A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last   [Sort by number of followers]   [Restore default list]

  Subjects -> ELECTRONICS (Total: 207 journals)
Showing 1 - 200 of 277 Journals sorted alphabetically
Acta Electronica Malaysia     Open Access  
Advanced Materials Technologies     Hybrid Journal   (Followers: 1)
Advances in Biosensors and Bioelectronics     Open Access   (Followers: 9)
Advances in Electrical and Electronic Engineering     Open Access   (Followers: 10)
Advances in Electronics     Open Access   (Followers: 101)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 8)
Advances in Microelectronic Engineering     Open Access   (Followers: 13)
Advances in Power Electronics     Open Access   (Followers: 42)
Advancing Microelectronics     Hybrid Journal  
American Journal of Electrical and Electronic Engineering     Open Access   (Followers: 28)
Annals of Telecommunications     Hybrid Journal   (Followers: 8)
APSIPA Transactions on Signal and Information Processing     Open Access   (Followers: 8)
Archives of Electrical Engineering     Open Access   (Followers: 16)
Australian Journal of Electrical and Electronics Engineering     Hybrid Journal  
Batteries     Open Access   (Followers: 10)
Batteries & Supercaps     Hybrid Journal   (Followers: 7)
Bell Labs Technical Journal     Hybrid Journal   (Followers: 31)
Bioelectronics in Medicine     Hybrid Journal  
Biomedical Instrumentation & Technology     Hybrid Journal   (Followers: 6)
BULLETIN of National Technical University of Ukraine. Series RADIOTECHNIQUE. RADIOAPPARATUS BUILDING     Open Access   (Followers: 2)
Bulletin of the Polish Academy of Sciences : Technical Sciences     Open Access   (Followers: 1)
Canadian Journal of Remote Sensing     Full-text available via subscription   (Followers: 46)
China Communications     Full-text available via subscription   (Followers: 9)
Chinese Journal of Electronics     Hybrid Journal  
Circuits and Systems     Open Access   (Followers: 15)
Consumer Electronics Times     Open Access   (Followers: 5)
Control Systems     Hybrid Journal   (Followers: 313)
ECTI Transactions on Computer and Information Technology (ECTI-CIT)     Open Access  
ECTI Transactions on Electrical Engineering, Electronics, and Communications     Open Access   (Followers: 2)
Edu Elektrika Journal     Open Access   (Followers: 1)
Electrica     Open Access  
Electronic Design     Partially Free   (Followers: 123)
Electronic Markets     Hybrid Journal   (Followers: 7)
Electronic Materials Letters     Hybrid Journal   (Followers: 4)
Electronics     Open Access   (Followers: 111)
Electronics and Communications in Japan     Hybrid Journal   (Followers: 10)
Electronics For You     Partially Free   (Followers: 105)
Electronics Letters     Hybrid Journal   (Followers: 26)
Elektronika ir Elektortechnika     Open Access   (Followers: 6)
Elkha : Jurnal Teknik Elektro     Open Access  
Emitor : Jurnal Teknik Elektro     Open Access   (Followers: 7)
Energy Harvesting and Systems     Hybrid Journal   (Followers: 4)
Energy Storage     Hybrid Journal   (Followers: 2)
Energy Storage Materials     Full-text available via subscription   (Followers: 5)
EPE Journal : European Power Electronics and Drives     Hybrid Journal  
EPJ Quantum Technology     Open Access   (Followers: 1)
EURASIP Journal on Embedded Systems     Open Access   (Followers: 10)
Facta Universitatis, Series : Electronics and Energetics     Open Access  
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Foundations and Trends® in Signal Processing     Full-text available via subscription   (Followers: 9)
Frequenz     Hybrid Journal   (Followers: 1)
Frontiers of Optoelectronics     Hybrid Journal   (Followers: 1)
IACR Transactions on Symmetric Cryptology     Open Access   (Followers: 1)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 106)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 81)
IEEE Embedded Systems Letters     Hybrid Journal   (Followers: 54)
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology     Hybrid Journal   (Followers: 3)
IEEE Journal of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 53)
IEEE Journal of the Electron Devices Society     Open Access   (Followers: 9)
IEEE Journal on Exploratory Solid-State Computational Devices and Circuits     Hybrid Journal   (Followers: 1)
IEEE Letters on Electromagnetic Compatibility Practice and Applications     Hybrid Journal   (Followers: 4)
IEEE Magnetics Letters     Hybrid Journal   (Followers: 7)
IEEE Nanotechnology Magazine     Hybrid Journal   (Followers: 42)
IEEE Open Journal of Circuits and Systems     Open Access   (Followers: 3)
IEEE Open Journal of Industry Applications     Open Access   (Followers: 3)
IEEE Open Journal of the Industrial Electronics Society     Open Access   (Followers: 3)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 78)
IEEE Pulse     Hybrid Journal   (Followers: 5)
IEEE Reviews in Biomedical Engineering     Hybrid Journal   (Followers: 23)
IEEE Solid-State Circuits Letters     Hybrid Journal   (Followers: 3)
IEEE Solid-State Circuits Magazine     Hybrid Journal   (Followers: 13)
