Applied sciences

International Journal of Electronics and Telecommunications

Content

International Journal of Electronics and Telecommunications | 2023 | vol. 69 | No 2

Download PDF Download RIS Download Bibtex

Abstract

The embryonic architecture, which draws inspiration from the biological process of ontogeny, has built-in mechanisms for self-repair. The entire genome is stored in the embryonic cells, allowing the data to be replicated in healthy cells in the event of a single cell failure in the embryonic fabric. A specially designed genetic algorithm (GA) is used to evolve the configuration information for embryonic cells. Any failed embryonic cell must be indicated via the proposed Built-in Selftest (BIST) the module of the embryonic fabric. This paper recommends an effective centralized BIST design for a novel embryonic fabric. Every embryonic cell is scanned by the proposed BIST in case the self-test mode is activated. The centralized BIST design uses less hardware than if it were integrated into each embryonic cell. To reduce the size of the data, the genome or configuration data of each embryonic cell is decoded using Cartesian Genetic Programming (CGP). The GA is tested for the 1-bit adder and 2-bit comparator circuits that are implemented in the embryonic cell. Fault detection is possible at every function of the cell due to the BIST module’s design. The CGP format can also offer gate-level fault detection. Customized GA and BIST are combined with the novel embryonic architecture. In the embryonic cell, self-repair is accomplished via data scrubbing for transient errors.
Go to article

Authors and Affiliations

Gayatri Malhotra
1 2
Punithavathi Duraiswamy
2
J.K. Kishore
1

  1. U R Rao Satellite Centre, India
  2. M S Ramaiah University of Applied Science, India
Download PDF Download RIS Download Bibtex

Abstract

Wearable antennas are becoming increasingly popular as a result of their wide range of applications, including communication, health parameter monitoring, and so on. If the wearable antenna is built of textile material, it is highly comfortable to wear and has numerous benefits, such as light weight, compact size, and low cost. A 1.3 GHz microstrip antenna made from jeans substrate is presented in this work. For antenna conducting patch and ground plane copper material is used. The electromagnetic properties of the jean’s substrate are dielectric constant ℇr = 1.7 and loss tangent tan ẟ = 0.01. In this work the main purpose or application of this antenna is to observe three levels of glucose, i.e., hypoglycemia, hyperglycemia, and normal glucose. The antenna is placed over the arm in the first scenario, while the finger is placed over the antenna patch in the second case. When the glucose concentration in the blood varies, the blood properties change, and the antenna frequency shifts as a result. [That] This frequency shift is used to find out the three glucose levels. The advantage of jeans substrate is that you can wear this antenna very easily over your arm. The antenna is designed using HFSS software and tested using an arm phantom and a finger phantom designed in HFSS.
Go to article

Authors and Affiliations

Asha Ghodake
1
Balaji Hogade
1

  1. Terna Engineering College, University of Mumbai, India
Download PDF Download RIS Download Bibtex

Abstract

In high technologies today, wearable devices have become popular. Wearable technology is a body sensing system that supports application of health observance and tracking through a wearable Global Positioning System (GPS). The design of the patch antennas is highly significant for the brilliance of the wearable patch antennas. This paper focuses on analyzing the bending effect on return loss and frequency between three types of GPS patch antenna. Types of GPS patch antennas that have been designed in this project are with different substrates and different designs. The wearable patch antenna has been designed and analyse using CST software. As a result, able to analysis the reflection coefficient (S11), radiation patterns, and analytical approach for patch antenna bending effect were obtained.
Go to article

Authors and Affiliations

Kavinesh S Radhakrishna
1
M.S. Shakhirul
1
Y.S. Lee
1 2
K.N. Khairina
1
A.R.A Syafiqah
1

  1. Faculty of Electronic Engineering Technology, Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
  2. Advanced Communication Engineering, Centre of Excellence (CoE), Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
Download PDF Download RIS Download Bibtex

Abstract

In the article, a device for measuring the parameters of the rotational movement of the auger for dewatering solid waste is proposed based on the analysis of signal processing methods and measurement of physical quantities. It can be used in the development of high-performance special vehicles for transporting waste as the main link in the structure of machines for the collection and primary processing of solid waste. The structural scheme of the means and block diagram of the microcontroller control program algorithm for implementation of the device for measuring the parameters of the rotational motion are proposed. The main technical characteristics of the proposed means are given. The results of experimental tests for measuring the parameters of rotational motion are shown. The results of experimental studies, which are given in the work, confirmed the reliability of the measured parameters.
Go to article

