Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK

Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK

  • Estimating the uncertainty of discharge coefficient predicted for oblique side weir using Monte Carlo method

    Publikacja

    Side weir is a hydraulic structure, which is used in irrigation systems to divert some water from main to side channel. It is installed at the entrance of the side channel to control and measure passing water into the side channel. Many studies provided side weir water surface profile and coefficient of discharge to measure water discharge diverted into the side channel. These studies dealt with different side weir shapes (rectangular,...

    Pełny tekst do pobrania w portalu

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publikacja

    - Rok 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Pełny tekst do pobrania w portalu

  • Radio Channel Measurements in Off-Body Communications in a Ferry Passenger Cabin

    Publikacja

    - Rok 2017

    This paper presents an off-body radio channel measurements in a ferry passenger cabin at 2.45 GHz band, for static sleeping scenarios with different body orientation and on-body antennas placements, and also for upper and lower sleeping berths. The measurements have been performed with two types of on-body wearable receiving antennas: FlexPIFA (flexible planar inverted F antenna), and FlexNotch (flexible adhesive-backed notch antenna)...

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Pełny tekst do pobrania w portalu

  • Diver Observations by Means of Acoustic Methods

    Publikacja

    Searching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...

    Pełny tekst do pobrania w portalu

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Pełny tekst do pobrania w portalu

  • Shallow-Water Acoustic Communications in Strong Multipath Propagation Conditions

    Publikacja

    A phenomenon that has a strong impact on signal transmission conditions in Underwater Acoustic Communication (UAC) systems is multipath propagation. As a result of multipath propagation, the transmitted signal undergoes time dispersion which results in inter-symbol interference observed on the receiving side. Time dispersion is large, especially in horizontal channels in shallow waters which significantly limits the transmission...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Effect of asymmetric fluid flow distribution on flow boiling in a microchannel heat sink – An experimental investigation

    Publikacja

    - APPLIED THERMAL ENGINEERING - Rok 2022

    Flow boiling in microchannels is emerging as an exclusive cooling solution for miniaturized high-power electronic devices alongside having other high heat flux applications. Size miniaturization at microscale strangely increases heat transfer performance as well as flow boiling instabilities. Many flow boiling instabilities are interrelated and result from imperfect hydrodynamic conditions. One of such problems is flow maldistribution among...

    Pełny tekst do pobrania w portalu

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Pełny tekst do pobrania w portalu

  • Prediction of coking dynamics for wet coal charge

    Publikacja

    - Chemical and Process Engineering : New Frontiers - Rok 2015

    A one-dimensional transient mathematical model describing thermal and flow phenomena during coal coking in an oven chamber was studied in the paper. It also accounts for heat conduction in the ceramic oven wall when assuming a constant temperature at the heating channel side. The model was solved numerically using partly implicit methods for gas flow and heat transfer problems. The histories of temperature, gas evolution and internal...

    Pełny tekst do pobrania w portalu

  • Adversarial attack algorithm for traffic sign recognition

    Publikacja

    - MULTIMEDIA TOOLS AND APPLICATIONS - Rok 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Heat exchange enhancement of jet impingement cooling with the novel humped-cone heat sink

    Publikacja

    - Case Studies in Thermal Engineering - Rok 2021

    Jet impingement cooling technology is applicable to control temperature of devices, where very high heat flux is generated within a small area. This paper is about the improvement of the jet impingement cooling efficiency by the heat sink geometry modification. Two reference cases were sourced from the literature – flat heat sink and modified one with cone in the jet stagnation region. Such a change improves cooling capability...

    Pełny tekst do pobrania w portalu

  • Arsalan Muhammad Soomar Doctoral Student

    Osoby

    Hi, I'm Arsalan Muhammad Soomar, an Electrical Engineer. I received my Master's and Bachelor's Degree in the field of Electrical Engineering from Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan.  Currently enrolled as a Doctoral student at the Gdansk University of Technology, Gdansk, Poland. Also worked in Yellowlite. INC, Ohio  as a Solar Design Engineer.   HEADLINE Currently Enrolled as a Doctoral...

  • Client-side versus server-side geographic data processing performance comparison: Data and code

    Publikacja

    - Data in Brief - Rok 2019

    The data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...

    Pełny tekst do pobrania w portalu

  • [ITiT] Transmission Channel in Radio Communication Systems

    Kursy Online
    • S. J. Ambroziak

    {mlang pl} Dyscyplina: informatyka techniczna i telekomunikacja Zajęcia fakultatywne dla doktorantów II roku Prowadzący:  dr hab. inż. Sławomir Ambroziak, prof. PG Liczba godzin: 15 Forma zajęć: wykład {mlang} {mlang en} Discipline: technical informatics and telecommunications Elective course for 2nd-year PhD students Academic teachers: dr hab. inż. Sławomir Ambroziak, prof. PG Total hours of training: 15 teaching hours Course...