IEEE Transactions on Aerospace and Electronic Systems     Hybrid Journal   (Followers: 374)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 75)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 65)
IEEE Transactions on Autonomous Mental Development     Hybrid Journal   (Followers: 8)
IEEE Transactions on Biomedical Engineering     Hybrid Journal   (Followers: 39)
IEEE Transactions on Broadcasting     Hybrid Journal   (Followers: 13)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 27)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 45)
IEEE Transactions on Electron Devices     Hybrid Journal   (Followers: 18)
IEEE Transactions on Geoscience and Remote Sensing     Hybrid Journal   (Followers: 230)
IEEE Transactions on Haptics     Hybrid Journal   (Followers: 5)
IEEE Transactions on Industrial Electronics     Hybrid Journal   (Followers: 75)
IEEE Transactions on Industry Applications     Hybrid Journal   (Followers: 45)
IEEE Transactions on Information Theory     Hybrid Journal   (Followers: 27)
IEEE Transactions on Learning Technologies     Full-text available via subscription   (Followers: 12)
IEEE Transactions on Power Electronics     Hybrid Journal   (Followers: 81)
IEEE Transactions on Services Computing     Hybrid Journal   (Followers: 4)
IEEE Transactions on Signal and Information Processing over Networks     Hybrid Journal   (Followers: 14)
IEEE Transactions on Software Engineering     Hybrid Journal   (Followers: 81)
IEEE Women in Engineering Magazine     Hybrid Journal   (Followers: 11)
IEEE/OSA Journal of Optical Communications and Networking     Hybrid Journal   (Followers: 16)
IEICE - Transactions on Electronics     Full-text available via subscription   (Followers: 11)
IEICE - Transactions on Information and Systems     Full-text available via subscription   (Followers: 5)
IET Cyber-Physical Systems : Theory & Applications     Open Access   (Followers: 1)
IET Energy Systems Integration     Open Access   (Followers: 1)
IET Microwaves, Antennas & Propagation     Hybrid Journal   (Followers: 35)
IET Nanodielectrics     Open Access  
IET Power Electronics     Hybrid Journal   (Followers: 62)
IET Smart Grid     Open Access   (Followers: 1)
IET Wireless Sensor Systems     Hybrid Journal   (Followers: 18)
IETE Journal of Education     Open Access   (Followers: 3)
IETE Journal of Research     Open Access   (Followers: 10)
IETE Technical Review     Open Access   (Followers: 12)
IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)     Open Access   (Followers: 3)
Industrial Technology Research Journal Phranakhon Rajabhat University     Open Access  
Informatik-Spektrum     Hybrid Journal   (Followers: 2)
Instabilities in Silicon Devices     Full-text available via subscription   (Followers: 1)
Intelligent Transportation Systems Magazine, IEEE     Full-text available via subscription   (Followers: 14)
International Journal of Advanced Research in Computer Science and Electronics Engineering     Open Access   (Followers: 18)
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems     Open Access   (Followers: 12)
International Journal of Antennas and Propagation     Open Access   (Followers: 10)
International Journal of Applied Electronics in Physics & Robotics     Open Access   (Followers: 4)
International Journal of Computational Vision and Robotics     Hybrid Journal   (Followers: 5)
International Journal of Control     Hybrid Journal   (Followers: 11)
International Journal of Electronics     Hybrid Journal   (Followers: 6)
International Journal of Electronics and Telecommunications     Open Access   (Followers: 13)
International Journal of Granular Computing, Rough Sets and Intelligent Systems     Hybrid Journal   (Followers: 3)
International Journal of High Speed Electronics and Systems     Hybrid Journal  
International Journal of Hybrid Intelligence     Hybrid Journal  
International Journal of Image, Graphics and Signal Processing     Open Access   (Followers: 16)
International Journal of Microwave and Wireless Technologies     Hybrid Journal   (Followers: 10)
International Journal of Nanoscience     Hybrid Journal   (Followers: 1)
International Journal of Numerical Modelling: Electronic Networks, Devices and Fields     Hybrid Journal   (Followers: 4)
International Journal of Power Electronics     Hybrid Journal   (Followers: 25)
International Journal of Review in Electronics & Communication Engineering     Open Access   (Followers: 4)
International Journal of Sensors, Wireless Communications and Control     Hybrid Journal   (Followers: 12)
International Journal of Systems, Control and Communications     Hybrid Journal   (Followers: 4)
International Journal of Wireless and Microwave Technologies     Open Access   (Followers: 6)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
JAREE (Journal on Advanced Research in Electrical Engineering)     Open Access  
Journal of Biosensors & Bioelectronics     Open Access   (Followers: 4)
Journal of Advanced Dielectrics     Open Access   (Followers: 1)
Journal of Artificial Intelligence     Open Access   (Followers: 14)