Authors and Affiliations

Waldemar Wójcik
1
Oleh V. Bereziuk
2
Mykhailo S. Lemeshev
2
Volodymyr V. Bohachuk
2
Leonid K. Polishchuk
2
Oksana Bezsmertna
2
Saule Smailova
3
Saule Kurmagazhanova
3

  1. Lublin University of Technology, Poland
  2. Vinnytsya National Technical University, Ukraine
  3. D. Serikbayev East Kazakhstan Technical University
Download PDF Download RIS Download Bibtex

Abstract

This work describes a dual band compact fully integrated rectenna circuit for implantable medical devices (IMDs). The implantable rectenna circuit consists of tunnel diode 10×10μm2 QW-ASPAT (Quantum Well Asymmetric Spacer Tunnel Layer diode) was used as the RF-DC rectifier due to its temperature insensitivity and nonlinearity compared with conventional SBD diode. SILVACO atlas software is used to design and simulate 100μm2 QW InGaAs ASPAT diode. A miniaturized dual band implantable folded dipole antenna with multiple L-shaped conducting sections is designed using CST microwave suits for operation in the WMTS band is 1.5GHz and ISM band of 5.8GHz. High dielectric constant material Gallium Arsenide (εr=12.94) and folded geometry helps to design compact antennas with a small footprint of 2.84mm3 (1×4.5×0.63) mm3. Four-layer human tissue model was used, where the antenna was implanted in the skin model at depth of 2mm. The 10-dB impedance bandwidth of the proposed compact antenna at 1.5GHz and 5.8GHz are 227MHz (1.4-1.63GHz) with S11 is -22.6dB and 540MHz (5.47-6.02GHz) with S11 is -23.1dB, whereas gains are -36.9dBi, and -24.3dBi, respectively. The output DC voltage and power of the rectenna using two stage voltage doubler rectifier (VDR) are twice that produced by the single stage at input RF power of 10dBm.
Go to article

Authors and Affiliations

Shamil H. Hussein
1
Khalid K. Mohammed
1 2

  1. Faculty of Engineering University of Mosul, Iraq
  2. University of Nineveh, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Effective and safe labour requires good cooperation of all the physiological systems. A proper synchronization of uterine and abdominal muscles is necessary for labour progression. Therefore, a new method for simultaneous monitoring of uterine activities and parturient’s pushing efforts is presented. A high sampled, rectified electrohysterographic signal is divided into a low, uterine passband (0.1-3.00Hz) and a high, muscular (40-100Hz) one. The time-dependent mean frequencies arse estimated for each passband separately. At the moments of uterine contraction the time-dependent LOW mean frequency was locally increased. During parturient’s pushing effort the HIGH mean frequency was increased in the manner typical for the skeletal muscles. It seems that the proposed method would be less sensitive to a measuring noise than the previously published RMS based estimators. Moreover, the proposed method enables to monitor fatigue of a uterus or abdominal muscles during the prolonged 2nd stage of a labour. It can be helpful to make a decision of Caesarean section.
Go to article

Authors and Affiliations

Dariusz S. Radomski
1

  1. Department of Nuclear and Medical Electronics, Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Go to article

Authors and Affiliations

Bartosz Kościug
1
Piotr Bilski
1
ORCID: ORCID

  1. The Faculty of Electronics and Information Technology on Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this article we present a procedure that allows to synthesize optimal circuit representing any reversible function within reasonable size limits. The procedure allows to choose either the NCT or the MCT gate set and specify any number of ancillary qubits to be used in the circuit. We will explore efficacy of this procedure by synthesizing various sources of nonlinearity used in contemporary symmetric ciphers and draw conclusions about properties of those transformations in quantum setting. In particular we will try to synthesize optimal circuit representing ASCON cipher SBOX which recently won NIST competition for Lightweight Cryptography standard.
Go to article

Authors and Affiliations

Adam Jagielski
1

  1. Military University of Technology in Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber physical network system. The V2G charging station concept was developed with the idea that every charging electric vehicle (EV) can communicate and coordinate with the charging station's control center, which includes a cyber physical system that addresses privacy and security concerns. The communication protocol must also be considered by the charging station. The preliminary test has been taken into consideration. Normal hours (for case one), peak hours (for case two), and valley hours (for case three), respectively, were created as charging circumstances for EVs at charging stations. Simulations were run for each of the three case scenarios. Each EV's battery state of charge (SoC) is provided a 50 percent initial charge and user-defined SoC restrictions. The MATLAB/SIMULINK platform was used to run the case simulations. The grid frequency, charging station output power, and the EV's battery SoC were all observed during the 24- hour simulation. As a result, the developed V2G charging station concept can regulate its input and output power depending on the battery status of the EVs inside the charging station, as well as provide frequency regulation service to the grid while meeting the energy demand of EV customers.
Go to article

