Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920376
J. Romanik, P. Kaniewski, K. Zubel, E. Golan, P. Grądzki
In this paper we discuss the influence of the wind farms on the quality of VHF tactical links. To investigate this, a series of field tests were carried out in the real environment with VHF radios deployed in the area where wind turbines were installed. We present the results of bit error rate measurements for various deployments of radios. These tests used manpack radios operating very close to or within the wind farm area. The analysis of the results confirmed that the wind farms deteriorate the quality of VHF communication. This degradation may be significant in some cases.
{"title":"Investigation of the Potential Influence of Wind Farms on the VHF Tactical Links Performance","authors":"J. Romanik, P. Kaniewski, K. Zubel, E. Golan, P. Grądzki","doi":"10.23919/NTSP54843.2022.9920376","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920376","url":null,"abstract":"In this paper we discuss the influence of the wind farms on the quality of VHF tactical links. To investigate this, a series of field tests were carried out in the real environment with VHF radios deployed in the area where wind turbines were installed. We present the results of bit error rate measurements for various deployments of radios. These tests used manpack radios operating very close to or within the wind farm area. The analysis of the results confirmed that the wind farms deteriorate the quality of VHF communication. This degradation may be significant in some cases.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920380
Matej Adamec, M. Turčaník
Malware detection and prevention is a cornerstone of computer security. Without proper computer security our data would be vulnerable and at risk of leak. Each malicious program performs a certain activity that we are able to describe in machine code. By converting machine code to visual form, may be a way to detect hidden malicious structures which would not be detectable in plain text machine code form. A Convolutional Neural Network (CNN) takes an image as input and returns the class to which it belongs. Classifying generated visualized machine code with CNN into the respective groups is a main task. At first, we will create generators of source machine code. Later on, we will define what is signature and how it differs from a normal source code. Last but not least we will modify signatures by adding redundant idle machine code instructions. Our overall task will be to classify code by its signature.
{"title":"Malware Signatures Detection with Neural Networks","authors":"Matej Adamec, M. Turčaník","doi":"10.23919/NTSP54843.2022.9920380","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920380","url":null,"abstract":"Malware detection and prevention is a cornerstone of computer security. Without proper computer security our data would be vulnerable and at risk of leak. Each malicious program performs a certain activity that we are able to describe in machine code. By converting machine code to visual form, may be a way to detect hidden malicious structures which would not be detectable in plain text machine code form. A Convolutional Neural Network (CNN) takes an image as input and returns the class to which it belongs. Classifying generated visualized machine code with CNN into the respective groups is a main task. At first, we will create generators of source machine code. Later on, we will define what is signature and how it differs from a normal source code. Last but not least we will modify signatures by adding redundant idle machine code instructions. Our overall task will be to classify code by its signature.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920400
Miroslav Matejček, M. Šostronek
This article deals with a proposal of low-pass filter based on the microcontroller ATmega328 of the Arduino Uno platform. In the introduction we deal with theory of analog low-pass filter design, discrete low-pass filters, their advantages, and disadvantages. Digital filter design principle is shortly explained on a digital low-pass filter. The method of analog prototype filters was used. The transformation of an analog low-pass filter into the discrete low-pass equivalent filter was realized in two ways, in MATLAB environment and according to transformation coefficient. For the analog to a digital transformation of low-pass filter was necessary to estimate sampling frequency of Arduino. Digital low-pass filter was proposed by two ways and properties of analog low-pass filter and digital filters were compared.
{"title":"Low-Pass Filter Design with Microcontroller","authors":"Miroslav Matejček, M. Šostronek","doi":"10.23919/NTSP54843.2022.9920400","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920400","url":null,"abstract":"This article deals with a proposal of low-pass filter based on the microcontroller ATmega328 of the Arduino Uno platform. In the introduction we deal with theory of analog low-pass filter design, discrete low-pass filters, their advantages, and disadvantages. Digital filter design principle is shortly explained on a digital low-pass filter. The method of analog prototype filters was used. The transformation of an analog low-pass filter into the discrete low-pass equivalent filter was realized in two ways, in MATLAB environment and according to transformation coefficient. For the analog to a digital transformation of low-pass filter was necessary to estimate sampling frequency of Arduino. Digital low-pass filter was proposed by two ways and properties of analog low-pass filter and digital filters were compared.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121848980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920456
S. Gazovová, F. Nebus
This paper presents Time Difference of Arrival (TDOA) method application for indoor Radio Frequency (RF) source localization. The aim of the work was to prepare alternative solution for the target position estimation based on Received Signal Strength (RSS) signal measurement. In this paper we present two cases - experimental localisation in anechoic chamber and experimental localisation in standard laboratory equipped with electronic instrumentation. For the time of RF signal arrival and following time delay estimation between three receiving points and final source position estimation we tested cross-correlation and demodulated leading edge detection methods. Experimental results in anechoic chamber showed good agreement measured results and standard deviation with theoretical prediction. Experimental results in standard laboratory showed too high standard deviation, however leading edge detection was expected to be satisfactory.
{"title":"Experimental Results for Indoor Position Estimation with TDOA Method","authors":"S. Gazovová, F. Nebus","doi":"10.23919/NTSP54843.2022.9920456","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920456","url":null,"abstract":"This paper presents Time Difference of Arrival (TDOA) method application for indoor Radio Frequency (RF) source localization. The aim of the work was to prepare alternative solution for the target position estimation based on Received Signal Strength (RSS) signal measurement. In this paper we present two cases - experimental localisation in anechoic chamber and experimental localisation in standard laboratory equipped with electronic instrumentation. For the time of RF signal arrival and following time delay estimation between three receiving points and final source position estimation we tested cross-correlation and demodulated leading edge detection methods. Experimental results in anechoic chamber showed good agreement measured results and standard deviation with theoretical prediction. Experimental results in standard laboratory showed too high standard deviation, however leading edge detection was expected to be satisfactory.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127411815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920430
Bohumil Brtnik, D. Matousek
The Sallen-Key low-pass biquad shows a decrease in attenuation at high frequencies because the real operational amplifier has a finite transit frequency. As a result, the course of the actual frequency response deviates from the ideal. Generally, this phenomenon occurs only in even-order filters in both Voltage Mode (VM) and Current Mode (CM) but is no longer observed for odd-order filters. When determining the order of the filter, it is always necessary to round the calculated value upwards, so it is discussed whether it is appropriate to round it up to the nearest odd number. Finally, this method of attenuation decrease correction is compared with the correction using another active element.
{"title":"Influence of the Low-Pass Filter Order to the Attenuation Deviation at the High Frequencies","authors":"Bohumil Brtnik, D. Matousek","doi":"10.23919/NTSP54843.2022.9920430","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920430","url":null,"abstract":"The Sallen-Key low-pass biquad shows a decrease in attenuation at high frequencies because the real operational amplifier has a finite transit frequency. As a result, the course of the actual frequency response deviates from the ideal. Generally, this phenomenon occurs only in even-order filters in both Voltage Mode (VM) and Current Mode (CM) but is no longer observed for odd-order filters. When determining the order of the filter, it is always necessary to round the calculated value upwards, so it is discussed whether it is appropriate to round it up to the nearest odd number. Finally, this method of attenuation decrease correction is compared with the correction using another active element.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920365
Michal Kvet
Relational database systems form an inevitable robust part of information technology. Data management is based on the relational schema. Individual operations are always encapsulated by the transactions. Transaction support ensures atomicity, consistency, isolation, and durability of the operations by shifting the database from a consistent data image to a new consistent image. Internally, individual operations can be divided to read and write operation sets. Generally, transactions are in a complex, scalable, and massive parallelism environment, where data rows are shared. The possibility of sharing without any operation loss must be ensured at any time. This paper deals with transaction locking and associates the problem of parallelism with indexing by proposing a new Lock Tracker module. It consists of the locked data rows perspective reference. By implementing such a solution, transaction hangs can be limited. Data access can be optimized, resulting in improved performance.
