or Best Effort traffic.
Abstract: This article discusses the traffic types typically used in industrial networks. The authors propose a number of methods of generating traffic that can be used in modeling traffic sources in the networks under consideration. The proposed traffic models have been developed on the basis of the ON/OFF model. The proposed solutions can be applied to model typical traffic types that are used in industrial systems, such as Time-Triggered (TT) traffic, Audio-Video Bridging (AVB) traffic or Best Effort traffic. The article discusses four traffic models with modifications and shows how the proposed models can be used in modeling different traffic types used in industrial networks.

6 citations


Journal Article
TL;DR: The proposed method uses simplified human body models that can change their dielectric properties to improve the location of the capsule endoscope based on the detection of phase difference of signals in the receiver located on patients body.
Abstract: Wireless endoscopic capsules can visualize the inside of the digestive tract for the purpose of gastrointestinal diseases diagnose. In order to implement the appropriate treatment method, the transmitted picture should be followed by the information on the location of the endoscope. The article presents the method of localization of endoscopic capsules with wireless transmitter based on the detection of phase difference of signals in the receiver located on patients body. The proposed method uses simplified human body models that can change their dielectric properties to improve the location of the capsule endoscope.

6 citations


Journal ArticleDOI
TL;DR: A photovoltaic (PV) energy harvesting system is proposed to prolong the battery lifetime of the sensor node used to monitor the body temperature and heart rate of a human through a mobile application.
Abstract: In this paper, an autonomous wearable sensor node is developed for long-term continuous healthcare monitoring. This node is used to monitor the body temperature and heart rate of a human through a mobile application. Thus, it includes a temperature sensor, a heart pulse sensor, a low-power microcontroller, and a Bluetooth low energy (BLE) module. The power supply of the node is a lithium-ion rechargeable battery, but this battery has a limited lifetime. Therefore, a photovoltaic (PV) energy harvesting system is proposed to prolong the battery lifetime of the sensor node. The PV energy harvesting system consists of a flexible photovoltaic panel, and a charging controller. This PV energy harvesting system is practically tested outdoor under lighting intensity of 1000 W/m 2 . Experimentally, the overall power consumption of the node is 4.97 mW and its lifetime about 246 hours in active-sleep mode. Finally, the experimental results demonstrate long-term and sustainable operation for the wearable sensor node.

6 citations


Journal Article
TL;DR: In this article, a case study was used to find out the experiences of students of The Maria Grzegorzewska University, related to crisis remote education (remote teaching and distance learning in conditions of forced social isolation caused by SARS-CoV-2 pandemic).
Abstract: The aim of the study was to find out the experiences of students of The Maria Grzegorzewska University, related to crisis remote education (remote teaching and distance learning in conditions of forced social isolation caused by SARS-CoV-2 pandemic). A case study was used. The research was limited to one institution and the method of a diagnostic survey based on the questionnaire technique was used. Recommendations for further development were made, based on disclosed advantages, disadvantages, problems, and opportunities connected with crisis remote education conclusions reported by students.

6 citations


Journal Article
TL;DR: The impact of direction and width of the neighboring beams of 5G new radio gNodeB base station equipped with the multi-beam antenna system on the interference level between these beams is presented.
Abstract: Massive multiple-input-multiple-output (MIMO) and beamforming are key technologies, which significantly influence on increasing effectiveness of emerging fifth-generation (5G) wireless communication systems, especially mobile-cellular networks. In this case, the increasing effectiveness is understood mainly as the growth of network capacity resulting from better diversification of radio resources due to their spatial multiplexing in macro- and micro-cells. However, using the narrow beams in lieu of the hitherto used cell-sector brings occurring interference between the neighboring beams in the massive-MIMO antenna system, especially, when they utilize the same frequency channel. An analysis of this effect is the aim of this paper. In this case, it is based on simulation studies, where a multi-elliptical propagation model and standard 3GPP model are used. We present the impact of direction and width of the neighboring beams of 5G new radio gNodeB base station equipped with the multi-beam antenna system on the interference level between these beams. The simulations are carried out for line-of-sight (LOS) and non-LOS conditions of a typical urban environment.