Authors and Affiliations

Muhammad Nasir
1
Nelly Safitri
1
Rachmawati
1
Yassir
1
Muhammad Arhami
1

  1. Politeknik Negeri Lhokseumawe, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

Automatic car license plate recognition (LPR) is widely used nowadays. It involves plate localization in the image, character segmentation and optical character recognition. In this paper, a set of descriptors of image segments (characters) was proposed as well as a technique of multi-stage classification of letters and digits using cascade of neural network and several parallel Random Forest or classification tree or rule list classifiers. The proposed solution was applied to automated recognition of number plates which are composed of capital Latin letters and Arabic numerals. The paper presents an analysis of the accuracy of the obtained classifiers. The time needed to build the classifier and the time needed to classify characters using it are also presented.
Go to article

Authors and Affiliations

Michał Kekez
1

  1. Kielce University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article presents a new discretization method of a continuous-time linear model of sensor dynamics. It can be useful to reduce measuring errors related to the inertia of the sensor. For example it is important in the measurement of rapid processes as temperature changes in combustion chambers, or for shortening the time needed to establish the sensor readings in a transition state. There is assumed that sensor dynamics can be approximated by linear differential equation or transfer function. The searched coefficients of equivalent difference equation or discrete transfer function are obtained from Taylor expansion of a sensor output signal and then on the solution of the linear set of equations. The method does not require decomposition of sensor transfer function for zeros and poles and can be applied to the case of transfer function with zeros equal to zero. The method was used to compensate the dynamics of sensor measuring fast signals. The Bode characteristics of a compensator were compared with others derived using classical methods of discretization of linear models. Additionally, signals in time were presented to show the dynamic error before and after compensation.
Go to article

Authors and Affiliations

Sławomir Gryś
1
Waldemar Minkina
2

  1. University of Technology, Faculty of Electrical Engineering, Poland
  2. Jan Dlugosz University in Czestochowa, Faculty of Science and Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

Audio data compression is used to reduce the transmission bandwidth and storage requirements of audio data. It is the second stage in the audio mastering process with audio equalization being the first stage. Compression algorithms such as BSAC, MP3 and AAC are used as standards in this paper. The challenge faced in audio compression is compressing the signal at low bit rates. The previous algorithms which work well at low bit rates cannot be dominant at higher bit rates and vice-versa. This paper proposes an altered form of vector quantization algorithm which produces a scalable bit stream which has a number of fine layers of audio fidelity. This modified form of the vector quantization algorithm is used to generate a perceptually audio coder which is scalable and uses the quantization and encoding stages which are responsible for the psychoacoustic and arithmetical terminations that are actually detached as practically all the data detached during the prediction phases at the encoder side is supplemented towards the audio signal at decoder stage. Therefore, clearly the quantization phase which is modified to produce a bit stream which is scalable. This modified algorithm works well at both lower and higher bit rates. Subjective evaluations were done by audio professionals using the MUSHRA test and the mean normalized scores at various bit rates was noted and compared with the previous algorithms.
Go to article

Authors and Affiliations

Shajin Prince
1
Bini D
1
A Alfred Kirubaraj
1
J Samson Immanuel
1
Surya M
1

  1. Karunya Institute of Technology and Sciences, Coimbatore, India
Download PDF Download RIS Download Bibtex

Abstract

Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout the years, few methods exist to prevent the attacks. IEEE 802.11 covert channels could be considered a candidate to prevent Wi-Fi attacks since they allow secret communication between the client station and the access point without establishing an association. They can be implemented in frames that attackers do not target. This paper presents a new covert channel that prevents Wi-Fi attacks. We also describe metrics, and discuss the performance results of the proposed solution. We show that the new protocol is able to achieve high efficiency of operation.
Go to article

Authors and Affiliations

Geovani Teca
1
Marek Natkaniec
1

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Krakow, Poland
Download PDF Download RIS Download Bibtex

