Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 10
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Soldiers are the backbone of any armed force. They usually lose their lives due to the lack of medical assistance in emergency situations. Furthermore, army bases face problems due to the inability to track soldiers’ locations in the field. Hence, this paper proposes an interactive graphical user interface module (IGUIM) for soldiers’ bioinformatics acquisition and emergency reaction during combat, a global positioning system (GPS) is used to track soldiers’ locations through a device carried by the soldier. Soldiers’ bioinformatics are gathered using health monitoring biosensors, bidirectional communication between the soldiers and the army base is established via a global system for mobile (GSM). The proposed interactive module aims to enumerate the soldiers on the battlefield within a database that easily facilitates health monitoring, position tracking and bidirectional communication with each soldier through their identification number. The proposed IGUIM will increase the rate of soldiers’ survival in emergencies, which contributes to preserving the human resources of the army during combat.
Go to article

Authors and Affiliations

Wesam F. Swedan
1
Huthifa A. Al_Issa
1
Ayat Aloqoul
1
Hadeel Alkofahi
1
Rahaf Obeidat
1

  1. Department of Electrical Engineering, Al-Huson University College, Al Balqa Applied University, Jordan
Download PDF Download RIS Download Bibtex

Abstract

The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Go to article

Bibliography

1] D. R. Yuryev and O. S. Rogova, “Comparative analysis of two-factor authentication”, Proc. of Int. Conference Technical sciences - from theory to practice to mater SibAK2017, Novosibirsk, 2017, pp.46–51.
[2] Transfer of Customer Details OAuth, (2019, May) [Online], Available: https://www.ibm.com/ developerworks/ru/library/se-oauthjavapt2/index.html
[3] HMAC: Keyed-Hashing for Message Authentication, (2019, May) [Online], Available: https://tools.ietf.org/ html/rfc2104
[4] N. Moretto. (2019, Aug). Two-factor authentication with TOTP, Available: https://medium.com/@n.moretto/two-factor-authentication-with-totp-ccc5f828b6df
[5] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Development of an authentication model based on the second factor in an automated control system,” KBTU News, vol. 16, pp. 115–118, 2019.
[6] S. Nysanbayeva, W. Wojcik and O. Ussatova, “Algorithm for generating temporary password based on the two-factor authentication model,” Przegląd Elektrotechniczny 5(R95), pp. 101–106, 2019.
[7] Two-factor authentication, (2019, Aug) [Online]. Available: https://www.infobip.com/ru/glossariy/dvukhfaktornaya-autentifikatsiya (last accessed September 07, 2019 y.).
[8] FIPS 140-2 standard and self-encryption technology. (2018, Sep) [Online]. Available: https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr- mb-605-2-1302-ru.pdf
[9] National Security Agency. (2018, Jun). [Online]. Available: https://www.cryptomuseum.com/intel/nsa/index.htm
[10] O. Ussatova and S. Nyssanbayeva, “Generators of one-time two-factor authentication passwords,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, no. 2(R71), pp. 60–64, 2019.
[11] MongoDB Tutorial. (2019, Sep) [Online]. Available: https://www. tutorialspoint.com/mongodb/index.htm
[12] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Two-factor authentication algorithm implementation with additional security parameter based on mobile application,”, Proc. on International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME2019), Guilin, 2019, pp. 84–86.
[13] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Software implementation of two-factor authentication to ensure security when accessing an information system,” News of KazNU im. al-Farabi, 136, pp. 87–95, March 2019.
Go to article

Authors and Affiliations

Olga Ussatova
1 2
Saule Nyssanbayeva
2
Waldemar Wójcik
3

  1. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  2. Institute of Information and Computational Technologies, Almaty, Kazakhstan
  3. Lublin University of Technology, Nadbystrzycka 38a, 20-618 Lublin
Download PDF Download RIS Download Bibtex

Abstract

Alongside formality, recreation and fostering integration are the two main features that contribute to the attractiveness of urban public space. The aim of this study is to investigate specific types of recreation activity in the most formal squares in Szczecin. In addition, this research analysed the age of users and whether recreation activity involved groups or individual users. The research covered six squares located in the core city centre and at the same time at on the main urban axes. The study is based on multiple direct observations method, as well as historical, iconographic, and field studies. Differences were observed both in the saturation and diversity of activity types in individual squares, as well as in the age of users and the way people congregate. According to the results of the study, both the location of the square and the links to public realm, as well as the elements of its equipment, are factors that influence the sociability and types of recreational activities practiced in the public space.
Go to article

