Filtry
wszystkich: 10278
-
Katalog
- Publikacje 6638 wyników po odfiltrowaniu
- Czasopisma 305 wyników po odfiltrowaniu
- Konferencje 99 wyników po odfiltrowaniu
- Osoby 144 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 190 wyników po odfiltrowaniu
- Wydarzenia 22 wyników po odfiltrowaniu
- Dane Badawcze 2867 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: RECEIVING ANTENNAS , MIMO COMMUNICATION , TRANSMITTING ANTENNAS , ENCODING , DATA COMMUNICATION , BIT ERROR RATE , FADING CHANNELS
-
Communication Culture & Critique
Czasopisma -
Nano Communication Networks
Czasopisma -
Womens Studies in Communication
Czasopisma -
Review of Communication Research
Czasopisma -
HUMAN COMMUNICATION RESEARCH
Czasopisma -
Journal of Communication in Healthcare
Czasopisma -
Journal of International Communication
Czasopisma -
Communication et Organisation
Czasopisma -
Russian Journal of Communication
Czasopisma -
Technical Communication Quarterly
Czasopisma -
WESTERN JOURNAL OF COMMUNICATION
Czasopisma -
Journalism & communication monographs
Czasopisma -
Mass Communication Research
Czasopisma -
Visual Communication Quarterly
Czasopisma -
Mobile Media & Communication
Czasopisma -
American Communication Journal
Czasopisma -
Marmara Journal of Communication
Czasopisma -
Communication Booknotes Quarterly
Czasopisma -
Southern Communication Journal
Czasopisma -
Tourism, Culture and Communication
Czasopisma -
Communication in Biomathematical Sciences
Czasopisma -
Church, Communication and Culture
Czasopisma -
Political Economy of Communication
Czasopisma -
Mass Communication and Society
Czasopisma -
Studies in Media and Communication
Czasopisma -
JOURNAL OF HEALTH COMMUNICATION
Czasopisma -
Management Communication Quarterly
Czasopisma -
Language and Intercultural Communication
Czasopisma -
JOURNAL OF COMMUNICATION DISORDERS
Czasopisma -
IET Quantum Communication
Czasopisma -
Political Campaigning and Communication
Czasopisma -
Security and Communication Networks
Czasopisma -
Human verbal memory encoding is hierarchically distributed in a continuous processing stream
PublikacjaProcessing of memory is supported by coordinated activity in a network of sensory, association, and motor brain regions. It remains a major challenge to determine where memory is encoded for later retrieval. Here we used direct intracranial brain recordings from epilepsy patients performing free recall tasks to determine the temporal pattern and anatomical distribution of verbal memory encoding across the entire human cortex. High...
-
Using wavelet techniques for multibeam sonar bathymetry data compression
PublikacjaMultibeam sonars are widely used in applications like high resolution bathymetry measurements or underwater object imaging. One of the significant problems in multibeam sensing of the marine environment is large amount of data which must be transmitted from the sonar processing unit to an operator station using a limited bit rate channel. For instance, such a situation would be in the case when the multibeam sonar was mounted on...
-
Overview of Fading Channel Modeling
Publikacja -
Supervised-learning-based development of multi-bit RCS-reduced coding metasurfaces
PublikacjaCoding metasurfaces have been introduced as efficient tools allowing meticulous control over the electromagnetic (EM) scattering. One of their relevant application areas is radar cross section (RCS) reduction, which principally relies on the diffusion of impinging EM waves. Despite its significance, careful control of the scattering properties poses a serious challenge at the level of practical realization. This article is concerned...
-
The pressure distribution for biharmonic transmitting array: theoterical study.
PublikacjaRozważano zagadnienie oddziaływań fal o skończonej amplitudzie dla biharmonicznej anteny nadawczej. Przedstawiono model matematyczny i wyniki badań teoretycznych. Model matematyczny zbudowano w oparciu o równanie KZK dla źródeł bez osiowej symetrii. Do rozwiązania zagadnienia zastosowano metodę różnic skończonych. Badano zmiany ciśnienia fal różnych częstotliwości w obrębie wiązki akustycznej.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm
PublikacjaWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm.
PublikacjaWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
Akaike's final prediction error criterion revisited
PublikacjaWhen local identification of a nonstationary ARX system is carried out, two important decisions must be taken. First, one should decide upon the number of estimated parameters, i.e., on the model order. Second, one should choose the appropriate estimation bandwidth, related to the (effective) number of input-output data samples that will be used for identification/ tracking purposes. Failure to make the right decisions results...
-
Hotspot of human verbal memory encoding in the left anterior prefrontal cortex
PublikacjaBackground: Treating memory and cognitive deficits requires knowledge about anatomical sites and neural activities to be targeted with particular therapies. Emerging technologies for local brain stimulation offer attractive therapeutic options but need to be applied to target specific neural activities, at distinct times, and in specific brain regions that are critical for memory formation. Methods: The areas that are critical...
-
Krzysztof Nyka dr hab. inż.
OsobyKrzysztof Nyka, absolwent Wydziału Elektroniki Telekomunikacji i Informatyki Politechniki Gdańskiej (WETI PG), gdzie uzyskał tytuł magistra inżyniera (1986, telekomunikacja) stopień doktora nauk technicznych (2002, elektronika) i doktora habilitowanego (2020 automatyka, elektronika i elektrotechnika). Obecnie jest zatrudniony na stanowisku profesora uczelni w Katedrze Inżynierii Mikrofalowej i Antenowej WETI PG. Zainteresowania...
-
Optoelectronic Devices, Sensors, Communication and Multimedia, Photonics Applications and Web Engineering, Wilga, May 2012
Publikacja -
Wpływ komunikacji marketingowej na kształtowanie miast = The Impact of Marketing Communication on Shaping the Urban Environment
PublikacjaW artykule przestawiono wpływ komunikacji marketingowej na kształtowanie obiektów architektonicznych oraz podano przykłady realizacji o wysokich walorach estetycznych i artystycznych, które powstały w wyniku działań marketingowych.
-
Polish Academic Libraries in the Face of the Covid-19 Pandemic: Crisis Management and Communication within the Organisation
PublikacjaThe developing SARS-CoV-2 coronavirus pandemic, which was announced in March 2020, has had a significant impact on the activities of universities and their academic libraries. The article aims to present the activities of academic libraries at the time of introducing restrictions on their activities and closing for several months to users and reformulating the services they provide, on the example of the Library of the Gdańsk University...
-
A universal method for the identification of genes encoding amatoxins and phallotoxins in poisonous mushrooms
PublikacjaABSTRACT Background. As the currently known diagnostic DNA targets amplified in the PCR assays for detection of poisonous mushrooms have their counterparts in edible species, there is a need to design PCR primers specific to the genes encoding amanitins and phallotoxins, which occur only in poisonous mushrooms. Objective. The aim of the study was testing of PCR-based method for detection of all genes encoding hepatotoxic cyclic...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublikacjaIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Path Loss Analysis in Off-Body Channels in Indoor Environment
PublikacjaThis temporary document describes an analysis of path loss in off-body channels in an indoor environment. The influence of body orientation and on-body antenna placement on path loss in off-body communications as well as of different bodies has been investigated. Five static scenarios, six distances between body and antenna and eight body orientations were analysed; moreover, two dynamic scenarios were investigated. The smallest...
-
ECHOES REDUCTION DURING DIGITAL DATA TRANSMISSION IN HYDROACOUSTIC CHANNEL – LABORATORY EXPERIMENT
PublikacjaThe possibility of using a hydroacoustic channel for digital data transmission is very limited. This is due to the effect of multipath propagation of the emitted acoustic wave and the damping of the mechanical wave in this medium, which increase with frequency. The first of these phenomena results in inter-symbol interference disturbances in data transmission systems, including even hundreds of symbols. Due to the number of reflections...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.