Abstract

In the digital society, states’ information security has become one of the key elements of ensuring the competitiveness and sustainable development of the state, guaranteeing its integrity and security in general. An important component of state security is the internal security of the state, which must ensure the personal and public safety of its citizens. Modern Ukraine is building a new system of criminal justice, which requires a new information system for risk assessment and support for optimal decision-making. Today, applied research and the development of information and analytical software for the internal security of the state have acquired a special meaning.
In the paper, there is built a set of models for providing operational information for decision-making in criminal justice. This is a cluster model for creating criminal profiles of convicts, and a scoring model for identifying individual characteristics of criminals that have the greatest impact on their propensity to reoffend. The obtained models can provide reliable support for decision-making in the field of criminal justice and become part of the information support system for the internal security of Ukraine in general.
Go to article

Authors and Affiliations

Olha Kovalchuk
1
Mykhailo Kasianchuk
1
Mikolaj Karpinski
2
Ruslan Shevchuk
2 1

  1. West Ukrainian National University
  2. University of Bielsko-Biala, Poland
Download PDF Download RIS Download Bibtex

Abstract

Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.
Go to article

Authors and Affiliations

Joseph Kipongo
1
Theo G. Swart
1
Ebenezer Esenogho
1 2

  1. Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South Africa
  2. Department of Electrical and Electronic Engineering, University of Botswana, Gaborone, Botswana
Download PDF Download RIS Download Bibtex

Abstract

In this paper, we show why the descriptions of the sampled signal used in calculation of its spectrum, that are used in the literature, are not correct. And this finding applies to both kinds of descriptions: the ones which follow from an idealized way of modelling of the signal sampling operation as well as those which take into account its non-idealities. The correct signal description, that results directly from the way A/D converters work (regardless of their architecture), is presented and dis-cussed here in detail. Many figures included in the text help in its understanding.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Department of Marine Telecommunications, Faculty of Electrical Engineering, Gdynia Maritime University, Poland
Download PDF Download RIS Download Bibtex

Abstract

The performance of free-space optical (FSO) communications that using an optical amplifier (OA) in the scheme of an amplify-received (AR)-relaying has a major drawback in the detection of input signal quality under the effects of turbulence. As an OA is based on a fiber-detection (FD) method to receive and delivers a signal at the amplification process stage, there is an opportunity to implement an optical spatial filter (OSF) to improve the quality of an input signal. In this paper, as the continuation of previous work on the direct-detection, the OSF is applied on the AR-relaying. The novelty proposed in this work is the improvement of FD method where the OSF is designed as the integration of cone reflector, pinhole and multi-mode fiber with an OA. The OSF produces an optical signal, the input of the OA, which minimizes the effects of turbulence, background noise and signal fluctuation. Thus, OA in AR-relaying produces signal output with high power and rise up below threshold level. Additionally, an OSF with a lower pinhole diameter produces the best quality of the signal spectral to be delivered into an EDFA. Through this implementation, the performance of optical relaying on FSO can be significantly improved.
Go to article

Authors and Affiliations

Ucuk Darusalam
1 2
Purnomo Sidi Priambodo
3
Fitri Yuli Zulkifli
3
Eko Tjipto Rahardjo
3

  1. Department of Informatics, Faculty of Information and Communications Technology, Universitas Nasional, Jakarta, Indonesia
  2. Universitas Siber Asia, Jakarta, Indonesia
  3. Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

Packet-switched xHaul networks are a scalable solution enabling convergent transport of diverse types of radio data flows, such as fronthaul / midhaul / backhaul (FH / MH / BH) flows, between remote sites and a central site (hub) in 5G radio access networks (RANs). Such networks can be realized using the cost-efficient Ethernet technology, which enhanced with time-sensitive networking (TSN) features allows for prioritized transmission of latency-sensitive fronthaul flows. Provisioning of multiple types of 5G services of different service requirements in a shared network, commonly referred to as network slicing, requires adequate handling of transported data flows in order to satisfy particular service / slice requirements. In this work, we investigate two traffic prioritization policies, namely, flowaware (FA) and latency-aware (LA), in a packet-switched xHaul network supporting slices of different latency requirements. We evaluate the effectiveness of the policies in a networkplanning case study, where virtualized radio processing resources allocated at the processing pool (PP) facilities, for two slices related to enhanced mobile broadband (eMBB) and ultra-reliable low latency communications (URLLC) services, are subject to optimization. Using numerical experiments, we analyze PP cost savings from applying the LA policy (vs. FA) in various network scenarios. The savings in active PPs reach up to 40% − 60% in ring scenarios and 30% in a mesh network, whereas the gains in overall PP cost are up to 20% for the cost values assumed in the analysis.
Go to article

