Wyniki wyszukiwania dla: CHANNEL ACCESS
-
Performance analysis of standard and modified EY-NPMA channel access algo-rithms
PublikacjaPodczas minionego 10-ciolecia notuje się szybki rozwój lokalnych sieci bezprzewodowych (WLANy). Proponowane rozwiązania dotyczą zarówno sieci opartych o przesył komórek (zgodnych z ATM), jak i sieci pakietowych (zgodnych z E-thernetem). Po rozważeniu drugiego z wymienionych typów sieci, wydaje się dzisiaj, iż pakietowe WLANy będą oparte głównie na dwóch standardach, mianowicie: IEEE 802.11 [6]) - wykorzystującym protokół dostępu...
-
A Simplistic Downlink Channel Estimation Method for NB-IoT
PublikacjaThis paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Number of individual clients who have signed an agreement enabling the use of internet banking (2017)
Dane BadawczeThe data show that at the end of 2017, 32.5 million people in Poland had the opportunity to use internet banking, i.e. signed an agreement enabling the use of internet banking. It is worth noting, however, that the so-called passive users - people who have access, but do not have to log into their account via an internet connection.
-
Transmission Quality in MC-CDMA Radio Interface with Turbo Codes
PublikacjaMulti-Carrier Code Division Multiple Access techiques is a combination of two radio access techniques: Code Division Multiple Access (CDMA) and Orthogonal Frequency-called Division Multiplexing (OFDM) and has the advantages of both techniques. The paper presents the design of transmitter and receiver for MC-CDMA radio interface and the simulation results of the transmission quality in AWGN channel.
-
Shaping the New Vistula Spit Channel: Political, Economic, and Environmental Aspects
PublikacjaIn September 2022, the new shipping channel in Poland was opened for service. It connects the Port of Elbląg and the Gdańsk Bay in Poland, cutting through the Vistula Spit and the Vistula Lagoon. It was intended to enable direct access to the Baltic Sea from the Port of Elbląg without crossing Russian territory. Originally conceptualized decades ago, it has taken its final shape only recently. Its construction was associated with...
-
Decoherence-free communication over multiaccess quantum channels
PublikacjaIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
A Wideband Channel Model for Body Area Networks in Circular Metallic Indoor Environments
PublikacjaIn this paper, the wideband characterization of the propagation channel in circular metallic indoor environments is addressed, regarding Body Area Networks and 5G small cells, an analytical model for the dependence of the mean delay and the average delay spread on the circle radius, the working frequency and the distance between the transmitter and the receiver being proposed. The derivation of the model is initially done analytically,...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Number of mobile banking users who log into the bank at least once a month from a mobile device (telephone or smartphone) - 2017
Dane BadawczeElectronic banking should be understood broadly. Therefore, taking into account also other channels, the number of users using mobile electronic devices (smartphone, tablet) should be mentioned. Also in this case, there was an increase in the number of people using this channel of access to their bank account. At the end of 2017, nearly 9 million people...
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Performance analysis of data transmission in MC-CDMA radio interface with turbo codes
PublikacjaMulti-carrier code division multiple access (MC-CDMA) technique is a combination of two radio access techniques: CDMA and orthogonal frequency division multiplexing and has the advantages of both techniques. The paper presents the design of transmitter and receiver for MC-CDMA radio interface. It also presents encoders and decoders of turbo codes which were used in simulation of the MC-CDMA technique. Two turbo codes with 8-state...
-
Number of active users of the mobile banking application (only a mobile phone) - 2017
Dane BadawczeCustomers using mobile devices can use their bank account via the bank's website or a separate application. Such a solution allows for easier logging in (usually no customer number is required, but only a password) and a number of additional functions (from a more extensive interface to a larger number of possible operations - making a transfer, opening...
-
IoT for healthcare applications
PublikacjaThis chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...
-
Likwidacja suchego doku przy Nabrzeżu Przemysłowym w Porcie Gdańsk
PublikacjaW niniejszej pracy przedstawiono problemy techniczne związane z likwidacją dużego obiektu hydrotechnicznego, stanowiącego utrudnienie nawigacyjne w intensywnie eksploatowanym portowym kanale dostępowym w Porcie Gdańsk. Dwukomorowy dok zlokalizowany przy Nabrzeżu Przemysłowym wybudowano w latach 1970-1972. Komory dokowe służyły do budowy żelbetowych, pływających skrzyń falochronowych, na potrzeby budowanego w tym czasie Portu Północnego....