6 citations


Journal Article
TL;DR: Using the appropriate propagation model, it is possible, with appropriate assumptions, to check how the operation of the third transmitter affects the distribution and size of the deepest fades in relation to the network in which there are two transmitters.
Abstract: Single Frequency Networks (SFN) of transmitters are currently used in television and digital broadcasting to effectively cover large areas using minimal spectral resources and using transmitters with much lower power than if the same area were covered using one transmitter. It is therefore a very ecological solution. In this way, much better reception conditions are obtained in large city areas, as the signal reaches the receiving antenna from different directions, reducing the risk of shading. However, in this type of network one should take into account the loss of signal caused by signal interference. Using the appropriate propagation model, it is possible, with appropriate assumptions, to check how the operation of the third transmitter affects the distribution and size of the deepest fades in relation to the network in which there are two transmitters.

Journal ArticleDOI
TL;DR: The article presents the results of measurements of NB-IoT transmission parameters in this network, inside the building and in open urban areas.
Abstract: An important element of Internet of Things systems (IoT) is wireless data transmission. Narrowband Internet of Things (NB-IoT) and LTE Cat M1 (LTE-M) are the new standards for such transmission intended for LTE cellular networks. Cellular network operators has recently launched such transmission. The article presents the results of measurements of NB-IoT transmission parameters in this network, inside the building and in open urban areas. The main features of the NB-IoT system and measuring equipment are briefly discussed.

Journal Article
TL;DR: In this paper, the authors find out the experiences of academics working at The Maria Grzegorzewska University, related to crisis remote education (remote teaching and distance learning in conditions of forced social isolation caused by SARS-CoV-2 pandemic).
Abstract: The aim of the study was to find out the experiences of academics working at The Maria Grzegorzewska University, related to crisis remote education (remote teaching and distance learning in conditions of forced social isolation caused by SARS-CoV-2 pandemic). A case study was used. The research was limited to one institution and the method of a diagnostic survey based on the questionnaire technique was used. Recommendations for further development were made, based on disclosed advantages, disadvantages, problems, and opportunities connected with crisis remote education conclusions reported by academic teachers.

Journal Article
TL;DR: It is shown that signal sampling operation can be considered as a kind of all-pass filtering in the time domain, when the Nyquist frequency is larger or equal to the maximal frequency in the spectrum of a signal sampled, and this seemingly obvious observation has wide-ranging implications.
Abstract: In this paper, we show that signal sampling operation can be considered as a kind of all-pass filtering in the time domain, when the Nyquist frequency is larger or equal to the maximal frequency in the spectrum of a signal sampled. We demonstrate that this seemingly obvious observation has wide-ranging implications. They are discussed here in detail. Furthermore, we discuss also signal shaping effects that occur in the case of signal under-sampling. That is, when the Nyquist frequency is smaller than the maximal frequency in the spectrum of a signal sampled. Further, we explain the mechanism of a specific signal distortion that arises under these circumstances. We call it the signal shaping, not the signal aliasing, because of many reasons discussed throughout this paper. Mainly however because of the fact that the operation behind it, called also the signal shaping here, is not a filtering in a usual sense. And, it is shown that this kind of shaping depends upon the sampling phase. Furthermore, formulated in other words, this operation can be viewed as a one which shapes the signal and performs the low-pass filtering of it at the same time. Also, an interesting relation connecting the Fourier transform of a signal filtered with the use of an ideal low-pass filter having the cut frequency lying in the region of under-sampling with the Fourier transforms of its two under-sampled versions is derived. This relation is presented in the time domain, too.