Journal of Circuits, Systems, and Computers     Hybrid Journal   (Followers: 4)
Journal of Computational Intelligence and Electronic Systems     Full-text available via subscription   (Followers: 1)
Journal of Electrical and Electronics Engineering Research     Open Access   (Followers: 39)
Journal of Electrical Bioimpedance     Open Access  
Journal of Electrical Bioimpedance     Open Access   (Followers: 2)
Journal of Electrical Engineering & Electronic Technology     Hybrid Journal   (Followers: 7)
Journal of Electrical, Electronics and Informatics     Open Access  
Journal of Electromagnetic Analysis and Applications     Open Access   (Followers: 8)
Journal of Electromagnetic Waves and Applications     Hybrid Journal   (Followers: 9)
Journal of Electronic Design Technology     Full-text available via subscription   (Followers: 6)
Journal of Electronic Science and Technology     Open Access   (Followers: 1)
Journal of Electronics (China)     Hybrid Journal   (Followers: 5)
Journal of Energy Storage     Full-text available via subscription   (Followers: 5)
Journal of Engineered Fibers and Fabrics     Open Access   (Followers: 2)
Journal of Field Robotics     Hybrid Journal   (Followers: 4)
Journal of Guidance, Control, and Dynamics     Hybrid Journal   (Followers: 193)
Journal of Information and Telecommunication     Open Access   (Followers: 1)
Journal of Intelligent Procedures in Electrical Technology     Open Access   (Followers: 3)
Journal of Low Power Electronics     Full-text available via subscription   (Followers: 10)
Journal of Low Power Electronics and Applications     Open Access   (Followers: 10)
Journal of Microelectronics and Electronic Packaging     Hybrid Journal   (Followers: 1)
Journal of Microwave Power and Electromagnetic Energy     Hybrid Journal   (Followers: 3)
Journal of Microwaves, Optoelectronics and Electromagnetic Applications     Open Access   (Followers: 10)
Journal of Nuclear Cardiology     Hybrid Journal  
Journal of Optoelectronics Engineering     Open Access   (Followers: 4)
Journal of Physics B: Atomic, Molecular and Optical Physics     Hybrid Journal   (Followers: 32)
Journal of Power Electronics     Hybrid Journal   (Followers: 2)
Journal of Power Electronics & Power Systems     Full-text available via subscription   (Followers: 11)
Journal of Semiconductors     Full-text available via subscription   (Followers: 5)
Journal of Sensors     Open Access   (Followers: 26)
Journal of Signal and Information Processing     Open Access   (Followers: 8)
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer     Open Access  
Jurnal Rekayasa Elektrika     Open Access  
Jurnal Teknik Elektro     Open Access  
Jurnal Teknologi Elektro     Open Access  
Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control     Open Access  
Majalah Ilmiah Teknologi Elektro : Journal of Electrical Technology     Open Access   (Followers: 2)
Metrology and Measurement Systems     Open Access   (Followers: 6)
Microelectronics and Solid State Electronics     Open Access   (Followers: 28)
Nanotechnology, Science and Applications     Open Access   (Followers: 6)
Nature Electronics     Hybrid Journal   (Followers: 1)
Networks: an International Journal     Hybrid Journal   (Followers: 4)
Open Electrical & Electronic Engineering Journal     Open Access  
Open Journal of Antennas and Propagation     Open Access   (Followers: 8)
Paladyn. Journal of Behavioral Robotics     Open Access   (Followers: 1)
Power Electronics and Drives     Open Access   (Followers: 2)
Problemy Peredachi Informatsii     Full-text available via subscription  
Progress in Quantum Electronics     Full-text available via subscription   (Followers: 7)
Radiophysics and Quantum Electronics     Hybrid Journal   (Followers: 2)
Recent Advances in Communications and Networking Technology     Hybrid Journal   (Followers: 3)
Recent Advances in Electrical & Electronic Engineering     Hybrid Journal   (Followers: 11)
Research & Reviews : Journal of Embedded System & Applications     Full-text available via subscription   (Followers: 6)
Revue Méditerranéenne des Télécommunications     Open Access  
Security and Communication Networks     Hybrid Journal   (Followers: 2)
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of     Hybrid Journal   (Followers: 57)
Semiconductors and Semimetals     Full-text available via subscription   (Followers: 1)
Sensing and Imaging : An International Journal     Hybrid Journal   (Followers: 2)
Solid State Electronics Letters     Open Access  
Solid-State Electronics     Hybrid Journal   (Followers: 9)
Superconductor Science and Technology     Hybrid Journal   (Followers: 3)
Synthesis Lectures on Power Electronics     Full-text available via subscription   (Followers: 3)
Technical Report Electronics and Computer Engineering     Open Access  
TELE     Open Access  
Telematique     Open Access  
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)     Open Access   (Followers: 11)
Transactions on Cryptographic Hardware and Embedded Systems     Open Access   (Followers: 4)

