Filtry
wszystkich: 1408
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK
-
Estimating the uncertainty of discharge coefficient predicted for oblique side weir using Monte Carlo method
PublikacjaSide weir is a hydraulic structure, which is used in irrigation systems to divert some water from main to side channel. It is installed at the entrance of the side channel to control and measure passing water into the side channel. Many studies provided side weir water surface profile and coefficient of discharge to measure water discharge diverted into the side channel. These studies dealt with different side weir shapes (rectangular,...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Radio Channel Measurements in Off-Body Communications in a Ferry Passenger Cabin
PublikacjaThis paper presents an off-body radio channel measurements in a ferry passenger cabin at 2.45 GHz band, for static sleeping scenarios with different body orientation and on-body antennas placements, and also for upper and lower sleeping berths. The measurements have been performed with two types of on-body wearable receiving antennas: FlexPIFA (flexible planar inverted F antenna), and FlexNotch (flexible adhesive-backed notch antenna)...
-
Power equalization of AES FPGA implementation
PublikacjaThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Shallow-Water Acoustic Communications in Strong Multipath Propagation Conditions
PublikacjaA phenomenon that has a strong impact on signal transmission conditions in Underwater Acoustic Communication (UAC) systems is multipath propagation. As a result of multipath propagation, the transmitted signal undergoes time dispersion which results in inter-symbol interference observed on the receiving side. Time dispersion is large, especially in horizontal channels in shallow waters which significantly limits the transmission...
-
Effect of asymmetric fluid flow distribution on flow boiling in a microchannel heat sink – An experimental investigation
PublikacjaFlow boiling in microchannels is emerging as an exclusive cooling solution for miniaturized high-power electronic devices alongside having other high heat flux applications. Size miniaturization at microscale strangely increases heat transfer performance as well as flow boiling instabilities. Many flow boiling instabilities are interrelated and result from imperfect hydrodynamic conditions. One of such problems is flow maldistribution among...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Prediction of coking dynamics for wet coal charge
PublikacjaA one-dimensional transient mathematical model describing thermal and flow phenomena during coal coking in an oven chamber was studied in the paper. It also accounts for heat conduction in the ceramic oven wall when assuming a constant temperature at the heating channel side. The model was solved numerically using partly implicit methods for gas flow and heat transfer problems. The histories of temperature, gas evolution and internal...
-
Adversarial attack algorithm for traffic sign recognition
PublikacjaDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Heat exchange enhancement of jet impingement cooling with the novel humped-cone heat sink
PublikacjaJet impingement cooling technology is applicable to control temperature of devices, where very high heat flux is generated within a small area. This paper is about the improvement of the jet impingement cooling efficiency by the heat sink geometry modification. Two reference cases were sourced from the literature – flat heat sink and modified one with cone in the jet stagnation region. Such a change improves cooling capability...
-
Arsalan Muhammad Soomar Doctoral Student
OsobyHi, I'm Arsalan Muhammad Soomar, an Electrical Engineer. I received my Master's and Bachelor's Degree in the field of Electrical Engineering from Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan. Currently enrolled as a Doctoral student at the Gdansk University of Technology, Gdansk, Poland. Also worked in Yellowlite. INC, Ohio as a Solar Design Engineer. HEADLINE Currently Enrolled as a Doctoral...
-
Client-side versus server-side geographic data processing performance comparison: Data and code
PublikacjaThe data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...
-
[ITiT] Transmission Channel in Radio Communication Systems
Kursy Online{mlang pl} Dyscyplina: informatyka techniczna i telekomunikacja Zajęcia fakultatywne dla doktorantów II roku Prowadzący: dr hab. inż. Sławomir Ambroziak, prof. PG Liczba godzin: 15 Forma zajęć: wykład {mlang} {mlang en} Discipline: technical informatics and telecommunications Elective course for 2nd-year PhD students Academic teachers: dr hab. inż. Sławomir Ambroziak, prof. PG Total hours of training: 15 teaching hours Course...
-
The Boltzmann sequence-structure channel
PublikacjaWe rigorously study a channel that maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein statistics. This channel, which we also call the Boltzmann sequence-structure channel, is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. In our previous work, we verified experimentally that the channel capacity has a phase transition for...