Journal Article
TL;DR: It has been shown that any measuring process can be modeled as a process of sampling of signals, and a notion of a special kind of functions, called here functions with attributes, has been introduced.
Abstract: In this paper, it has been shown that any measuring process can be modeled as a process of sampling of signals. Also, a notion of a special kind of functions, called here functions with attributes, has been introduced. The starting point here, in the first of the above themes, is an observation that in fact we are not able to measure and record truly continuously in time any physical quantity. The measuring process can be viewed as going stepwise that is in steps from one instant to another, similarly as a sampling of signals proceeds. Therefore, it can be modeled as the latter one. We discuss this in more detail here. And, the notion of functions with attributes, we introduced here, follows in a natural way from the interpretation of both the measuring process as well as the sampling of signals that we present in this paper. It turns out to be useful.

Journal ArticleDOI
TL;DR: The authors presented the results of the quality evaluation for H.264/MPEG-4, H.265/HEVC and VP9 codecs and presented a connection between the dynamics of network bandwidth changing and MPEG-DASH mechanism operation and their influence on the quality experienced by users.
Abstract: The paper discusses the problem of video transmission in an IP network. The authors consider the ability of using the most popular video codecs that use both the MPEG2 Transport Stream and Dynamic Adaptive Streaming over Hypertext Transfer Protocol (DASH). The main emphasis was given to ensuring the quality of service and quality assessment methods, taking into account not only the service- or network provider’s point of view but also the end user’s perspective. Two quality assessment approaches were presented, i.e. objective and subjective methods. The authors presented the results of the quality evaluation for H.264/MPEG-4, H.265/HEVC and VP9 codecs. The objective measurements, proved by statistical analysis of user opinion scores, confirmed the ability of using H.265 and VP9 codecs in both real time and streaming transmissions, while the quality of video streaming over HTTP with the H.264 codec proved inadequate. The authors also presented a connection between the dynamics of network bandwidth changing and MPEG-DASH mechanism operation and their influence on the quality experienced by users.

Journal Article
TL;DR: In this article, the authors present a few topological aspects of transferring a signal of a continuous time into its discrete counterpart and recovering an analog signal from its discrete-time equivalent.
Abstract: In this paper, we present a few thoughts regarding topological aspects of transferring a signal of a continuous time into its discrete counterpart and recovering an analog signal from its discrete-time equivalent. In our view, the observations presented here highlight the essence of the above transform-ations. Moreover, they enable deeper understanding of the reconstruction formula and of the sampling theorem. We also interpret here these two borderline cases that are associated with a time quantization step going to zero, on the one hand, and approaching its greatest value provided by the sampling theorem, on the other.

Journal ArticleDOI
TL;DR: The preliminary laboratory tests of the technological demonstrator of a mobile device for generating the jamming signal aimed at assessing the correctness of the device operation and verification of generated signal parameters.
Abstract: In the article the concept, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a name AEGIS) were presented, both in the hardware and software areas. The device is designed to block the radio communication which allow detonating the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating the jamming signal, that were presented in the paper, aimed at assessing the correctness of the device operation and verification of generated signal parameters. On the basis of the obtained results, the ability to jam the cellular systems as well as other radio devices operating in the frequency band from 400 MHz to 2700 MHz was assessed.

Journal Article
TL;DR: A new averaged model of a diode-transistor switch containing an IGBT is proposed, and its accuracy is verified by comparing the computed characteristics of the boost converter with the characteristics computed in SPICE.
Abstract: DC-DC converters are popular switch-mode electronic circuits used in power supply systems of many electronic devices. Designing such converters requires reliable computation methods and models of components contained in these converters, allowing for accurate and fast computations of their characteristics. In the paper, a new averaged model of a diode-transistor switch containing an IGBTis proposed. The form of the developed model is presented. Its accuracy is verified by comparing the computed characteristics of the boost converter with the characteristics computed in SPICE using a transient analysis and literature models of a diode and an IGBT. The obtained results of computations proved the usefulness of the proposed model.