  • The Boltzmann sequence-structure channel

    Publikacja

    - Rok 2016

    We rigorously study a channel that maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein statistics. This channel, which we also call the Boltzmann sequence-structure channel, is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. In our previous work, we verified experimentally that the channel capacity has a phase transition for...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Stability of trusses with linear elastic side-supports

    Publikacja

    The present research is devoted to study of a lateral buckling of truss with linear elastic side supports. The elastic support reaction in relation to force in compressed chord and coefficient of buckling length related to side support distance are also calculated. The effect of slope of side support on limit force is also considered. The nonlinear analysis of two roof trusses are carried out. The results are compared to design...

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions

    The underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...

    Pełny tekst do pobrania w portalu

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu

  • Phase Transition in a Sequence-Structure Channel

    Publikacja

    - Rok 2015

    We study an interesting channel which maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein folding from statistical physics. The channel is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. We estimate the conditional entropy between the input sequence and the output fold, giving an upper bound which exhibits an unusual phase transition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publikacja

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Rok 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • [ITiT] Transmission Channel in Radio Communication Systems - 2023/2024

    Kursy Online
    • S. J. Ambroziak

    {mlang pl} Dyscyplina: informatyka techniczna i telekomunikacja Zajęcia fakultatywne dla doktorantów II roku Prowadzący:  dr hab. inż. Sławomir Ambroziak, prof. PG Liczba godzin: 15 Forma zajęć: wykład {mlang} {mlang en} Discipline: technical informatics and telecommunications Elective course for 2nd-year PhD students Academic teachers: dr hab. inż. Sławomir Ambroziak, prof. PG Total hours of training: 15 teaching hours Course...

  • A simplified channel estimation procedure for NB-IoT downlink

    Publikacja

    - Rok 2024

    This paper presents a low-complexity channel estimation procedure which is suitable for use in energy-efficient NB-IoT user equipment devices. The procedure is based on the well-established least squares scheme, followed by linear interpolation in the time domain and averaging in the frequency domain. The quality of channel estimation vs. signal-to-noise ratio is evaluated for two channel models and compared with the performance...

    Pełny tekst do pobrania w portalu

  • A simple test for quantum channel capacity

    Publikacja

    Based on state and channel isomorphism we point out that semidefiniteprogramming can be used as a quick test for nonzero one-way quantum channelcapacity. This can be achieved by searching for symmetric extensions of statesisomorphic to a given quantum channel. With this method we provide examplesof quantum channels that can lead to high entanglement transmission but stillhave zero one-way capacity, in particular, regions of symmetric...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Simplistic Downlink Channel Estimation Method for NB-IoT

    Publikacja

    This paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...

    Pełny tekst do pobrania w portalu

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Monitoring of single-side lap grinding with electroplated tools

    Publikacja

    The results presented in the paper show that utilising microphones as audible sound sensors is a suitable approach for monitoring a single-side lap grinding process due to the low levels of noise generated by the drives of a machine tool. The results confirm that sound signal analysis is a feasible and relatively simple method to monitor a lap grinding process with the use of an audible sound sensor. Proposed method can be used...

  • Local buckling of composite channel columns

    The investigation concerns local buckling of compressed flanges of axially compressed composite channel columns. Cooperation of the member flange and web is taken into account here. The buckling mode of the member flange is defined by rotation angle a flange about the line of its connection with the web. The channel column under investigation is made of unidirectional fibre-reinforced laminate. Two approaches to member orthotropic...

    Pełny tekst do pobrania w portalu

  • The Imaging of Gdansk Bay Seabed by Using Side Sonar

    This paper is mainly aimed at presentation of an impact of environmental conditions on imaging accuracy by using hydro-acoustic systems in waters of a high non-uniformity of spatial distribution of hydrological parameters. Impact of refraction on erroneous estimation of range, in case of wave radiation into water under a large angle, like in side sonars or multi-beam echo-sounders, is especially important. In this paper seasonal...

    Pełny tekst do pobrania w portalu

  • Access to Side-On Bonded Tungsten Phosphanylphosphinidene Complexes

    Metathesis reactions between diimido complexes of tungsten(VI)[(ArN)2WCl2] (Ar = 2,6-iPr2C6H3) and lithium derivatives of diphosphanes R2P-P(SiMe3)Li (R = tBu and iPr) yield two anionic diimido complexes of tungsten with side-on bonded phosphanylphosphinidene ligands, [(ArN)2WCl(η2-R2P-P)]-. Both complexes are structurally characterized. A possible reaction mechanism and the role of donor solvents are discussed on the basis of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Estimation of Coherence Bandwidth for Underwater Acoustic Communication Channel

    Publikacja

    A shallow underwater acoustic communication channel is characterized by strong multipath propagation. The signal reaching the receiver consists of a direct waveform and a number of its delayed and suppressed replica. A significant time dispersion of the transmitted signal and selective fading of its spectrum are observed. Coherence bandwidth defines maximal bandwidth, wherein the channel amplitude characteristic remains constant...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Sensitivity analysis of critical forces of trusses with side bracing

    The present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Seafloor relief reconstruction from side scan sonar data

    Publikacja

    Side scan sonar is one of the most widely used imaging systems in the underwater environment. It is relatively cheap and easy to deploy, in comparison with more powerful sensors. Although side scan sonar does not provide seafloor bathymetry directly, its records are directly related to seafloor images. In the paper, the method for 3D seafloor relief reconstruction from side scan sonar data is presented. The method is based on the...