Authors and Affiliations

Mirosław Klinkowski
1

  1. National Institute of Telecommunications, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The unpredictable and huge data generation nowadays by smart devices from IoT and mobile Crowd Sensing applications like (Sensors, smartphones, Wi-Fi routers) need processing power and storage. Cloud provides these capabilities to serve organizations and customers, but when using cloud appear some limitations, the most important of these limitations are Resource Allocation and Task Scheduling. The resource allocation process is a mechanism that ensures allocation virtual machine when there are multiple applications that require various resources such as CPU and I/O memory. Whereas scheduling is the process of determining the sequence in which these tasks come and depart the resources in order to maximize efficiency. In this paper we tried to highlight the most relevant difficulties that cloud computing is now facing. We presented a comprehensive review of resource allocation and scheduling techniques to overcome these limitations. Finally, the previous techniques and strategies for allocation and scheduling have been compared in a table with their drawbacks.
Go to article

Authors and Affiliations

Abbas M. Ali Al-muqarm
1 2
Naseer Ali Hussien
3

  1. University of Kufa, Iraq
  2. Computer Technical Engineering Department, The Islamic University, Iraq
  3. Alayen University, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Energy consumed by the sensor nodes are more sporadic in a sensor networks. A skilled way to bring down energy consumption and extend maximum life-time of any sensor present can be of evenly and unevenly distributed random area networks. Cluster heads are more responsible for the links between the source and destination. Energy consumption are much compare to member nodes of the network. Re-clustering will take place if the connectivity in the distributed network failure occurs in between the cluster networks that will affects redundancy in the network efficiency. Hence, we propose pragmatic distribution based routing cluster lifetime using fitness function (PDBRC) prototype is better than the existing protocol using MATLAB 2021a simulation tool.
Go to article

Authors and Affiliations

Harish SV
1
Archana NV
2

  1. NIE Institute of Technology, India Visvesvaraya Technological University, India
  2. University of Mysuru, India
Download PDF Download RIS Download Bibtex

Abstract

Data security is one of the prime concerns in wireless networks. PLKG has been emerging as an attractive alternative to traditional cryptographic techniques. PLKG is more computationally efficient than cryptography. Moreover, PLKG using Principal component analysis (PCA) as pre-processing may further save computations. This paper proposes three mechanisms to select components of PCA which are based on Information content, Mean and Histfit. Bit Disagreement Rate (BDR) is compared for each mechanism. Histfit based method is found to be best. Since only two components are supposed to be processed for key generation, it is computationally efficient/ power efficient too.
Go to article

Authors and Affiliations

Tapesh Sarsodia
1
Uma Rathore Bhatt
1
Raksha Upadhyay
1
Vijay Bhat
2

  1. Institute of Engineering and Technology, Devi Ahilya University, Indore, India
  2. Sage University, Indore, Madhya Pradesh, India
Download PDF Download RIS Download Bibtex

Abstract

The paper brings forward an idea of multi-threaded computation synchronization based on the shared semaphored cache in the multi-core CPUs. It is dedicated to the implementation of multi-core PLC control, embedded solution or parallel computation of models described using hardware description languages. The shared semaphored cache is implemented as guarded memory cells within a dedicated section of the cache memory that is shared by multiple cores. This enables the cores to speed up the data exchange and seamlessly synchronize the computation. The idea has been verified by creating a multi-core system model using Verilog HDL. The simulation of task synchronization methods allows for proving the benefits of shared semaphored memory cells over standard synchronization methods. The proposed idea enhances the computation in the algorithms that consist of relatively short tasks that can be processed in parallel and requires fast synchronization mechanisms to avoid data race conditions.
Go to article

Authors and Affiliations

Adam Milik
1
Michał Walichiewicz
1

  1. Silesian University of Technology, Faculty of Automatic Control, Electronics and Computer Science, Digital Systems Division, Gliwice, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper presents a solution to the problem of synthesis of control with respect to the sliding interval length for the optimization of a class of discrete linear multidimensional objects with a quadratic performance criterion. The equation of motion of a closed multidimensional discrete system in the general non-stationary case is derived based on the length of the optimization interval and their main properties. The closed-loop is fitted with a signal representing the predicted values averaged over the whole sliding interval of optimization with a certain weight. A problem with a sliding optimization interval may not require a real-time solution by means of a sequence of solutions on compressed intervals. Therefore, the study of control systems with optimization on a sliding interval is of undoubted interest for a number of practically important control problems.
Go to article

