Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 49
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Beamforming training (BT) is considered as an essential process to accomplish the communications in the millimeter wave (mmWave) band, i.e., 30 ~ 300 GHz. This process aims to find out the best transmit/receive antenna beams to compensate the impairments of the mmWave channel and successfully establish the mmWave link. Typically, the mmWave BT process is highly-time consuming affecting the overall throughput and energy consumption of the mmWave link establishment. In this paper, a machine learning (ML) approach, specifically reinforcement learning (RL), is utilized for enabling the mmWave BT process by modeling it as a multi-armed bandit (MAB) problem with the aim of maximizing the long-term throughput of the constructed mmWave link. Based on this formulation, MAB algorithms such as upper confidence bound (UCB), Thompson sampling (TS), epsilon-greedy (e-greedy), are utilized to address the problem and accomplish the mmWave BT process. Numerical simulations confirm the superior performance of the proposed MAB approach over the existing mmWave BT techniques.
Go to article

Authors and Affiliations

Ehab Mahmoud Mohamed
1 2

  1. Electrical Engineering Dept., College of Engineering, Prince Sattam Bin Abdulaziz University, Wadi Aldwaser 11991, Saudi Arabia
  2. Electrical Engineering Dept., Faculty of Engineering Aswan University, Aswan 81542, Egypt
Download PDF Download RIS Download Bibtex

Abstract

In nuclear facilities, the reading of the sensors is very important in the assessments of the system state. The existence of an abnormal state could be caused by a failure in the sensor itself instead of a failure in the system. So, being unable to identify the main cause of the “abnormal state” and take proper actions may end in unnecessary shutdown for the nuclear facility that may have expensive economic consequences. That is why, it is extremely important for a supervision and control system to identify the case where the failure in the sensor is the main cause for the existence of an abnormal state. In this paper, a system based on a wireless sensor network is proposed to monitor the radiation levels around and inside a nuclear facility. A new approach for validating the sensor readings is proposed and investigated using the Castalia simulator.
Go to article

Authors and Affiliations

Mohamed Yehia Habash
1
Nabil Mohamed Abd Elfatah Ayad
1
Abd Elhady Abd Elazim Ammar
2

  1. Nuclear Research Center, Egyptian Atomic Energy Authority, Egypt
  2. Electrical Engineering Dept., Faculty of Engineering, Al azhar University, Egypt
Download PDF Download RIS Download Bibtex

Abstract

The validation of the measurements quality after on-site diagnostic system installation is necessary in order to provide reliable data and output results. This topic is often neglected or not discussed in detail regarding measurement systems. In the paper recently installed system for soft X-ray measurements is described in introduction. The system is based on multichannel GEM detector and the data is collected and sent in special format to PC unit for further postprocessing. The unique feature of the system is the ability to compute final data based on raw data only. The raw data is selected upon algorithms by FPGA units. The FPGAs are connected to the analog frontend of the system and able to register all of the signals and collect the useful data. The interface used for data streaming is PCIe Gen2 x4 for each FPGA, therefore high throughput of the system is ensured. The paper then discusses the properties of the installation environment of the system and basic functionality mode. New features are described, both in theoretical and practical approach. New modes correspond to the data quality monitoring features implemented for the system, that provide extra information to the postprocessing stage and final algorithms. In the article is described also additional mode to perform hardware simulation of signals in a tokamak-like environment using FPGAs. The summary describes the implemented features of the data quality monitoring features and additional modes of the system.
Go to article

Authors and Affiliations

Andrzej Wojenski
1
Paweł Linczuk
1
Piotr Kolasinski
1
Maryna Chernyshova
2
Didier Mazon
3
Grzegorz Kasprowicz
1
Krzysztof T. Pozniak
1
Michał Gaska
1
Tomasz Czarski
2
Rafał Krawczyk
1 4

