Search results for: communication channel - Bridge of Knowledge

Search

Search results for: communication channel

Filters

total: 91
filtered: 75

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: communication channel

  • Experimental test of nonclassicality with arbitrarily low detection efficiency

    Publication

    - PHYSICAL REVIEW A - Year 2020

    We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking an extra assumption of independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the classical communication capacity of the channel through which the systems are communicated. The essence for our...

    Full text available to download

  • User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning

    Publication

    - SENSORS - Year 2024

    In this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...

    Full text available to download

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks

    In this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...

    Full text available to download

  • Fashion Games, Fashion in Games and Gamification in Fashion. A First Map

    Publication

    - Year 2023

    Fashion companies have been using different forms of entertainment such as film and television, sport, music, museums, and photography as inspiration sources and as communication and marketing channels for decades. However, in recent years, they have also started to consider the gaming world. While gaming offers a potential revenue stream from sales of physical and digital clothing, change in it is also the gateway to access new...

    Full text to download in external service

  • Application of Maximum-Length Sequences to impulse response measurement of hydroacoustic communications systems

    Publication

    There is a growing interest in digital transmission of telemetry data on ultrasonic waves. The dependence of signal attenuation on squared frequency, specific to the hy-droacoustic systems, induces problems that do not exist in monochromatic, narrowband radio communications systems. For adapting the transmission parameters to current propagation conditions, a precise knowledge of instantaneous changes of channel performances is...

    Full text available to download

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Full text available to download

  • Square Root Raised Cosine Fractionally Delaying Nyquist Filter - Design and Performance Evaluation

    In this paper we propose a discrete-time FIR (Finite Impulse Response) filter which is applied as a square root Nyquist filter and fractional delay filter simultaneously. The filter enables to substitute for a cascade of square root Nyquist filter and fractional delay filter in one device/algorithm. The aim is to compensate for transmission delay in digital communication system. Performance of the filter as a matched filter is...

    Full text available to download

  • IoT for healthcare applications

    Publication
    • K. Sayrafian
    • S. J. Ambroziak
    • D. Bajic
    • L. Berbakov
    • L. M. Correia
    • K. Cwalina
    • C. Garcia-pardo
    • G. Gardašević
    • K. Katzis
    • P. Kulakowski
    • K. Turbic

    - Year 2021

    This chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...

    Full text available to download

  • Integrating heterogeneous systems with high-dependability requirements by means of web services

    Publication

    - Year 2012

    Web services are commonly used on boundaries of heterogeneous components in Service Oriented Architecture (SOA) as they provide a universal communication channel not bound to any particular programming language or run-time platform. This paper describes how web services can be used to integrate heterogeneous systems which serve purposes requiring high dependability, reliability and availability. Examples of such systems include...

  • Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions

    The underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...

    Full text available to download

  • High Isolation Metamaterial-based Dual-band MIMO Antenna for 5G Millimeter-wave Applications

    This article presents a high-isolation metamaterial-based dual-band multiple-input multiple-output (MIMO) antenna for 5G millimeter-wave communication networks. The proposed antenna is a pentagon-shaped monopole that provides a dual-band response with a wide operating bandwidth at 5G 28/28 bands. The antenna is printed on 0.508-mm-thick Rogers RT5880 substrate of relative permittivity ɛr =2.2. It exhibits a small physical size...

    Full text to download in external service

  • LOS and NLOS identification in real indoor environment using deep learning approach

    Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a deep learning (DL) model to classify LOS/NLOS...

    Full text available to download

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Dissociative photo-double-ionization of isoxazole

    Publication

    - Year 2021

    In the present communication, we present results on the photo-double-ionization and fragmentation of the isoxazole molecules. The experiments were carried out at the CiPo beamline at the Elettra-Sincrotrone radiation facility exploiting the VUV excitation and the ion time-of-flight spectrometry combined with the PEPICO technique. The dissociative processes where only one electron is emitted are quite well known [1]. However, double...

    Full text to download in external service

  • Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces

    Publication

    - Year 2023

    Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular massive multiple-input multiple-output (MIMO), and its future evolution Large Intelligent Surfaces (LIS), which provide more reliable channel quality than previous technologies. As such, there arises the need to perform efficient scheduling of industrial control traffic...

    Full text to download in external service

  • A survey on network resiliency methodologies against weather-based disruptions

    Publication
    • M. Tornatore
    • J. Andre
    • P. Babarczi
    • T. Braun
    • E. Folstad
    • P. Heegaard
    • A. Hmaity
    • M. Furdek
    • L. Jorge
    • W. Kmiecik... and 9 others

    - Year 2016

    Due to the increasing dependence on network services of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large-scale failures, as in case of disaster events. The recently-formed EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. In particular, the Working Group (WG) 2 of the...

    Full text to download in external service

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks

    Publication

    - Year 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Full text to download in external service

  • A diplexer design method using an augmented channel filter approach

    Publication

    Continuous development in RFID andmicrocontrollers technologies gives new possibilities to createsystems that are able to integrate a lot of sensors based ondifferent technologies. This integration brings us closer to realizethe Ubiquitous Network Society vision. However, many problemsmust be addressed before we will benefit from such systems. Inthis paper we describe concept of integrating RFID technologywith other sensors technologies...

    Full text to download in external service

  • Badanie i analiza efektywności alokacji strumieni danych w heterogenicznej sieci WBAN

    Publication

    - Year 2017

    W niniejszej dysertacji doktorskiej poddano dyskusji efektywność alokacji strumieni danych w heterogenicznej radiowej sieci WBAN (Wireless Body Area Networks). Biorąc pod uwagę dynamiczny rozwój nowoczesnych sieci radiokomunikacyjnych piątej generacji (5G), którego część stanowią radiowe sieci działające w obrębie ciała człowieka, bardzo ważnym aspektem są metody maksymalizujące wykorzystanie dostępnych zasobów czasowo –częstotliwościowych...

    Full text available to download

  • Transfer learning in imagined speech EEG-based BCIs

    Publication

    - Biomedical Signal Processing and Control - Year 2019

    The Brain–Computer Interfaces (BCI) based on electroencephalograms (EEG) are systems which aim is to provide a communication channel to any person with a computer, initially it was proposed to aid people with disabilities, but actually wider applications have been proposed. These devices allow to send messages or to control devices using the brain signals. There are different neuro-paradigms which evoke brain signals of interest...

    Full text available to download

  • Progress towards a unified approach to entanglement distribution

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Entanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...

    Full text available to download

  • Adaptive Identification of Underwater Acoustic Channel with a Mix of Static and Time-Varying Parameters

    Publication

    - Year 2022

    We consider the problem of identification of communication channels with a mix of static and time-varying parameters. Such scenarios are typical, among others, in underwater acoustics. In this paper, we further develop adaptive algorithms built on the local basis function (LBF) principle resulting in excellent performance when identifying time-varying systems. The main drawback of an LBF algorithm is its high complexity. The subsequently...

    Full text available to download

  • Comparison of Doppler Effect Estimation Methods for MFSK Transmission in Multipath Hydroacoustic Channel

    Publication

    - IEEE Access - Year 2024

    Underwater wireless communication remains a challenging topic, particularly for applications such as wreck penetration where multipath and Doppler effects are very intense. These effects are becoming even more difficult to mitigate for fast data transmission systems that utilize wideband signals. Due to the low propagation speed of acoustic wave in the water, there is a significant difference between the Doppler shift for lower...

    Full text available to download

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...