-
An interactive system for remote modeling and design validation of hybrid photovoltaic systems
PublikacjaAbstract: A multi-functional demonstrator of the interactive system is presented. The demostrator enables modeling, monitoring and design validation of hybrid photovoltaic systems assisted by fuel cells and thermoelectric generators, as well as experimentation and scientific research. A block diagram of the system is presented and the selection of its components is discussed. Availability of the system via Ethernet or GSM...
-
Study of the Performance of DSSS UAC System Depending on the System Bandwidth and the Spreading Sequence
PublikacjaA signal transmitted in an Underwater Acoustic Communication (UAC) system operating in a shallow-water channel suffers from strong time dispersion due to multipath propagation. This causes the Inter-Symbol Interference (ISI) observed in the received signal, which significantly limits the communication system’s reliability and transmission rate. In such propagation conditions, the Direct-Sequence Spread Spectrum (DSSS) method is...
-
AN INTELLIGENT SYSTEM TO SUPPORT THE DESIGN PROCESS OF HYBRID PHOTOVOLTAIC INSTALLATIONS
PublikacjaThe paper presents the final version of intelligent system to support the design process of hybrid photovoltaic systems supported by fuel cells and / or thermoelectric generators developed and constructed at the Institute of Electron Technology, as well as to conduct experiments and research. A block diagram of the system and the selection of its components is described and discussed. The paper considers the availability of the...
-
Vehicular Communication Environments
PublikacjaCommunication to and between road vehicles (cars, truck, buses, trains, etc.) are of growing interest. This is partly due to the attractive services that cooperative intelligent transport systems (C-ITSs) provides, mainly in the areas of traffic safety and traffic efficiency. An enabler for C-ITS is wireless vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, collectively referred to as vehicle-to-X (V2X)...
-
Energy efficient indoor localisation for narrowband internet of things
PublikacjaThere are an increasing number of Narrow Band IoT devices being manufactured as the technology behind them develops quickly. The high co-channel interference and signal attenuation was seen in edge Narrow Band IoT devices make it challenging to guarantee the service quality of these devices. To maximize the data rate fairness of Narrow Band IoT devices, a multi-dimensional indoor localization model is devised, consisting of...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Bandwidth Dependence of the Propagation Channel in Circular Metallic BAN Environments
PublikacjaIn this paper, the bandwidth dependence of the propagation channel for Body Area Networks (BANs) in circular metallic environments is addressed and models are proposed to evaluate the appropriate short-term fading margins that should be considered as a function of the system bandwidth. The deployment of BANs in metallic indoor environments, such as ships, factories, warehouses and other similar environments, involves additional...
-
Fashion Games, Fashion in Games and Gamification in Fashion. A First Map
PublikacjaFashion companies have been using different forms of entertainment such as film and television, sport, music, museums, and photography as inspiration sources and as communication and marketing channels for decades. However, in recent years, they have also started to consider the gaming world. While gaming offers a potential revenue stream from sales of physical and digital clothing, change in it is also the gateway to access new...
-
Comparison of Doppler Effect Estimation Methods for MFSK Transmission in Multipath Hydroacoustic Channel
PublikacjaUnderwater wireless communication remains a challenging topic, particularly for applications such as wreck penetration where multipath and Doppler effects are very intense. These effects are becoming even more difficult to mitigate for fast data transmission systems that utilize wideband signals. Due to the low propagation speed of acoustic wave in the water, there is a significant difference between the Doppler shift for lower...
-
Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks
PublikacjaObject detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...
-
Concurrent Video Denoising and Deblurring for Dynamic Scenes
PublikacjaDynamic scene video deblurring is a challenging task due to the spatially variant blur inflicted by independently moving objects and camera shakes. Recent deep learning works bypass the ill-posedness of explicitly deriving the blur kernel by learning pixel-to-pixel mappings, which is commonly enhanced by larger region awareness. This is a difficult yet simplified scenario because noise is neglected when it is omnipresent in a wide...
-
Marek Czachor prof. dr hab.
Osoby