-
Stability of trusses with linear elastic side-supports
PublikacjaThe present research is devoted to study of a lateral buckling of truss with linear elastic side supports. The elastic support reaction in relation to force in compressed chord and coefficient of buckling length related to side support distance are also calculated. The effect of slope of side support on limit force is also considered. The nonlinear analysis of two roof trusses are carried out. The results are compared to design...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublikacjaThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
PublikacjaThe underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Phase Transition in a Sequence-Structure Channel
PublikacjaWe study an interesting channel which maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein folding from statistical physics. The channel is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. We estimate the conditional entropy between the input sequence and the output fold, giving an upper bound which exhibits an unusual phase transition...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
[ITiT] Transmission Channel in Radio Communication Systems - 2023/2024
Kursy Online{mlang pl} Dyscyplina: informatyka techniczna i telekomunikacja Zajęcia fakultatywne dla doktorantów II roku Prowadzący: dr hab. inż. Sławomir Ambroziak, prof. PG Liczba godzin: 15 Forma zajęć: wykład {mlang} {mlang en} Discipline: technical informatics and telecommunications Elective course for 2nd-year PhD students Academic teachers: dr hab. inż. Sławomir Ambroziak, prof. PG Total hours of training: 15 teaching hours Course...
-
A simplified channel estimation procedure for NB-IoT downlink
PublikacjaThis paper presents a low-complexity channel estimation procedure which is suitable for use in energy-efficient NB-IoT user equipment devices. The procedure is based on the well-established least squares scheme, followed by linear interpolation in the time domain and averaging in the frequency domain. The quality of channel estimation vs. signal-to-noise ratio is evaluated for two channel models and compared with the performance...
-
A simple test for quantum channel capacity
PublikacjaBased on state and channel isomorphism we point out that semidefiniteprogramming can be used as a quick test for nonzero one-way quantum channelcapacity. This can be achieved by searching for symmetric extensions of statesisomorphic to a given quantum channel. With this method we provide examplesof quantum channels that can lead to high entanglement transmission but stillhave zero one-way capacity, in particular, regions of symmetric...
-
A Simplistic Downlink Channel Estimation Method for NB-IoT
PublikacjaThis paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...
-
On the Characteristic Graph of a Discrete Symmetric Channel
PublikacjaWe present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.
-
Monitoring of single-side lap grinding with electroplated tools
PublikacjaThe results presented in the paper show that utilising microphones as audible sound sensors is a suitable approach for monitoring a single-side lap grinding process due to the low levels of noise generated by the drives of a machine tool. The results confirm that sound signal analysis is a feasible and relatively simple method to monitor a lap grinding process with the use of an audible sound sensor. Proposed method can be used...
-
Local buckling of composite channel columns
PublikacjaThe investigation concerns local buckling of compressed flanges of axially compressed composite channel columns. Cooperation of the member flange and web is taken into account here. The buckling mode of the member flange is defined by rotation angle a flange about the line of its connection with the web. The channel column under investigation is made of unidirectional fibre-reinforced laminate. Two approaches to member orthotropic...
-
The Imaging of Gdansk Bay Seabed by Using Side Sonar
PublikacjaThis paper is mainly aimed at presentation of an impact of environmental conditions on imaging accuracy by using hydro-acoustic systems in waters of a high non-uniformity of spatial distribution of hydrological parameters. Impact of refraction on erroneous estimation of range, in case of wave radiation into water under a large angle, like in side sonars or multi-beam echo-sounders, is especially important. In this paper seasonal...
-
Access to Side-On Bonded Tungsten Phosphanylphosphinidene Complexes
PublikacjaMetathesis reactions between diimido complexes of tungsten(VI)[(ArN)2WCl2] (Ar = 2,6-iPr2C6H3) and lithium derivatives of diphosphanes R2P-P(SiMe3)Li (R = tBu and iPr) yield two anionic diimido complexes of tungsten with side-on bonded phosphanylphosphinidene ligands, [(ArN)2WCl(η2-R2P-P)]-. Both complexes are structurally characterized. A possible reaction mechanism and the role of donor solvents are discussed on the basis of...
-
Estimation of Coherence Bandwidth for Underwater Acoustic Communication Channel
PublikacjaA shallow underwater acoustic communication channel is characterized by strong multipath propagation. The signal reaching the receiver consists of a direct waveform and a number of its delayed and suppressed replica. A significant time dispersion of the transmitted signal and selective fading of its spectrum are observed. Coherence bandwidth defines maximal bandwidth, wherein the channel amplitude characteristic remains constant...
-
Sensitivity analysis of critical forces of trusses with side bracing
PublikacjaThe present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...