Authors and Affiliations

Zhazira Julayeva
1
Waldemar Wójcik
2
Gulzhan Kashaganova
3
Kulzhan Togzhanova
4
Saken Mambetov
4

  1. Academy of Logistics and Transport, Almaty Technological University, Almaty, Kazakhstan
  2. Lublin University of Technology, Lublin, Poland
  3. Turan University and Satbayev University, Almaty, Kazakhstan
  4. Almaty Technological University, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

QIT–Quantum Information Technologies promises are very serious, greatly exceeding only technical and market levels. Development of QIT in Europe, treated as building a new infrastructural civilization level, requires a broader view of coordination, funding and priority-setting policy. Simple measures used in the case of the development of new technologies, but not creating a significant ecosystem, are insufficient in this case. Quantum technologies are poised to create a new information layer of knowledge-based society. In this essay, the author subjectively addresses some of the issues such as: what we already know and what we don't know, and what efforts are being made in Europe. Polish version of this paper was published in Przegl.Telekom.2.23.
Go to article

Authors and Affiliations

Ryszard S. Romaniuk
1

  1. Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

This article discusses four fields of study with the potential to revolutionize our understanding and interaction with biological systems: quantum biophotonics, molecular and supramolecular bioelectronics, quantum-based approaches in gaming, and nano-biophotonics. Quantum biophotonics uses photonics, biochemistry, biophysics, and quantum information technologies to study biological systems at the sub-nanoscale level. Molecular and supramolecular bioelectronics aim to develop biosensors for medical diagnosis, environmental monitoring, and food safety by designing materials and devices that interface with biological systems at the molecular level. Quantum-based approaches in gaming improve modeling of complex systems, while nanomedicine enhances disease diagnosis, treatment, and prevention using nanoscale devices and sensors developed with quantum biophotonics. Lastly, nano-biophotonics studies cellular structures and functions with unprecedented resolution.
Go to article

Authors and Affiliations

Marcin Lelit
1
Andrzej Białecki
1
Tomasz Gabler
1
Filip Łabaj
1
Emil Pituła
1
Ryszard S. Romaniuk
1

  1. Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

Driver assistance systems have started becoming a key differentiator in automotive space and all major automotive manufacturers have such systems with various capabilities and stages of implementation. The main building blocks of such systems are similar in nature and one of the major building blocks is road lane detection. Even though lane detection technology has been around for decades, it is still an ongoing area of research and there are still several improvements and optimizations that are possible. This paper offers an Optimized Dynamic Origin Technique (Optimized DOT) for lane detection. The proposed optimization algorithm of optimized DOT gives better results in performance and accuracy compared to other methods of lane detection. Analysis of proposed optimized DOT with various edge detection techniques, various threshold levels, various sample dataset and various lane detection methods were done and the results are discussed in this paper. The proposed optimized DOT lane detection average processing time increases by 9.21 % when compared to previous Dynamic Origin Technique (DOT) and 59.09 % compared to traditional hough transform.
Go to article

Authors and Affiliations

P. Maya
1
C. Tharini
1

  1. B S Abdur Rahman Crescent Institute of Science and Technology, Chennai, India

Instructions for authors

Author Guidelines

We recommend the use of LaTeX2e for the preparation of your camera-ready manuscript, together with the corresponding class file.

We do not encourage the use of Microsoft Word, particularly as the layout of the pages (the position of figures and paragraphs or fonts) can change between printouts. If you would like to prepare your manuscript using MS Word please contact Editorial Office.

Please carefully read the information below, and download the relevant files.

To do so, please download JETInfo.pdf

Microsoft Windows or Macintosh LaTeX2e style file:

      Please download IEEEtran.zip

Publication requirement is to prepare no less than 6 pages including references using provided LaTeX2e style. All papers that do not meet this requirement will be rejected before review stage.

 

 

Please submit the following:

  •     All source LaTeX files.
  •     Final PDF file (for reference).
  •     PS/EPS or TIFF files for all figures.
  •     Complete contact information for all authors.
  •     Mailing address, a VAT/CIF/NIF/NIP number (depending on the country) of affiliated company the invoice should be sent.

 

IMORTANT! Before staring submission please prepare a contact information for all co-authors (full names, e-mails and affiliations). A contact information for all authors should be provided during submission process in "Step 2. Entering the Submission's Metadata". Papers submitted without contact information for all co-

This page uses 'cookies'. Learn more