  1. Warsaw University of Technology, Institute of Electronics Systems, Poland
  2. Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland
  3. CEA, Saint-Paul-lez-Durance, France
  4. CERN, Geneva, Switzerland
Download PDF Download RIS Download Bibtex

Abstract

A novel approach to a trigger mode in the Gas Electron Multiplier (GEM) detector readout system is presented. The system is already installed at WEST tokamak. The article briefly describes the architecture of the GEM detector and the measurement system. Currently the system can work in two trigger modes: Global Trigger and Local Trigger. All trigger processing blocks are parts of the Charge Signal Sequencer module which is responsible for transferring data to the PC. Therefore, the article presents structure of the Sequencer with details about basic blocks, theirs functionality and output data configuration. The Sequencer with the trigger algorithms is implemented in an FPGA chip from Xilinx. Global Trigger, which is a default mode for the system, is not efficient and has limitations due to storing much data without any information. Local trigger which is under tests, removes data redundancy and is constructed to send only valid data, but the rest of the software, especially on the PC side, is still under development. Therefore authors propose the trigger mode which combines functionality of two existing modes. The proposed trigger, called Zero Suppression Trigger, is compatible with the existing interfaces of the PC software, but is also capable to verify and filter incoming signals and transfer only recognized events. The results of the implementation and simulation are presented.
Go to article

Authors and Affiliations

Piotr Kolasinski
1
Krzysztof Pozniak
1
Andrzej Wojenski
1
Paweł Linczuk
2
Rafał Krawczyk
1 3
Michał Gaska
1
Wojciech Zabolotny
1
Grzegorz Kasprowicz
1
Maryna Chernyshova
4
Tomasz Czarski
4

  1. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  2. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  3. CERN, Geneva, Switzerland
  4. Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article herein presents a new technique of controlling the system of collecting, storing and processing the information from the solar collectors, which might be applied to heating the industrial and domestic compartments for hot water supply. The most profitable usage of the solar collectors in the industry is replacement of a human interference with wireless sensor nets. The solar collector standard system consumes in average 30% of the heat due to poor control and configuration. Our monitoring and control system allows upgrade the performance of heating the industrial and domestic premises by means of solar collector for hot water supply.
Go to article

Authors and Affiliations

Waldemar Wojcik
1
Yedilhan Amirgaliyev
2
Murat Kunelbayev
2
Aliya Kalizhanova
2
Ainur Kozbakova
2
Talgat Sundetov
Didar Yedilkhan
3

  1. Lublin Technical University, Poland
  2. Institute of Information and Computational Technologies CS MES RK, Al-Farabi Kazakh National University
  3. Institute of Information and Computational Technologies CS MES RK, Astana IT University
Download PDF Download RIS Download Bibtex

Abstract

The paper discusses the characteristics of spatial electromagnetic noise generators, as well as the formation of a broadband noise signal. A number of well-known methods for assessing the quality of masking noise interference and the approaches used in them have been described. Approaches to the measurement of masking noise were also determined in assessing their quality. In conclusion, additional methods are proposed for assessing the quality of masking noises, such as searching for correlation of noise in different frequency sub-bands and using statistical and (or) graphical methods (tests) for randomness.
Go to article

Authors and Affiliations

Nurzhigit Smailov
1
Askhat Batyrgaliyev
1
Ainur Akhmediyarova
2
Nurgul Seilova
1
Madina Koshkinbayeva
3
Moldir Baigulbayeva
4
Ryszard Romaniuk
5
Maxat Orunbekov
6
Kabdoldina Assem
4
Andrzej Kotyra
7