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
International Journal of Electronics and Telecommunications
Journal Prestige (SJR): 0.216
Citation Impact (citeScore): 1
Number of Followers: 13  

  This is an Open Access Journal Open Access journal
ISSN (Print) 0867-6747 - ISSN (Online) 2300-1933
Published by Polska Akademia Nauk Homepage  [10 journals]
  • Permutation Coding with Injections for Modified PAM System

    • Authors: Opeyemi O Ogunyanda, Thokozani Shongwe, Theo G Swart
      Pages: 399 - 404
      Abstract: Arriving at a good combination of coding and
      modulation schemes that can achieve good error correction
      constitutes a challenge in digital communication systems. In this
      work, we explore the combination of permutation coding (PC)
      and pulse amplitude modulation (PAM) for mitigating channel
      errors in the presence of background noise and jitter. Since PAM
      is characterised with bi-polar constellations, Euclidean distance is
      a good choice for predicting the performance of such coded modulation
      setup. In order to address certain challenges facing PCs,
      we therefore introduce injections in the coding system, together
      with a modified form of PAM system. This modification entails
      constraining the PAM constellations to the size of the codeword’s
      symbol. The results obtained demonstrate the strength of the
      modified coded PAM system over the conventional PC coded
      PAM system.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Access Logs – Underestimated Privacy Risks

    • Authors: Kamil Kaczyński, Michał Glet
      Pages: 405 - 410
      Abstract: Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Information Technologies of Estimation the Quality Level of Graduates
           Training in Technical University by Means of Artificial Intelligence

    • Authors: Anzhelika O. Azarova, Larysa E. Azarova, Sergii V. Pavlov, Iryna S. Kaplun, Nataliia B. Savina, Waldemar Wójcik, Saule Smailova, Aliya Kalizhanova
      Pages: 411 - 416
      Abstract: The information technologies for assessing the quality of IT-specialties graduates' training of university by means of fuzzy logic and neural networks are developed in the article. It makes possible taking into account a wide set of estimation and output parameters, influence of the external and internal factors and allows to simplify the assessing process by means of modern mathematical apparatuses of artificial intelligence.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Model of integral assessment of innovation implementation in higher
           educational establishments

    • Authors: Svetlana A. Yaremko, Irina I. Nikolina, Elena М. Kuzmina, Serghiy S. Pugach, Waldemar Wójcik, Nataliya Denissova, Ainur Kozbakova
      Pages: 417 - 423
      Abstract: The concept of innovative educational environment of higher education establishment is considered and its main components are highlighted. The model of the integrated assessment of implementing innovations in higher education establishment is constructed. The developed model for assessing the level of development of the innovative educational environment of a specific higher education establishment during a certain period has been applied and a graphical analysis of the calculation results has been carried out.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Improved method of searching the associative rules while developing the
           software

    • Authors: Tamara O. Savchuk, Nataliia V. Pryimak, Nina V. Slyusarenko, Andrzej Smolarz, Saule Smailova, Yedilkhan Amirgaliyev
      Pages: 425 - 430
      Abstract: As the delivery of the good quality software in time is very important part of the software development process, it's very important task to organize this process very accurately. For this a new method of the searching associative rules where proposed. It is based on the classification of the all tasks on three different groups, depending on their difficulty, and after this, searching associative rules among them, which will help to define the time necessary to perform specific task by specific developer
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • SIDH hybrid schemes with a classical component based on the discrete
           logarithm problem over finite field extension