Authors and Affiliations

Eliza Sochacka
1
ORCID: ORCID
Magdalena Rzeszotarska-Pałka
1
ORCID: ORCID
Olha Kryvoruchko
2
ORCID: ORCID

  1. West Pomeranian University in Szczecin Department of Landscape Architecture
  2. Lviv Polytechnic National University Department of Architectural Design and Engineering
Download PDF Download RIS Download Bibtex

Abstract

The problem of poor quality of traffic accident data assembled in national databases has been addressed in European project InDeV. Vulnerable road users (pedestrians, cyclists, motorcyclists and moped riders) are especially affected by underreporting of accidents and misreporting of injury severity. Analyses of data from the European CARE database shows differences between countries in accident number trends as well as in fatality and injury rates which are difficult to explain. A survey of InDeV project partners from 7 EU countries helped to identify differences in their countries in accident and injury definitions as well as in reporting and data checking procedures. Measures to improve the quality of accident data are proposed such as including pedestrian falls in accident statistics, precisely defining minimum injury and combining police accident records with hospital data.

Go to article

Authors and Affiliations

P. Olszewski
B. Osińska
P. Szagała
P. Skoczyński
A. Zielińska
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the idea of a prosumer energy cloud as a new service dedicated to electricity prosumers. The implementation of the cloud should generate a number of benefits in the following areas: settlements between prosumer and electricity supplier, the development of distributed energy sources in microprocessors and the development of e-mobility. From the prosumer point of view, the proposed idea of a prosumer cloud of energy is dedicated to the virtual storage of energy excess generated in the micro-installation. Physical energy storage in the cloud means recording the volume of electricity introduced into the electricity system from the prosumer’s microprocessors. It is assumed that the energy equivalent to the volume registered in the prosumer cloud can be used at any time at any point in the network infrastructure of the National Power System. Any point of network infrastructure shall be understood as any locally located point of connection of an electricity consumer provided with access authorization. From the point of view of the power grid operators, the idea of a prosumer energy cloud is a conceptual proposition of a service dedicated to the new model of the power system functioning, taking future conditions concerning the significant development of prosumer energy and e-mobility into account. In this concept, electricity would be treated as a commodity only to partial physical storage and above all to trade. In this model a key aspect would be virtual energy storage, that is, the commercial provision by the cloud operator (trading company) of any use of the electricity portfolio by its suppliers. It should be stressed, however, that in the prosumer’s energy cloud functioning, a significant factor would be the cost of guarantees of the use of energy by prosumers at any time and point of connection to the network. This results in the need of taking the presence of certain market risks, both volumetric and cost incurred by clouds operator, which can be minimized by passing a portion of the accumulated volume of generated energy to the cloud operator into account. It should be emphasized that this article presents the first phase of the development of the concept of prosumer energy cloud. However, it is planned to be expanded by the following stages, which include the possibility of controlling and supervising the operation of prosumer installations such as: sources, receivers and physical energy stores, e.g. home energy storage or batteries installed in electric vehicles. Ultimately, it is assumed that the proposed prosumer energy cloud will be outside of the storage of energy (virtual and partly physical) and that aggregation of prosumer resources will create new possibilities for their use to provide a variety of regulatory services, including system ones.

Go to article

Authors and Affiliations

Piotr Rzepka
Maciej Sołtysik
Mateusz Szablicki
Download PDF Download RIS Download Bibtex

Abstract

The presented article consists of two studies (correlation and experimental) on the importance of self-esteem for the perceived value added by a brand to a consumer’s self-image. Both studies were conducted online, using the snowball method, controlling for participants’ gender and product categories. The correlation study showed that consumers, with an increase in self-esteem understood as a trait, look for more positive traits in brands and fewer negative traits to incorporate into their self-image by purchasing the brand. In addition, they confirmed that brand preference is mainly related to the qualities possessed, which the consumer can confirm by purchasing the brand. The experimental study showed that people with lowered self-esteem perceive more positive traits in brands that they can incorporate into their self-image by purchasing the brand, and there were no differences in confirming positive traits and avoiding negative traits that are associated with the brand. The new measurement of the perceived value of a brand to a consumer’s self- image, used, allowed the identification of specific areas of brand image sensitive to a consumer’s self-esteem.
Go to article