  1. Satpayev University, 050000 Almaty, Kazakhstan
  2. Institute of Information and Computational Technology, 050010 Almaty, Kazakhstan
  3. Miras University, 160012 Shymkent, Kazakhstan
  4. Al-Farabi Kazakh National University, 050040 Almaty, Kazakhstan
  5. Warsaw University of Technology, Poland
  6. Kazakh Academy of Transport and Communications named after M.Tynyshpayev, Almaty, Kazakhstan
  7. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper, it has been shown that the spectrum aliasing and folding effects occur only in the case of non-ideal signal sampling. When the duration of the signal sampling is equal to zero, these effects do not occur at all. In other words, the absolutely necessary condition for their occurrence is just a nonzero value of this time. Periodicity of the sampling process plays a secondary role.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Department of Marine Telecommunications, Faculty of Electrical Engineering, Gdynia Maritime University, Gdynia, Poland
Download PDF Download RIS Download Bibtex

Abstract

A new model of ideal signal sampling operation is developed in this paper. This model does not use the Dirac comb in an analytical description of sampled signals in the continuous time domain. Instead, it utilizes functions of a continuous time variable, which are introduced in this paper: a basic Kronecker time function and a Kronecker comb (that exploits the first of them). But, a basic principle behind this model remains the same; that is it is also a multiplier which multiplies a signal of a continuous time by a comb. Using a concept of a signal object (or utilizing equivalent arguments) presented elsewhere, it has been possible to find a correct expression describing the spectrum of a sampled signal so modelled. Moreover, the analysis of this expression showed that aliases and folding effects cannot occur in the sampled signal spectrum, provided that the signal sampling is performed ideally.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Department of Marine Telecommunications, Faculty of Electrical Engineering, Gdynia Maritime University, Gdynia, Poland
Download PDF Download RIS Download Bibtex

Abstract

The aim of the work is to present the method for designing sparse FIR filters with very low group delay and approximately linear-phase in the passband. Significant reduction of the group delay, e.g. several times in relation to the linear phase filter, may cause the occurrence of undesirable overshoot in the magnitude frequency response. The method proposed in this work consists of two stages. In the first stage, FIR filter with low group delay is designed using minimax constrained optimization that provides overshoot elimination. In the second stage, the same process is applied iteratively to reach sparse solution. Design examples demonstrate the effectiveness of the proposed method.
Go to article

Authors and Affiliations

Jacek Konopacki
1

  1. Faculty of Automatic Control, Electronics and Computer Sciences, Silesian University of Technology
Download PDF Download RIS Download Bibtex

Abstract

The paper presents improvements of the developed system for hot plasma radiation measurement in the soft Xray range based on a Gas Electron Multiplier (GEM) detector. Scope of work consists of a new solution for handling hardware time-synchronization with tokamak systems needed for better synchronization with other diagnostics and measurement quality. The paper describes the support of new modes of triggering on PC-side. There are communication and data path overview in the system. The new API is described, which provide separate channels for data and control and is more robust than the earlier solution. Work concentrates on stability and usability improvements of the implemented device providing better usage for end-user.
Go to article

Authors and Affiliations

Paweł Linczuk
1
Andrzej Wojenski
2
Piotr Kolasinski
2
Rafał Krawczyk
2 3
Wojciech Zabolotny
2
Krzysztof Pozniak
2
Maryna Chernyshova
4
Tomasz Czarski
4
Michał Gaska
2
Grzegorz Kasprowicz
2
Karol Malinowski
4

  1. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  2. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  3. CERN, Geneva, Switzerland
  4. Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

On the basis of a unipolar corona discharge, a method of non-contact and continuous measurement of linear parameters of thin and ultra-thin dielectric fibres and optical fibres (10 to 125 microns) in the process of their manufacture was developed. The measurement method differs from the commonly known methods by high accuracy and reliability of measurement and resistance to changes in the electrical characteristics of the discharge gap and the state of ambient air.
Go to article

Authors and Affiliations

Aliya S. Tergeussizova
1
Shabden A. Bakhtaev
2
Waldemar Wojcik
3
Ryszard Romaniuk
4
Bekmurza H. Aitchanov
5
Gulzada D. Mussapirova
2
Aynur Zh. Toygozhinova
6

  1. Kazakh National University named after al-Farabi, Almaty, Kazakhstan
  2. Almaty University of Power Engineering and Telecommunications, Almaty, Kazakhstan
  3. Lublin Technical University, Poland
  4. Warsaw University of Technology, Poland
  5. Suleyman Demirel University, Almaty, Kazakhstan
  6. Kazakh Academy of Transport and Communications named after M.Tynyshpayev, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a predeveloped S-box tested against differential and linear cryptanalysis. The S-box is consistent with one of the known standards AES and GOST R 34.12-2015. We provide the findings of an avalanche-effect investigation and statistical properties of ciphertexts. The algorithm actually meets the avalanche-effect criterion even after the first round.
Go to article

Authors and Affiliations

Rustem G. Biyashev
1
Nursulu A. Kapalova
1
Dilmuhanbet S. Dyusenbayev
1
Kunbolat T. Algazy
1
Waldemar Wojcik
2
Andrzej Smolarz
2

  1. Institute of Information and Computational Technologies of the Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty
  2. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
Go to article

Authors and Affiliations

Romuald Hoffmann
1

  1. Institute of Computer and Information Systems, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper presents an original architecture and implementation of 9-bit Linearized Pulse Width Modulator (LPWM) for Class-BD amplifier, based on the hybrid method using STM32 microcontroller and Programmable Tapped Delay Line (PTDL). The analog input signals are converted into 12-bit PCM signals, then are directly transformed into 32-bit LBDD DPWM data of the pulse-edge locations within n-th period of the switching frequency, next requantized to the 9-bit digital outputs, and finally converted into the two physical trains of 1-bit PWM signals, to control the output stage of the Class-BD audio amplifier. The hybrid 9-bit quantizer converts 6 MSB bits using counter method, based on the peripherals of STM32 microcontroller, while the remaining 3 LSB bits - using a method based on the PTDL. In the paper extensive verification of algorithm and circuit operation as well as simulation in MATLAB and experimental results of the proposed 9-bit hybrid LBDD DPWM circuit have been performed. It allows to attain SNR of 80 dB and THD about 0,3% within the audio baseband.
Go to article

Authors and Affiliations

Wojciech Kołodziejski
1
Stanisław W. Kuta
1

  1. University of Applied Sciences in Tarnow, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this article the author makes an attempt to characterize the main factor – mobility – which is to be taken into consideration while designing the ground radar component (passive and active radars) of the Air Defense systems in order to enable them to operate on the contemporary battlefield. He presents the latest theoretical views on the relationship between the usage of anti-radiation missiles and the mobility of the passive and active radars as the key ability to protect them against such weapons. In particular the author emphasizes that the antiradiation missiles present nowadays the biggest threat for the effective Air Defense systems, which are today characterized by a high complexity degree. He also stresses the need to combine the radars, both passive and active, into one system allowing for the streamlining of their work parameters and thus ensuring their complex usage. The gaining of those capabilities shall guarantee that the parameters of the air surveillance radar area can be defined effectively.
Go to article

Authors and Affiliations

Stanisław Czeszejko
1

  1. General Command Polish Armed Forces, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper explores shifts and turns that over the centuries have influenced moral thinking and instructing on moral matters within the Roman Catholic tradition. The purpose of this exploration is to shed light on the current status of moral theology and identify areas for future developments. The paper proposes ‘ecclesial ethics’ as one of such areas. It views moral theology as a dynamic discipline, shaped by the pressures, invitations and demands of the day. It claims that for moral theology to be relevant today, some fundamental questions (including the purpose of the discipline) must be revisited. It argues that practical realities in the lives of individuals, communities and the Church as well as the Planet must be at the forefront of moral theological considerations. Contemporary moral theologians and/or theological ethicists (the paper considers this distinction) are a diverse and, we dare to add, divided group. The paper argues that building bridges in a polarised world (including the world of moral theology) needs to be a priority. The overall aim of this study is to respond positively to the call for the renewal of moral theology as voiced in the ‘Decree on Priestly Formation’ of the Second Vatican Council and in several statements made by Pope Francis.
Go to article

Authors and Affiliations

Anna Abram
1

  1. Margaret Beaufort Institute of Theology in Cambridge/Great Britain
Download PDF Download RIS Download Bibtex

Abstract

The late Trappist monk and prolific author, Thomas Merton, was intensely concerned with the self – or to be more precise, with the desire to break free from the tyranny of the self he took to be his identity. His early years in France and England were marked by a sense of loss and dislocation. After leaving Cambridge for Columbia, his subsequent life in America and decision to be baptised a Catholic at the age of 23 eventually led to his taking vows as a Cistercian monk. On taking the name Frater Louis, the ‘world’ with all its temptations and unresolved issues had been left safely behind along with his old identity. Or so he thought. In fact, Merton’s years as a Trappist led to a best-selling autobiography written under obedience to his abbot and many more books to follow. Compared at the time of its publication to St Augustine’s Confessions, the autobiography led to his international renown as Thomas Merton. He voiced his disquiet over what he called ‘this shadow, this double, this writer who […] followed me into the cloister … I cannot lose him.’ In time, Merton came to the realisation – through the lived experience and voracious reading of the Bible, St Augustine, the mystics, the individuation process propounded by Jung, Zen Buddhism and others – that the ‘self’ he was trying to escape was, in fact, largely a ‘false’ self driven by the ego. This paper traces Merton’s journey from that self to the authentic self which is found in God, and in transcendence. Obsession with ‘the self’ as understood in the 21st century makes the study of Merton’s path to selfhood much more vital. The advent of the ‘Selfie’, the self-promotion that social media afford and the examples of narcissistic individuals in positions of power give the lie to the lives in which self-consciousness is confused with self-realisation. Nothing, as Merton discovered, could be further from the truth.
Go to article

Authors and Affiliations

Susanne Caroline Rose Jennings
1
ORCID: ORCID

  1. University of Cambridge
Download PDF Download RIS Download Bibtex

Abstract

The custom of burying the dead is not merely commonly accepted by the Christianity way of disposal of the human body after death. It is most deeply rooted and perfectly expressing Christian anthropology, revealed in the Holy Scriptures as a consequence of original sin, a sign of hope in the resurrection, and imitation of Christ, who was buried in the tomb. In the Catholic view, the burial is a corporal work of mercy, an act of care for the dead and their loved ones. Gaining popularity the practice of cremation is accepted by the Church for the sake of hygiene, economy, or community. Human remains, also in the form of ashes, always must be buried or placed in the columbarium. The Church does not allow human body disposal by resomation or promession. Alternative forms of memorializing the deceased, though attractive esthetically and sentimentally, are not only outlandish in Christian culture, but also contrary to the Christian teaching on origins, nature, and destination of the human person.
Go to article

Authors and Affiliations

Ks. Tadeusz Zadorożny
1

  1. Plainfield, Stany Zjednoczone

Authors and Affiliations

Ks. prof. dr hab. Krzysztof Pawlina
Download PDF Download RIS Download Bibtex

Abstract

The aim of the article is to show the inculturation of faith and the popular religiosity as the context in which Pope Francis’ Marian spirituality and Mariology have been shaped. Inculturation of faith began in South America with Mary’s apparition in Guadalupe in 1531, however, the theological reflection on the importance of evangelization of culture and popular piety developed in South America only after the Second Vatican Council. The milestones in its development are two Conferences of CELAM: in Puebla in 1979 and in Aparecida in 2007. Moreover, the emergence of Argentinean theology of the people in the 1970s played also an important role in its development. Pope Francis, in his programmatic apostolic exhortation Evangelii gaudium emphasized Mary’s place in popular piety and her role in preaching the Gospel.
Go to article

Authors and Affiliations

Ks. Janusz Bujak
1
ORCID: ORCID

  1. Uniwersytet Szczeciński

This page uses 'cookies'. Learn more