    • Authors: Michał Jakub Wroński, Elżbieta Burek, Łukasz Dzierzkowski
      Pages: 431 - 441
      Abstract: The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over $\Fpn$, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields $\Fp, \Fpd, \Fpc, \Fps$ and $\Fpo$, for primes $p$ used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Using SAT solvers to finding short cycles in cryptographic algorithms

    • Authors: Władysław Dudzic, Krzysztof Kanciak
      Pages: 443 - 448
      Abstract: A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and nonlinear feedback shift registers (NLFSR) and their combination. It is currently known how to construct LFSR to generate a bit sequence with a maximum period, but there is no such knowledge in the case of NLFSR. The latter would be useful in cryptography application (to have a few taps and relatively low algebraic degree). In this article, we propose a simple method based on the generation of algebraic equations to describe iterated cryptographic algorithms and find their solutions using an SAT solver to exclude short cycles in algorithms such as stream ciphers or nonlinear feedback shift register (NLFSR). Thanks to the use of AIG graphs, it is also possible to fully automate our algorithm, and the results of its operation are comparable to the results obtained by manual generation of equations. We present also the results of experiments in which we successfully found short cycles in the NLFSRs used in KSG, Grain-80, Grain-128 and Grain-128a stream ciphers and also in stream ciphers Bivium and Trivium (without constants used in the initialization step).
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Towards an auditable cryptographic access control to high-value sensitive
           data

    • Authors: Krzysztof Kanciak, Konrad Wrona
      Pages: 449 - 458
      Abstract: We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world.
      In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject's privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Simple verification of completeness of two addition formulas on twisted
           Edwards curves

    • Authors: Robert Dryło, Tomasz Kijko
      Pages: 459 - 464
      Abstract: Daniel Bernstein and Tanja Lange  proved that
      two given addition formulas on twisted Edwards elliptic curves
      ax^2 + y^2 = 1 + dxy are complete (i.e. the sum of any two points
      on a curve can be computed using one of these formulas). In
      this paper we give other simple verification of completeness
      of these formulas using for example Groebner bases and an ¨
      algorithm implemented in Magma, which is based on the fact that
      completeness means that some systems of polynomial equations
      have no solutions. This method may be also applied to verify
      completeness  of additions formulas on other models of elliptic
      curves.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Optimal strategies for computation of degree $\ell^n$ isogenies for SIDH

    • Authors: Michał Jakub Wroński, Andrzej Bolesław Chojnacki
      Pages: 465 - 472
      Abstract: This article presents methods and algorithms for the computation of isogenies of degree $\ell^n$. Some of these methods are obtained using recurrence equations and generating functions. A standard multiplication based algorithm for computation of isogeny of degree $\ell^n$ has time complexity equal to $O(n^2 M \left(n \log{n} \right) )$, where $M(N)$ denotes the cost of integers of size $N$ multiplication. The memory complexity of this algorithm is equal to $O\left( n \log{\left( n \log{(n)} \right)} \right)$. In this article are presented algorithms for:\begin{itemize}\item determination of optimal strategy for computation of degree $\ell^n$ isogeny,\item determination of cost of optimal strategy of computation of $\ell^n$ isogeny using solutions of recurrence equations,\item determination of cost of optimal strategy of computation of $\ell^n$ isogeny using recurrence equations,\end{itemize}where optimality in this context means that, for the given parameters, no other strategy exists that requires fewer operations for faster computation of isogeny. Also this article presents a method using generating functions for obtaining the solutions of sequences $\left( u_m \right)$ and $\left( c_m \right)$ where $c_m$ denotes the cost of computations of isogeny of degree $\ell^{u_m}$ computations for given costs $p,q$ of $\ell$-isogeny computation and $\ell$-isogeny evaluation. These solutions are also used in the construction of the algorithms presented in this article.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Improving security of existentially unforgeable signature schemes

    • Authors: Mariusz Jurkiewicz
      Pages: 473 - 480
      Abstract: In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable signature scheme based on pairings, which satisfies all assumptions of the first part and is able to be subjected to transformation.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Impact of IT equipment location in buildings on electromagnetic safety