    Pełny tekst do pobrania w portalu

  • Limitations of WSSUS modeling of stationary underwater acoustic communication channel

    Publikacja

    - HYDROACOUSTICS - Rok 2016

    Performances of underwater acoustic communication (UAC) systems are strongly related to specific propagation conditions of the underwater channel. Due to their large variability, there is a need for adaptive matching of the UAC systems signaling to the transmission properties of the channel. This requires a knowledge of instantaneous channel characteristics, in terms of the specific parameters of stochastic models. The wide-sense...

    Pełny tekst do pobrania w portalu

  • Stability of truss with side - supports. The case of linear and rotational elastic supports

    Publikacja

    - Rok 2008

    The research is devoted to study lateral buckling of truss with linear and rotational elastic side-supports. Geometrically nonlinear analysis of example truss with linear and rotational elastic sidesupports is carried out. The limit normal force in compressed chord of the truss due to stiffness of side supports is calculated. The elastic support reaction in relation to force in compressed chordand coefficient of buckling length...

  • Characteristics of the polarised off-body channel in indoor environments

    Publikacja

    This paper addresses the depolarisation effect in off-body body area networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...

    Pełny tekst do pobrania w portalu

  • Wideband Off-Body Channel Characteristics with Dynamic User

    Publikacja

    - Rok 2019

    This paper presents the preliminary results of a dynamic off-body channel characterisation study, based on wideband measurements at 5.8 GHz in an indoor environment. The Channel Impulse Response (CIR) was measured for a scenario with the user approaching and departing from the off-body antenna. A CIR deconvolution procedure was performed jointly in two polarisations, and the received signal power, Cross-Polarisation Discrimination...

  • Sławomir Jerzy Ambroziak dr hab. inż.

    Sławomir J. Ambroziak urodził się w 1982 r. Uzyskał tytuł zawodowy magistra inżyniera w zakresie systemów i usług radiokomunikacyjnych w roku 2008, w 2013 r. uzyskał stopień doktora nauk technicznych w dyscyplinie telekomunikacja, w specjalności radiokomunikacja, natomiast w 2020 r. uzyskał stopień doktora habilitowanego. Od 2008 r. jest pracownikiem Katedry Systemów i Sieci Radiokomunikacyjnych na Wydziale Elektroniki, Telekomunikacji...

  • Steady magnetohydrodynamic flow in a diverging channel with suction or blowing

    Publikacja

    - ZEITSCHRIFT FUR ANGEWANDTE MATHEMATIK UND PHYSIK - Rok 2013

    An analysis is made of steady two-dimensional divergent flow of an electrically conducting incompressible viscous fluid in a channel formed by two non-parallel walls, the flow being caused by a source of fluid volume at the intersection of the walls. The fluid is permeated by a magnetic field produced by an electric current along the line of intersection of the channel walls. The walls are porous and subjected to either suction...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Considerations of Adaptive Digital Communications in Underwater Acoustic Channel

    Publikacja

    Down-link communication (DLC) and air transportable communication (ATAC) buoys as well as autonomous underwater vehicles (AUV) use acoustic links for gathering oceanographic data from underwater monitoring systems. The underwater channel propagation conditions are diverse in nature and require a special adaptive approach to the communication system design. The article presents a methodology for the communication systems design,...

    Pełny tekst do pobrania w portalu

  • Don't forget the dark side of green transformation

    Publikacja

    - Rok 2022

    Design/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...

    Pełny tekst do pobrania w portalu

  • Visualization of a lifeboat motion during lowering along ship’s side

    Publikacja

    This paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...

    Pełny tekst do pobrania w portalu

  • Assessment of the Accuracy of a Virtual Multi-Channel Temperature Measuring Instrument

    The multi-channel temperature measurement system developed works with NTC thermistors. The article presents the results of theoretical and empirical evaluation of accuracy obtained in measurement channels. The basis for the theoretical assessment is the mathematical model for each of the measurement channels and the characteristics of the system elements included in the circuits of the measurement channel. Two different methods were...

    Pełny tekst do pobrania w portalu

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publikacja

    - Rok 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack

    Publikacja

    - Rok 2005

    Przedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.

  • Performance of an ad-hoc 802.11 LAN under a backoff attack

    Publikacja

    - Rok 2005

    Samowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...

  • Including the Dark Side of Entrepreneurship in the Entrepreneurship Education

    Publikacja

    Pursuing an entrepreneurial career is often rewarding in terms of both economic and psychological outcomes. However, becoming an entrepreneur also has its darker side that affects professional and personal life. Meanwhile, the positivity bias is prevalent in entrepreneurial education and research. It is recognized as emphasizing the advantages of becoming an entrepreneur and giving considerably less attention to potential downsides....

    Pełny tekst do pobrania w portalu