{"title":"Lock Tracking – Efficient Solution for Relational Transaction Locking","authors":"Michal Kvet","doi":"10.23919/NTSP54843.2022.9920365","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920365","url":null,"abstract":"Relational database systems form an inevitable robust part of information technology. Data management is based on the relational schema. Individual operations are always encapsulated by the transactions. Transaction support ensures atomicity, consistency, isolation, and durability of the operations by shifting the database from a consistent data image to a new consistent image. Internally, individual operations can be divided to read and write operation sets. Generally, transactions are in a complex, scalable, and massive parallelism environment, where data rows are shared. The possibility of sharing without any operation loss must be ensured at any time. This paper deals with transaction locking and associates the problem of parallelism with indexing by proposing a new Lock Tracker module. It consists of the locked data rows perspective reference. By implementing such a solution, transaction hangs can be limited. Data access can be optimized, resulting in improved performance.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128935337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920474
S. Gazovová, M. Babjak
The performance of suboptimal sequences for binary encoding of radar signals with length 7 and 8 is described. It is shown that it is possible to find a set of sequences with good properties. Probability of correct range detection of selected sequences in presence of active noise jamming is described and it is compared with cases when Barker sequences is used for binary encoding of radar signals.
{"title":"Suboptimal Sequences for Binary Encoding of Radar Signals","authors":"S. Gazovová, M. Babjak","doi":"10.23919/NTSP54843.2022.9920474","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920474","url":null,"abstract":"The performance of suboptimal sequences for binary encoding of radar signals with length 7 and 8 is described. It is shown that it is possible to find a set of sequences with good properties. Probability of correct range detection of selected sequences in presence of active noise jamming is described and it is compared with cases when Barker sequences is used for binary encoding of radar signals.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Presented work summarizes selected Convolutional Neural Networks classification of interfering elements in the meteorological images. Interfering elements, such as raindrops and insect adhered to camera lens, bright sun and other elements limit the process of automatic remote estimation of visibility at airports. We have experimented with three groups of pretrained neural networks. Namely we used AlexNet, DenseNet and ResNet. DenseNet169 classification appears to be a suitable solution. All the examined classification metrics, under the conditions of a classification threshold of 99% and above, indicated values above 90%. The paper also presents real deployment of classification models for full high definition camera images.
{"title":"Classification of Interfering Elements in the Meteorological Images by Deep Neural Networks","authors":"Lukáš Urbaník, Lukáš Ivica, R. Forgác, Miloš Očkay, Irina Malkin Ondík","doi":"10.23919/NTSP54843.2022.9920418","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920418","url":null,"abstract":"Presented work summarizes selected Convolutional Neural Networks classification of interfering elements in the meteorological images. Interfering elements, such as raindrops and insect adhered to camera lens, bright sun and other elements limit the process of automatic remote estimation of visibility at airports. We have experimented with three groups of pretrained neural networks. Namely we used AlexNet, DenseNet and ResNet. DenseNet169 classification appears to be a suitable solution. All the examined classification metrics, under the conditions of a classification threshold of 99% and above, indicated values above 90%. The paper also presents real deployment of classification models for full high definition camera images.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/ntsp54843.2022.9920417
{"title":"NTSP 2022 Cover Page","authors":"","doi":"10.23919/ntsp54843.2022.9920417","DOIUrl":"https://doi.org/10.23919/ntsp54843.2022.9920417","url":null,"abstract":"","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"129 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.23919/NTSP54843.2022.9920483
Z. Kolka, V. Biolková, D. Biolek, P. Barcik
Point-to-point Free-Space Optical (FSO) links use narrow laser beams to transmit information in the line-of-sight arrangement. In the real atmosphere with aerosols, there is necessarily omnidirectional scattering of radiation, which gives the possibility of illegitimate reception outside the beam. This paper presents a simple qualitative model which, in addition to power levels, also describes the frequency characteristics of the eavesdropping channel. The paper also analyzes practical scenarios in terms of reception feasibility.
{"title":"Analysis of NLOS Channel Properties of Terrestrial FSO Links","authors":"Z. Kolka, V. Biolková, D. Biolek, P. Barcik","doi":"10.23919/NTSP54843.2022.9920483","DOIUrl":"https://doi.org/10.23919/NTSP54843.2022.9920483","url":null,"abstract":"Point-to-point Free-Space Optical (FSO) links use narrow laser beams to transmit information in the line-of-sight arrangement. In the real atmosphere with aerosols, there is necessarily omnidirectional scattering of radiation, which gives the possibility of illegitimate reception outside the beam. This paper presents a simple qualitative model which, in addition to power levels, also describes the frequency characteristics of the eavesdropping channel. The paper also analyzes practical scenarios in terms of reception feasibility.","PeriodicalId":103310,"journal":{"name":"2022 New Trends in Signal Processing (NTSP)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123306315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}