    • Authors: Leszek Nowosielski
      Pages: 481 - 486
      Abstract: The attenuation of the signal introduced by the propagation path between the source of the compromising emanation (the location of secured IT equipment) and the location of the antenna of the potential infiltrating system has a direct influence on the electromagnetic safety of IT equipment. The article presents original analytical relationships necessary to estimate the attenuation values introduced by the propagation path of the potential compromising emanation signal, which correspond to the most probable locations of IT equipment in relation to the location of the potential infiltrating system. The article analyzes identified by the author various location scenarios for IT equipment, which is a potential source of compromising emanation, with a potential infiltrating system positioned inside or outside the building, in which said IT equipment is located. The aforementioned scenarios are characterized by the lowest attenuation of the propagation path of potential compromising emanation generated by the secured IT equipment and provide for location masking of the potential infiltrating system. Example design of protective solutions for IT equipment elaborated by article author in the form of a shielding enclosure is presented in the article too.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Modelling the one channel systems of a delivery of goods provided by
           unmanned aerial vehicles

    • Authors: Roman N. Kvyetnyy, Yaroslav Kulyk, Bohdan Knysh, Yuryy Ivanov, Andrzej Smolarz, Orken Mamyrbaev, Aimurat Burlibayev
      Pages: 487 - 492
      Abstract: In this article is revealed the systems of a good delivery witch implement unmanned aerial vehicles during providing the service. the one channel systems of a goods delivery are a goal of this research work. the close analysing of their functional features, the classification, the types and parameters of different systems from this band are presented. in addition, the modelling of the different types of the one channel systems of goods delivery are has done.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Optimization Model of Adaptive Decision Taking Support System for
           Distributed Systems Cyber Security Facilities Placement

    • Authors: Aliya Kalizhanova, Sultan Akhmetov, Valery Lakhno, Waldemar Wojcik, Gulnaz Nabiyeva
      Pages: 493 - 498
      Abstract: Abstract— An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cybersecurity facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection and cybersecurity systems in different versions. It is possible to consider, how separate elements, influence at DCN protection factors and their combinations. Offered model, in distinction from existing, has allowed implementing both the principles of information protection equivalency to a concrete threat and a system complex approach to forming a highly effective protection system for DCN. Hereby we have presented the outcomes of computational experiments on selecting the rational program algorithm of implementing the developed optimization model. It has been offered to use genetic algorithm modification (GAM). Based on the offered model, there has been implemented the module for adaptive DTSS. DTSS module might be applied upon designing protected DCN, based on preset architecture and available sets of information protection and cybersecurity systems in the network.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Security assessment methodology for isolated systems of a certain class

    • Authors: Daniel Wiechecki
      Pages: 499 - 505
      Abstract: This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Further Discussion on Modeling of Measuring Process via Sampling of
           Signals

    • Authors: Andrzej Marek Borys
      Pages: 507 - 513
      Abstract: In this paper, we continue a topic of modeling measuring processes by perceiving them as a kind of signal sampling. And, in this respect, note that an ideal model was developed in a previous work. Whereas here, we present its nonideal version. This extended model takes into account an effect, which is called averaging of a measured signal. And, we show here that it is similar to smearing of signal samples arising in nonideal signal sampling. Furthermore, we demonstrate in this paper that signal averaging and signal smearing mean principally the same, under the conditions given. So, they can be modeled in the same way. A thorough analysis of errors related to the signal averaging in a measuring process is given and illustrated with equivalent schemes of the relationships derived. Furthermore, the results obtained are compared with the corresponding ones that were achieved analyzing amplitude quantization effects of sampled signals used in digital techniques. Also, we show here that modeling of errors related to signal averaging through the so-called quantization noise, assumed to be a uniform distributed random signal, is rather a bad choice. In this paper, an upper bound for the above error is derived. Moreover, conditions for occurrence of hidden aliasing effects in a measured signal are given.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • A simple nonlinear companding transform for nonlinear compensation of
           direct-detection optical OFDM systems

    • Authors: Thu Trang Ngo, Duc Nhan Nguyen
      Pages: 515 - 520
      Abstract: In direct-detection OFDM systems, the nonlinear effects caused by optical modulation and fiber transmission can degrade the system performance severely. In this study, we propose a new nonlinear companding transform to improve the performance of direct detection optical OFDM transmission systems. The demonstration is realized by Monte-Carlo simulation of the intensity modulation and direct-detection DCO-OFDM optical transmission system at 40 Gbps over a 80 km of standard single mode fiber link. The influence of the companding parameters on the performance of system in different nonlinear transmission conditions has been investigated via simulation.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Θ(1) Time Algorithm for Master Selection in Ad-hoc Wireless Networks

    • Authors: Mohammed El Khattabi, Jelloul Elmesbahi, Mohammed Khaldoun, Ahmed Errami, Omar Bouattane
      Pages: 521 - 527
      Abstract: This paper details a hardware implementation of a distributed Θ(1) time algorithm allows to select dynamically the master device in ad-hoc or cluster-based networks in a constant time regardless the number of devices in the same cluster. The algorithm allows each device to automatically detect its own status; master or slave; based on identifier without adding extra overheads or exchanging packets that slow down the network. We propose a baseband design that implements algorithm functions and we detail the hardware implementation using Matlab/Simulink and Ettus B210 USRP. Tests held in laboratory prove that algorithm works as expected.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Power Scaling and Antenna Selection Techniques for Hybrid Beamforming in
           mmWave Massive MIMO Systems

    • Authors: Abdul Haq Nalband, Mrinal Sarvagya, Mohammed Riyaz Ahmed
      Pages: 529 - 535
      Abstract: With the advent of massive MIMO and mmWave, Antenna selection is the new frontier in hybrid beamforming employed in 5G base stations. Tele-operators are reworking on the components while upgrading to 5G where the antenna is a last-mile device. The burden on the physical layer not only demands smart and adaptive antennas but also an intelligent antenna selection mechanism to reduce power consumption and improve system capacity while degrading the hardware cost and complexity. This work focuses on reducing the power consumption and finding the optimal number of RF chains for a given millimeter wave massive MIMO system. At first, we investigate the power scaling method for both perfect Channel State Information (CSI) and imperfect CSI where the power is reduced by 1/number of antennas and 1/square root (number of antennas) respectively. We further propose to reduce the power consumption by emphasizing on the subdued resolution of Analog-to-Digital Converters (ADCs) with quantization awareness. The proposed algorithm selects the optimal number of antenna elements based on the resolution of ADCs without compromising on the quality of reception. The performance of the proposed algorithm shows significant improvement when compared with conventional and random antenna selection methods.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Properties of a wireless mesh network constructed with the use of IQRF
           modules in the indoor environment

    • Authors: Sławomir Pluta, Patryk Roszkowski
      Pages: 537 - 544
      Abstract: The subject of the article is the design and practical implementation of the wireless mesh network. IQRF radio modules were used for the network design. The IQRF® technique has enabled the construction of a mesh network with the possibility of reconfiguration. The theoretical part contains a description of the IQRF® hardware solutions used. The practical scope includes the design part, where the configuration of the radio modules was carried out and the parameters of the radio network were set to allow its implementation in various topologies. Then, a wireless network consisting of 10 IQRF modules was launched in the P3 building of the Opole University of Technology. At this stage, configured radio modules were placed in selected rooms on all five floors of the building in order to carry out tests of the radio network constructed in this way. The tests included measuring the packet transmission delay time as well as the received signal strength. Research was carried out for several network topologies.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Fixed-latency system for high-speed serial transmission between FPGA
           devices with Forward Error Correction

    • Authors: Michał Kruszewski, Wojciech Marek Zabołotny
      Pages: 545 - 553
      Abstract: This paper presents the design of a compact pro-
      tocol for fixed-latency, high-speed, reliable, serial transmission
      between simple field-programmable gate arrays (FPGA) devices.
      Implementation of the project aims to delineate word boundaries,
      provide randomness to the electromagnetic interference (EMI)
      generated by the electrical transitions, allow for clock recov-
      ery and maintain direct current (DC) balance. An orthogonal
      concatenated coding scheme is used for correcting transmission
      errors using modified Bose–Chaudhuri–Hocquenghem (BCH)
      code capable of correcting all single bit errors and most of
      the double-adjacent errors. As a result all burst errors of a
      length up to 31 bits, and some of the longer group errors,
      are corrected within 256 bits long packet. The efficiency of the
      proposed solution equals 46.48%, as 119 out of 256 bits are
      fully available to the user. The design has been implemented
      and tested on Xilinx Kintex UltraScale+ KCU116 Evaluation Kit
      with a data rate of 28.2 Gbps. Sample latency analysis has also
      been performed so that user could easily carry out calculations
      for different transmission speed. The main advancement of the
      work is the use of modified BCH(15, 11) code that leads to high
      error correction capabilities for burst errors and user friendly
      packet length.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Application of the averaged model of the diode-transistor switch for
           modelling characteristics of a boost converter with an IGBT

    • Authors: Paweł Górecki
      Pages: 555 - 560
      Abstract: DC-DC converters are popular switch-mode electronic circuits used in power supply systems of many electronic devices. Designing such converters requires reliable computation methods and models of components contained in these converters, allowing for accurate and fast computations of their characteristics. In the paper, a new averaged model of a diode-transistor switch containing an IGBTis proposed. The form of the developed model is presented. Its accuracy is verified by comparing the computed characteristics of the boost converter with the characteristics computed in SPICE using a transient analysis and literature models of a diode and an IGBT. The obtained results of computations proved the usefulness of the proposed model.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Determination of the Optimal Threshold Value and Number of Keypoints in
           Scale Invariant Feature Transform-based Copy-Move Forgery Detection

