Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Bilski, Piotr" wg kryterium: Autor


Wyświetlanie 1-7 z 7
Tytuł:
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
Autorzy:
Kościug, Bartosz
Bilski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/27311876.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
Power optimization
Security protocols
machine to machine communications
Application layer protocols
IoT
Opis:
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 253--259
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Steganography in Audio Files: COTS Software Analysis
Autorzy:
Marszałek, Piotr
Bilski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2201248.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
steganography
audio
information hiding
steganalysis
encryption
compression
cybersecurity
cyberspace
embedding
information security
privacy
signal plane
non-signal plane
Opis:
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 121--126
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization of Autonomous Agent Routes in Logistics Warehouse
Autorzy:
Markowski, Tomasz
Bilski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2055221.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
shortest path problem
hive of robots
logistics
microcontrollers
Opis:
The paper introduces the distributed framework for determining the shortest path of robots in the logistic applications, i.e. the warehouse with a swarm of robots cooperating in the Real-Time mode. The proposed solution uses the optimization routine to avoid the downtime and collisions between robots. The presented approach uses the reference model based on Dijkstra, Floyd-Warshall and Bellman-Ford algorithms, which search the path in the weighted undirected graph. Their application in the onboard robot’s computer requires the analysis of the time efficiency. Results of comparative simulations for the implemented algorithms are presented. For their evaluation the data sets reflecting actual processes were used. Outcomes of experiments have shown that the tested algorithms are applicable for the logistic purposes, however their ability to operate in the Real-Time requires the detailed analysis.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 4; 559--564
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Method for the Player Profiling in the Turn-based Computer Games
Autorzy:
Bilski, Piotr
Antoniuk, Izabella
Łabędzki, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/27311938.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
turn based games
player profiling
data clustering
automated classification
Opis:
The following paper presents the players profiling methodology applied to the turn-based computer game in the audience-driven system. The general scope are mobile games where the players compete against each other and are able to tackle challenges presented by the game engine. As the aim of the game producer is to make the gameplay as attractive as possible, the players should be paired in a way that makes their duel the most exciting. This requires the proper player profiling based on their previous games. The paper presents the general structure of the system, the method for extracting information about each duel and storing them in the data vector form and the method for classifying different players through the clustering or predefined category assignment. The obtained results show the applied method is suitable for the simulated data of the gameplay model and clustering of players may be used to effectively group them and pair for the duels.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 461--468
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the Magnetoelectric Sensors Usability for the Energy Harvesting
Autorzy:
Kuczynski, Karol
Bilski, Adrian
Bilski, Piotr
Szymanski, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/1844465.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
magnetoelectric sensor
current sensor
magnetostriction
amorphous metal ribbon
piezoelectric materials
energy harvesting
Opis:
The paper presents the analysis of the magnetic sensor’s applicability to the energy harvesting operations. The general scheme and technical advancement of the energy extraction from the electric vehicle (such as a tram or a train) is presented. The proposed methodology of applying the magnetic sensor to the energy harvesting is provided. The experimental scheme for the sensor characteristics and measurement results is discussed. Conclusions and future prospects regarding the practical implementation of the energy harvesting system are provided.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 787-792
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Testing and modeling of constant magnetic field cylindrical magnetoelectric sensors output characteristics
Autorzy:
Kuczynski, Karol
Bilski, Piotr
Bilski, Adrian
Szymanski, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/2204515.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
magnetoelectric effect
magnetostriction
magnetometers
amorphous magnetic materials
piezoelectric materials
efekt magnetoelektryczny
magnetostrykcja
magnetometry
amorficzne materiały magnetyczne
materiały piezoelektryczne
Opis:
The paper presents the novel concept of the magnetoelectric sensor constructed using the amorphous glass ribbon. Its output characteristics (voltage pattern), conditions of work and experimental results are presented. The novel construction allows for minimizing the demagnetizing field in the core of the sensor and linearization of the characteristics between the magnetic field and obtained voltage. Conducted experiments were aimed at determining the sensor operation in the presence of the constant magnetic field (HDC). The main concern of the tests was to verify the linear dependency between the HDC value and the amplitude of the output voltage. Next, the computer model representing the sensor behavior in the constant magnetic field is described. The model implements the parameter identification task based on the regression algorithms. The presented work shows that the proposed device can be used to measure the weak magnetic field and the dependency between the output signal amplitudes and the constant component in the measured magnetic field is approximately linear. This enables measurements of even weak fields.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2023, 71, 1; art. no. e144583
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
AH Method: a Novel Routine for Vicinity Examination of the Optimum Found with a Genetic Algorithm
Autorzy:
Piętak, Daniel Andrzej
Bilski, Piotr
Napiorkowski, Paweł Jan
Powiązania:
https://bibliotekanauki.pl/articles/2200688.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
heuristics
evolutionary computations
genetic algorithms
uncertainty estimation
parameter study
Opis:
The paper presents a novel heuristic procedure (further called the AH Method) to investigate function shape in the direct vicinity of the found optimum solution. The survey is conducted using only the space sampling collected during the optimization process with an evolutionary algorithm. For this purpose the finite model of point-set is considered. The statistical analysis of the sampling quality based upon the coverage of the points in question over the entire attraction region is exploited. The tolerance boundaries of the parameters are determined for the user-specified increase of the objective function value above the found minimum. The presented test-case data prove that the proposed approach is comparable to other optimum neighborhood examination algorithms. Also, the AH Method requires noticeably shorter computational time than its counterparts. This is achieved by a repeated, second use of points from optimization without additional objective function calls, as well as significant repository size reduction during preprocessing.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 695--708
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies