Brno University of Technology

Displaying 1-32 of 32 results

  • White Papers // Oct 2013

    A Universal Frame of Access Control in Computer Networks

    In the paper, the classification of Access Control (AC) systems and AC networks is proposed. This classification facilitates the description and security analysis of complex AC systems and networks. The applicability of the proposed terminology and classification is illustrated in the description of a representative range of AC systems and...

    Provided By Brno University of Technology

  • White Papers // Jul 2012

    Mac Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a wireless network of mobile nodes connected by wireless link without a central control. The Medium Access Control (MAC) protocol is one of the important issues in such network, thereby the presented paper will discuss the MAC protocol used in MANET depending on IEEE...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Performance Analysis of SSC Diversity Receiver Over Correlated Hoyt Fading Channels

    An infinite-series-based approach for the performance analysis of a dual-branch Switched-and-Stay Combining (SSC) diversity receiver operating over correlated Hoyt fading channels is presented. The performance analysis is based on outage probability (Pout) and Average Bit Error Probability (ABEP) criteria. More precisely, the ABEP performance is evaluated for Binary Differential Phase-Shift-Keying...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Distributed Recognition of Reference Nodes for Wireless Sensor Network Localization

    All known localization techniques for wireless sensor and ad-hoc networks require certain set of reference nodes being used for position estimation. The anchor-free techniques in contrast to anchor-based do not require reference nodes called anchors to be placed in the network area before localization operation itself, but they can establish...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Opportunistic Relaying in Time Division Broadcast Protocol With Incremental Relaying

    In this paper, the authors investigate the performance of Time Division BroadCast protocol (TDBC) with Incremental Relaying (IR) when there are multiple available relays. Opportunistic Relaying (OR), i.e., the "Best" relay is select for transmission to minimize the system's outage probability, is proposed. Two OR schemes are presented. The first...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Analysis and Simulation of the Transmission Distortions of the Mobile Digital Television DVB-SH

    This paper deals with the second part of the latest digital TV standard DVB-SH (Digital Video Broadcasting - Satellite to Handhelds) with focus on utilization of its advantages for the next generation of mobile TV broadcasting. In the second part the simulation model of DVB-SH-B, which is using satellite configuration...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Determination of More Realistic Target 95% Values of Post Selection Delay in Modern Telephone Networks

    Besides the quality of speech signal, the telephone network response time is the main indicator of Quality of Service (QoS). The telephone network response time is expressed by the time needed for some phases of telephone connection set-up and disconnect. Post Selection Delay (PSD, or Post Dialing Delay) is the...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Variance Based OFDM Frame Synchronization

    The paper deals with a new frame synchronization scheme for OFDM systems and calculates the complexity of this scheme. The scheme is based on computing of the detection window variance. The variance is computed in two delayed times, so a modified Early-Late loop is used for the frame position detection....

    Provided By Brno University of Technology

  • White Papers // Oct 2011

    Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis

    Together with the massive expansion of smartphones, tablets, and other smart devices, the authors can notice a growing number of malware threats targeting these platforms. Software security companies are not prepared for such diversity of target platforms and there are only few techniques for platform-independent malware analysis. This is a...

    Provided By Brno University of Technology

  • White Papers // Apr 2011

    Collective Intelligence and Knowledge Management as a Tool for Innovations

    The collective intelligence, knowledge management and the innovation process play a significant role in the authors' fast changing world of business. The paper describes the most important findings and definitions concerning the process of innovation in the enterprises and Employee Involvement and empowerment. It shows the approach of the initial...

    Provided By Brno University of Technology

  • White Papers // Dec 2010

    Modeling of Service-Oriented Architecture: Integration of Business Process and Service Modeling

    This paper addresses issues of the Service-Oriented Architecture Modeling (SOAM). SOAM comprises gathering requirements, analyzing the requirements to identify services and business processes, and finally implementing the services and processes. It is a heterogeneous approach that combines a number of well-established practices. The key question in SOAM is how to...

    Provided By Brno University of Technology

  • White Papers // Oct 2010

    Services for Advanced Communication Networks

    Services for advanced communication networks are described in this paper. An artificial neural network will be used for the control of network elements, in the authors' case a switch. Classical sequence data processing is substituted by parallel processing. The classical switch and the switch controlled by a Kohenen artificial neural...

    Provided By Brno University of Technology

  • White Papers // Sep 2010

    Integration of Real Network Components Into OPNET Modeler Co-Simulation Process

    The OPNET Modeler is a simulation environment enables modeling of large-scale networks with in detail defined parameters. This paper is focused on the possibility to communicate with external systems and applications that this environment offers. Due to this the authors are able to interconnect simulation environment with real network system...

    Provided By Brno University of Technology

  • White Papers // Sep 2010

    Algorithms of Digital Modulation Classification and Their Verification

    Two methods of the classification of digital modulations ASK, FSK2, FSK4, MSK, BPSK, QPSK, 8PSK and QAM-16 are presented. The first algorithm is based on module and phase spectrogram analysis. Here it is very important to estimate the symbol length of the received signal and thus the authors introduce two...

    Provided By Brno University of Technology

  • White Papers // Apr 2010

    New Channel Coding Methods for Satellite Communication

    This paper deals with the new progressive channel coding methods for short message transmission via satellite transponder using predetermined length of frame. The key benefits of this contribution are modification and implementation of a new turbo code and utilization of unique features with applications of methods for bit error rate...

    Provided By Brno University of Technology

  • White Papers // Dec 2009

    Risk Management And Soft Computing

    Risk management is a sphere that covers wide scale of techniques that are used in many branches. This branch has started to develop since the 21 century namely for the purpose to improve the risk management. It led to spread in many branches such as banking, insurance, industry, direct mailing...

    Provided By Brno University of Technology

  • White Papers // Dec 2009

    Implementation of TCP/IP Stack for 3L Diamond Operating System

    This paper deals with implementation of TCP/IP stack for 3L Diamond operating system. After short introduction to multiprocessor operating system 3L Diamond, main implementation issues are described. Digital signal processor module based on TMS320C6455 is used as a target platform. Processor based digital systems are used in the broad spectrum...

    Provided By Brno University of Technology

  • White Papers // Nov 2009

    Performance Evaluation of Quality of Service Assurance in MPLS Networks

    The paper introduces the main features of the mechanism of MultiProtocol Label Switching (MPLS) and evaluates the behaviour of MPLS implementation in current IP networks with respect to Quality of Service support. For this purpose a simulation model was created to examine several aspects of service differentiation in MPLS networks...

    Provided By Brno University of Technology

  • White Papers // Nov 2009

    Simulation of PMD Cause in WDM Systems

    The model of signal propagation for two channel WDM system called coupled Non-Linear Schrodinger Equations (NLSE) is introduced. The authors demonstrate effect of nonlinearities and birefringence in 2 channel WDM system. The simulation model and its numeric solution was designed including Polarization Mode Dispersion (PMD). The coupled NLSE was applied...

    Provided By Brno University of Technology

  • White Papers // Jul 2009

    Design and Analysis of New Digital Modulation Classification Method

    In connection with the requirement for faster and more reliable communication, the digital processing methods and digital communications are mainly used. In this paper, a new method of digital modulation classification is described. The method was applied to signals with FSK, BPSK, MSK, QAM-16 and QPSK modulations. The spectrogram analysis...

    Provided By Brno University of Technology

  • White Papers // Jun 2009

    Designing a Novel General Sorting Network Constructor Using Artificial Evolution

    A method is presented for the construction of arbitrary even-input sorting networks exhibiting better properties than the networks created using a conventional technique of the same type. The method was discovered by means of a genetic algorithm combined with an application-specific development. Similarly to human inventions in the area of...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Customer Services and Their Role for Industrial Small and Medium Companies

    The aim of this paper is to present the problems of customer services and their important role for small and medium companies from the theoretical view. Customer services are kind of services being provided by companies to their products. Customer services can be found in all economic spheres, such as...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Satellite Free Space Optics Test Generator

    Free Space Optics (FSO) is relatively a new type of communication. Laser beam as a data carrier is propagated from a source to a target without any extra transmission medium. The transmission medium is an atmosphere or a cosmic environment. It is similar with standard radio transmission. However, the optical...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Collection of Different Face Gestures and Realization of Experiments

    This paper deals with the influence of face gesticulation to the face recognition algorithms. The authors have acquired the own database with different gestures and tried to test two face recognition tools for the reliability. They used a tool for change of face gesticulation and his impact to the face...

    Provided By Brno University of Technology

  • White Papers // Jan 2009

    Connectivity in a Wireless Sensor Network

    This paper describes the issue of full connection probability and network efficiency using a minimum number of nodes in wireless sensor networks is addressed. It investigates the network characteristics through a number of simulations in Matlab. Using various input parameters, it tries to approximate four realistic scenarios: a football pitch,...

    Provided By Brno University of Technology

  • White Papers // Jan 2009

    Threat Analysis Based on the Graph of Elementary Threats

    At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a...

    Provided By Brno University of Technology

  • White Papers // Dec 2008

    Data Gathering Model for Wireless Sensor Networks Based on the Hierarchical Aggregation Algorithms for IP Networks

    This paper deals with the data gathering in the sessions with the large number of end nodes. This situation can be represented by the networks with the IPTV service or by the monitoring process in the large-scale wireless sensor networks. The main aim of this paper is to propose and...

    Provided By Brno University of Technology

  • White Papers // Dec 2008

    New Analytical Model of Distributed Coordination Function

    Wireless access networks of various types are the most frequently used technologies in the last mile solution i.e. bringing connectivity to the customer or end user. Wireless connections are also increasingly used inside buildings instead of cables, mainly in cases where the support of mobile users is needed. They are...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Best Effort Hierarchical Aggregation Tree for IPTV Signaling

    As more and more households are connected with broadband internet connection a new type of services are emerging. One of these services is also the IPTV service. According to current research the TV development is divided into four stages. The first and four stages are in the name of interaction...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Visualization of a Hierarchical Aggregation in the IPTV Network Environment

    This paper deals with IPTV (Internet Protocol TeleVision) system. It explains basic principles of multimedia transmission to wide range of user trough Internet. There is an overview of advantages and possibilities of IPTV in general given in the first part, hierarchical aggregation possible usage follows and then description of signalization...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Interference in Data Communication Over Narrow-Band PLC

    Interference in narrow-band PLC (Power Line Communication) is discussed in the paper. In power lines, interference greatly affects the attainable data rate and reliability. Communication rate was measured and evaluated for different media, using various facilities with special narrow-band modems for data communication. The spectrum of signals measured for different...

    Provided By Brno University of Technology

  • White Papers // Aug 2008

    Multicast Routing in Wireless Sensor Networks

    This paper deals with the state of the nowadays research of the multicast routing protocols for wireless sensor networks. They describe how to establish efficient multicast tree for wireless sensor network environment and introduce the two base groups of the multicast routing protocols. For these groups, blind flooding and geographic...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Distributed Recognition of Reference Nodes for Wireless Sensor Network Localization

    All known localization techniques for wireless sensor and ad-hoc networks require certain set of reference nodes being used for position estimation. The anchor-free techniques in contrast to anchor-based do not require reference nodes called anchors to be placed in the network area before localization operation itself, but they can establish...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Performance Analysis of SSC Diversity Receiver Over Correlated Hoyt Fading Channels

    An infinite-series-based approach for the performance analysis of a dual-branch Switched-and-Stay Combining (SSC) diversity receiver operating over correlated Hoyt fading channels is presented. The performance analysis is based on outage probability (Pout) and Average Bit Error Probability (ABEP) criteria. More precisely, the ABEP performance is evaluated for Binary Differential Phase-Shift-Keying...