Journal ArticleDOI
TL;DR: This work proposes an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
Abstract: We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world. In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject's privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.

Journal ArticleDOI
TL;DR: In this article, an electrochemical sensing approach was developed for norepinephrine detection based on semiconducting polymer (9-nonyl-2,7-di(selenophen-2-yl)-9H-carbazole) and laccase modified platinum electrode (Pt).
Abstract: An useful electrochemical sensing approach was developed for norepinephrine (NE) detection based on semiconducting polymer (9-nonyl-2,7-di(selenophen-2-yl)-9H-carbazole) and laccase modified platinum electrode (Pt). The miniature Pt biosensor was designed and constructed via the immobilization of laccase in an electroactive layer of the electrode coated with thin polymeric film. This sensing arrangement utilized the catalytic oxidation of NE to norepinephrine quinone. The detection process was based on the oxidation of catecholamine in the presence of enzyme – laccase. With the optimized conditions, the analytical performance demonstrated selectivity in a wide linear range (0.1–200x10 -6 M) with a detection limit of 240 nM and a quantification limit of 365 nM. Moreover, the method was successfully applied for selective NE determination in the presence of interfering substances.

Journal ArticleDOI
TL;DR: It is demonstrated in this paper that signal averaging and signal smearing mean principally the same, under the conditions given, and that modeling of errors related to signal averaging through the so-called quantization noise is rather a bad choice.
Abstract: In this paper, we continue a topic of modeling measuring processes by perceiving them as a kind of signal sampling. And, in this respect, note that an ideal model was developed in a previous work. Whereas here, we present its nonideal version. This extended model takes into account an effect, which is called averaging of a measured signal. And, we show here that it is similar to smearing of signal samples arising in nonideal signal sampling. Furthermore, we demonstrate in this paper that signal averaging and signal smearing mean principally the same, under the conditions given. So, they can be modeled in the same way. A thorough analysis of errors related to the signal averaging in a measuring process is given and illustrated with equivalent schemes of the relationships derived. Furthermore, the results obtained are compared with the corresponding ones that were achieved analyzing amplitude quantization effects of sampled signals used in digital techniques. Also, we show here that modeling of errors related to signal averaging through the so-called quantization noise, assumed to be a uniform distributed random signal, is rather a bad choice. In this paper, an upper bound for the above error is derived. Moreover, conditions for occurrence of hidden aliasing effects in a measured signal are given.

Journal ArticleDOI
TL;DR: Simulation results for the considered methods: k-Nearest Neighbors and Random Forest show that these method significantly improves the detection probability of the 4G signal presence.
Abstract: In this paper, the future Fifth Generation (5G New Radio) radio communication system has been considered, coexisting and sharing the spectrum with the incumbent Fourth Generation (4G) Long-Term Evolution (LTE) system. The 4G signal presence is detected in order to allow for opportunistic and dynamic spectrum access of 5G users. This detection is based on known sensing methods, such as energy detection, however, it uses machine learning in the domains of space, time and frequency for sensing quality improvement. Simulation results for the considered methods: k-Nearest Neighbors and Random Forest show that these method significantly improves the detection probability.

Journal Article
TL;DR: The developed model for assessing the level of development of the innovative educational environment of a specific higher education establishment during a certain period has been applied and a graphical analysis of the calculation results has been carried out.
Abstract: The concept of innovative educational environment of higher education establishment is considered and its main components are highlighted. The model of the integrated assessment of implementing innovations in higher education establishment is constructed. The developed model for assessing the level of development of the innovative educational environment of a specific higher education establishment during a certain period has been applied and a graphical analysis of the calculation results has been carried out.