Authors and Affiliations

Paweł Krasa
1
ORCID: ORCID
Oleg Gorbaniuk
2 3
ORCID: ORCID
Magdalena Kolańska-Stronka
4
ORCID: ORCID
Karolina Czarnecka
4
Kinga Czyż
1
Tomasz Karski
1
Agnieszka Krajewska
Paweł Pamuła
1
Dajana Synowiec
1

  1. John Paul II Catholic University of Lublin, Lublin, Poland
  2. Institute of Psychology, Maria Curie-Skłodowska University, Lublin, Poland
  3. Casimir Pulaski University of Radom, Radom, Poland
  4. University of Zielona Gora, Zielona Gora, Poland
Download PDF Download RIS Download Bibtex

Abstract

Queuing regime is one outstanding approach in improving channel aggregation. If well designed and incorporated with carefully selected parameters, it enhances the smooth rollout of fifth/next generation wireless networks. While channel aggregation is the merging of scattered TV white space (spectrum holes) into one usable chunk for secondary users (SU). The queuing regime ensures that these unlicensed users (SUs) traffic/ services are not interrupted permanently (blocked/dropped or forced to terminate) in the event of the licensed users (primary user) arrival. However, SUs are not identical in terms of traffic class and bandwidth consumption hence, they are classified as real time and non-real time SU respectively. Several of these strategies have been studied considering queuing regime with a single feedback queuing discipline. In furtherance to previous proposed work with single feedback queuing regime, this paper proposes, develops and compares channel aggregation policies with two feedback queuing regimes for the different classes of SUs. The investigation aims at identifying the impacts of the twofeedback queuing regime on the performance of the secondary network such that any SU that has not completed its ongoing service are queued in their respective buffers. The performance is evaluated through a simulation framework. The results validate that with a well-designed queuing regime, capacity, access and other indices are improved with significant decrease in blocking and forced termination probabilities respectively.

Go to article

Authors and Affiliations

Ebenezer Esenogho
Elie N. Mambou
Hendrik C. Ferreira
Download PDF Download RIS Download Bibtex

Abstract

In wireless mobile networks, a client can move between different locations while staying connected to the network and access the remote server over the mobile networks by using their mobile de- vices at anytime and anywhere. However, the wireless network is more prone to some security attacks, as it does not have the ingrained physical security like wired networks. Thus, the client authentication is required while accessing the remote server through wireless network. Based on elliptic curve cryptosystem (ECC) and identity-based cryptography (IBC), Debiao et al. proposed an ID-based client authentication with key agreement scheme to reduce the computation and communication loads on the mobile devices. The scheme is suitable for mobile client-server environments, is secure against different attacks and provides mutual authentication with session key agreement between a client and the remote server as they claimed. Unfotunately, this paper demonstrates that Debiao et al.’s scheme is vulnerable some cryptographic attacks, and proposed an improved ID-based client authentication with key agreement scheme using ECC. The proposed scheme is secure based on Elliptic Curve Discrete Logarithm Problem (ECDLP) and Computational Diffie-Helmann Problem (CDHP). The detail analysis shows that our scheme overcomes the drawbacks of Debiao et al.’s scheme and achieves more functionality for the client authentication with lesser computational cost than other schemes.
Go to article

Authors and Affiliations

Islam S.K. Hafizul
G.P. Biswas
Download PDF Download RIS Download Bibtex

Abstract

The aim of the paper is to explore metaphorical expressions used in informal Polish in the area of computers and the Internet. The study is based on a corpus, compiled and analyzed by the present author; the corpus consists of short informal texts (entries) taken from Polish Internet message boards devoted to computers and the Internet. Altogether, the corpus comprises around 1,500,000 words. The metaphors found in the corpus will be discussed within the cognitive framework. Special attention will be devoted to one of the most frequent conceptual metaphors found in the corpus, namely COMPUTERS ARE HUMANS, or, to be more precise, BADLY WORKING COMPUTER IS A SICK PERSON. Some place will also be devoted to the infl uence of English on metaphorical expressions (in the domain of computers and the Internet) in Polish.
Go to article

Authors and Affiliations

Marcin Zabawa

This page uses 'cookies'. Learn more