    • Authors: R Rizal Isnanto, Ajub Ajulian Zahra, Imam Santoso, Muhammad Salman Lubis
      Pages: 561 - 569
      Abstract: The copy-move forgery detection (CMFD) begins with the preprocessing until the image is ready to process. Then, the image features are extracted using a feature-transform-based extraction called the scale-invariant feature transform (SIFT). The last step is features matching using Generalized 2 Nearest-Neighbor (G2NN) method with threshold values variation. The problem is what is the optimal threshold value and number of keypoints so that copy-move detection has the highest accuracy. The optimal threshold value and number of keypoints had determined so that the detection has the highest accuracy. The research was carried out on images without noise and with Gaussian noise.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Efficient H.264 intra Frame CODEC with Best prediction matrix mode
           algorithm

    • Authors: Sara Hamdy, Abdelhalim Zekry, Wael A. Mohamed
      Pages: 571 - 582
      Abstract: The continuous growth of smart communities and everincreasing
      demand of sending or storing videos, have led to
      consumption of huge amount of data. The video compression
      techniques are solving this emerging challenge. However, H.264
      standard can be considered most notable, and it has proven to meet
      problematic requirements. The authors present (BPMM) as a novel
      efficient Intra prediction scheme. We can say that the creation of our
      proposed technique was in a phased manner; it's emerged as a
      proposal and achieved impressive results in the performance
      parameters as compression ratios, bit rates, and PSNR. Then in the
      second stage, we solved the challenges of overcoming the obstacle of
      encoding bits overhead. In this research, we try to address the final
      phase of the (BPMM) codec and to introduce our approach in a global
      manner through realization of decoding mechanism. For evaluation of
      our scheme, we utilized VHDL as a platform. Final results have
      proven our success to pass bottleneck of this phase, since the decoded
      videos have the same PSNR that our encoder tells us, while
      preserving steady compression ratio treating the overhead. We aspire
      our BPMM algorithm will be adopted as reference design of H.264 in
      the ITU.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Development of Speaker Voice Identification Using Main Tone Boundary
           Statistics for Applying To Robot-Verbal Systems

    • Authors: Yedilkhan Amirgaliyev, Timur Musabayev, Didar Yedilkhan, Waldemar Wojcik, Zhazira Amirgaliyeva
      Pages: 583 - 588
      Abstract: Abstract—Hereby there is given the speaker identification basic system. There is discussed application and usage of the voice interfaces, in particular, speaker voice identification upon robot and human being communication. There is given description of the information system for speaker automatic identification according to the voice to apply to robotic-verbal systems. There is carried out review of algorithms and computer-aided learning libraries and selected the most appropriate, according to the necessary criteria, ALGLIB. There is conducted the research of identification model operation performance assessment at different set of the fundamental voice tone. As the criterion of accuracy there has been used the percentage of improperly classified cases of a speaker identification.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
  • Filtering Property of Signal Sampling in General and Under-Sampling as a
           Specific Operation of Filtering Connected with Signal Shaping at the Same
           Time

    • Authors: Andrzej Marek Borys
      Pages: 589 - 594
      Abstract: In this paper, we show that signal sampling operation can be considered as a kind of all-pass filtering in the time domain, when the Nyquist frequency is larger or equal to the maximal frequency in the spectrum of a signal sampled. We demonstrate that this seemingly obvious observation has wide-ranging implications. They are discussed here in detail. Furthermore, we discuss also signal shaping effects that occur in the case of signal under-sampling. That is, when the Nyquist frequency is smaller than the maximal frequency in the spectrum of a signal sampled. Further, we explain the mechanism of a specific signal distortion that arises under these circumstances. We call it the signal shaping, not the signal aliasing, because of many reasons discussed throughout this paper. Mainly however because of the fact that the operation behind it, called also the signal shaping here, is not a filtering in a usual sense. And, it is shown that this kind of shaping depends upon the sampling phase. Furthermore, formulated in other words, this operation can be viewed as a one which shapes the signal and performs the low-pass filtering of it at the same time. Also, an interesting relation connecting the Fourier transform of a signal filtered with the use of an ideal low-pass filter having the cut frequency lying in the region of under-sampling with the Fourier transforms of its two under-sampled versions is derived. This relation is presented in the time domain, too.
      PubDate: 2020-09-07
      Issue No: Vol. 66, No. 3 (2020)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.228.10.17
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-