Journal Article
TL;DR: A methodology for calibrating the analyzed model based on an example empirical research scenario, and descriptions of the propagation model, test-bed and scenario used in measurements, and obtained signal attenuation results, which are used for the initial calibration of the model.
Abstract: Radio environment maps (REMs) are beginning to be an integral part of modern mobile radiocommunication systems and networks, especially for ad-hoc, cognitive, and dynamic spectrum access networks. The REMs will use emerging military systems of tactical communications. The REM is a kind of database used at the stage of planning and management of the radio resources and networks, which considers the geographical features of an area, environmental propagation properties, as well as the parameters of radio network elements and available services. At the REM, for spatial management of network nodes, various methods of propagation modeling for determining the attenuation and capacity of wireless links and radio ranges are used. One method of propagation prediction is based on a numerical solution of the wave equation in a parabolic form, which allows considering, i.a., atmospheric refraction, terrain shape, and soil electrical parameters. However, the determination of a current altitudinal profile of atmospheric refraction may be a problem. If the propagation-prediction model uses a fixed refraction profile, then the calibration of this model based on empirical measurements is required. We propose a methodology for calibrating the analyzed model based on an example empirical research scenario. The paper presents descriptions of the propagation model, test-bed and scenario used in measurements, and obtained signal attenuation results, which are used for the initial calibration of the model.

Journal Article
TL;DR: It is shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2 –120, which makes differential cryptanalysis not applicable to the Qamal cypher.
Abstract: Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2 –120 , which makes differential cryptanalysis not applicable to the Qamal cypher

Journal Article
TL;DR: Adaptive routing algorithms are proposed for shortest path routing as well as alternate path routing which make routing decision based on the maximum idle frequency slots available on different paths and efficiently avoids utilizing a congested path.
Abstract: Elastic optical networking is a potential candidate to support dynamic traffic with heterogeneous data rates and variable bandwidth requirements with the support of the optical orthogonal frequency division multiplexing technology (OOFDM). During the dynamic network operation, lightpath arrives and departs frequently and the network status updates accordingly. Fixed routing and alternate routing algorithms do not tune according to the current network status which are computed offline. Therefore, offline algorithms greedily use resources with an objective to compute shortest possible paths and results in high blocking probability during dynamic network operation. In this paper, adaptive routing algorithms are proposed for shortest path routing as well as alternate path routing which make routing decision based on the maximum idle frequency slots (FS) available on different paths. The proposed algorithms select an underutilized path between different choices with maximum idle FS and efficiently avoids utilizing a congested path. The proposed routing algorithms are compared with offline routing algorithms as well as an existing adaptive routing algorithm in different network scenarios. It has been shown that the proposed algorithms efficiently improve network performance in terms of FS utilization and blocking probability during dynamic network operation.

Journal ArticleDOI
TL;DR: The comparison with the legacy IEEE 802.11n/ac standards shows that even partial implementation of a new standard should bring significant throughput improvements.
Abstract: The paper is focused on the forthcoming IEEE 802.11ax standard and its influence on Wi-Fi networks performance. The most important features dedicated to improve transmission effectiveness are presented. Furthermore, the simulation results of a new transmission modes are described. The comparison with the legacy IEEE 802.11n/ac standards shows that even partial implementation of a new standard should bring significant throughput improvements.

Journal Article
TL;DR: The paper presents the analysis of the magnetic sensor’s applicability to the energy harvesting operations and conclusions and future prospects regarding the practical implementation of theEnergy harvesting system are provided.
Abstract: The paper presents the analysis of the magnetic sensor’s applicability to the energy harvesting operations. The general scheme and technical advancement of the energy extraction from the electric vehicle (such as a tram or a train) is presented. The proposed methodology of applying the magnetic sensor to the energy harvesting is provided. The experimental scheme for the sensor characteristics and measurement results is discussed. Conclusions and future prospects regarding the practical implementation of the energy harvesting system are provided.

Journal Article
TL;DR: A complex, distributed information system aimed at promoting cybersecurity awareness at the national level that enables collecting and processing in near-real time available information on the security status of essential services and digital services and provides for assessment of negative impact of the identified threats concerned with the provision of those services.
Abstract: The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for on-line security risk analysis and for generation and distribution of early warnings.