-
Seafloor relief reconstruction from side scan sonar data
PublikacjaSide scan sonar is one of the most widely used imaging systems in the underwater environment. It is relatively cheap and easy to deploy, in comparison with more powerful sensors. Although side scan sonar does not provide seafloor bathymetry directly, its records are directly related to seafloor images. In the paper, the method for 3D seafloor relief reconstruction from side scan sonar data is presented. The method is based on the...
-
Limitations of WSSUS modeling of stationary underwater acoustic communication channel
PublikacjaPerformances of underwater acoustic communication (UAC) systems are strongly related to specific propagation conditions of the underwater channel. Due to their large variability, there is a need for adaptive matching of the UAC systems signaling to the transmission properties of the channel. This requires a knowledge of instantaneous channel characteristics, in terms of the specific parameters of stochastic models. The wide-sense...
-
Stability of truss with side - supports. The case of linear and rotational elastic supports
PublikacjaThe research is devoted to study lateral buckling of truss with linear and rotational elastic side-supports. Geometrically nonlinear analysis of example truss with linear and rotational elastic sidesupports is carried out. The limit normal force in compressed chord of the truss due to stiffness of side supports is calculated. The elastic support reaction in relation to force in compressed chordand coefficient of buckling length...
-
Characteristics of the polarised off-body channel in indoor environments
PublikacjaThis paper addresses the depolarisation effect in off-body body area networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...
-
Wideband Off-Body Channel Characteristics with Dynamic User
PublikacjaThis paper presents the preliminary results of a dynamic off-body channel characterisation study, based on wideband measurements at 5.8 GHz in an indoor environment. The Channel Impulse Response (CIR) was measured for a scenario with the user approaching and departing from the off-body antenna. A CIR deconvolution procedure was performed jointly in two polarisations, and the received signal power, Cross-Polarisation Discrimination...
-
Sławomir Jerzy Ambroziak dr hab. inż.
OsobySławomir J. Ambroziak urodził się w 1982 r. Uzyskał tytuł zawodowy magistra inżyniera w zakresie systemów i usług radiokomunikacyjnych w roku 2008, w 2013 r. uzyskał stopień doktora nauk technicznych w dyscyplinie telekomunikacja, w specjalności radiokomunikacja, natomiast w 2020 r. uzyskał stopień doktora habilitowanego. Od 2008 r. jest pracownikiem Katedry Systemów i Sieci Radiokomunikacyjnych na Wydziale Elektroniki, Telekomunikacji...
-
Steady magnetohydrodynamic flow in a diverging channel with suction or blowing
PublikacjaAn analysis is made of steady two-dimensional divergent flow of an electrically conducting incompressible viscous fluid in a channel formed by two non-parallel walls, the flow being caused by a source of fluid volume at the intersection of the walls. The fluid is permeated by a magnetic field produced by an electric current along the line of intersection of the channel walls. The walls are porous and subjected to either suction...
-
Considerations of Adaptive Digital Communications in Underwater Acoustic Channel
PublikacjaDown-link communication (DLC) and air transportable communication (ATAC) buoys as well as autonomous underwater vehicles (AUV) use acoustic links for gathering oceanographic data from underwater monitoring systems. The underwater channel propagation conditions are diverse in nature and require a special adaptive approach to the communication system design. The article presents a methodology for the communication systems design,...
-
Don't forget the dark side of green transformation
PublikacjaDesign/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...
-
Visualization of a lifeboat motion during lowering along ship’s side
PublikacjaThis paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...
-
Assessment of the Accuracy of a Virtual Multi-Channel Temperature Measuring Instrument
PublikacjaThe multi-channel temperature measurement system developed works with NTC thermistors. The article presents the results of theoretical and empirical evaluation of accuracy obtained in measurement channels. The basis for the theoretical assessment is the mathematical model for each of the measurement channels and the characteristics of the system elements included in the circuits of the measurement channel. Two different methods were...
-
A game-theoretic study of CSMA/CA under a backoff attack
PublikacjaAnalizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublikacjaAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack
PublikacjaPrzedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.
-
Performance of an ad-hoc 802.11 LAN under a backoff attack
PublikacjaSamowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...
-
Including the Dark Side of Entrepreneurship in the Entrepreneurship Education
PublikacjaPursuing an entrepreneurial career is often rewarding in terms of both economic and psychological outcomes. However, becoming an entrepreneur also has its darker side that affects professional and personal life. Meanwhile, the positivity bias is prevalent in entrepreneurial education and research. It is recognized as emphasizing the advantages of becoming an entrepreneur and giving considerably less attention to potential downsides....