    Provided By Brno University of Technology

  • White Papers // Apr 2012

    Opportunistic Relaying in Time Division Broadcast Protocol With Incremental Relaying

    In this paper, the authors investigate the performance of Time Division BroadCast protocol (TDBC) with Incremental Relaying (IR) when there are multiple available relays. Opportunistic Relaying (OR), i.e., the "Best" relay is select for transmission to minimize the system's outage probability, is proposed. Two OR schemes are presented. The first...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Analysis and Simulation of the Transmission Distortions of the Mobile Digital Television DVB-SH

    This paper deals with the second part of the latest digital TV standard DVB-SH (Digital Video Broadcasting - Satellite to Handhelds) with focus on utilization of its advantages for the next generation of mobile TV broadcasting. In the second part the simulation model of DVB-SH-B, which is using satellite configuration...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Determination of More Realistic Target 95% Values of Post Selection Delay in Modern Telephone Networks

    Besides the quality of speech signal, the telephone network response time is the main indicator of Quality of Service (QoS). The telephone network response time is expressed by the time needed for some phases of telephone connection set-up and disconnect. Post Selection Delay (PSD, or Post Dialing Delay) is the...

    Provided By Brno University of Technology

  • White Papers // Mar 2012

    Variance Based OFDM Frame Synchronization

    The paper deals with a new frame synchronization scheme for OFDM systems and calculates the complexity of this scheme. The scheme is based on computing of the detection window variance. The variance is computed in two delayed times, so a modified Early-Late loop is used for the frame position detection....

    Provided By Brno University of Technology

  • White Papers // Sep 2010

    Integration of Real Network Components Into OPNET Modeler Co-Simulation Process

    The OPNET Modeler is a simulation environment enables modeling of large-scale networks with in detail defined parameters. This paper is focused on the possibility to communicate with external systems and applications that this environment offers. Due to this the authors are able to interconnect simulation environment with real network system...

    Provided By Brno University of Technology

  • White Papers // Oct 2010

    Services for Advanced Communication Networks

    Services for advanced communication networks are described in this paper. An artificial neural network will be used for the control of network elements, in the authors' case a switch. Classical sequence data processing is substituted by parallel processing. The classical switch and the switch controlled by a Kohenen artificial neural...

    Provided By Brno University of Technology

  • White Papers // Jul 2009

    Design and Analysis of New Digital Modulation Classification Method

    In connection with the requirement for faster and more reliable communication, the digital processing methods and digital communications are mainly used. In this paper, a new method of digital modulation classification is described. The method was applied to signals with FSK, BPSK, MSK, QAM-16 and QPSK modulations. The spectrogram analysis...

    Provided By Brno University of Technology

  • White Papers // Sep 2010

    Algorithms of Digital Modulation Classification and Their Verification

    Two methods of the classification of digital modulations ASK, FSK2, FSK4, MSK, BPSK, QPSK, 8PSK and QAM-16 are presented. The first algorithm is based on module and phase spectrogram analysis. Here it is very important to estimate the symbol length of the received signal and thus the authors introduce two...

    Provided By Brno University of Technology

  • White Papers // Jul 2012

    Mac Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a wireless network of mobile nodes connected by wireless link without a central control. The Medium Access Control (MAC) protocol is one of the important issues in such network, thereby the presented paper will discuss the MAC protocol used in MANET depending on IEEE...

    Provided By Brno University of Technology

  • White Papers // Apr 2011

    Collective Intelligence and Knowledge Management as a Tool for Innovations

    The collective intelligence, knowledge management and the innovation process play a significant role in the authors' fast changing world of business. The paper describes the most important findings and definitions concerning the process of innovation in the enterprises and Employee Involvement and empowerment. It shows the approach of the initial...

    Provided By Brno University of Technology

  • White Papers // Dec 2010

    Modeling of Service-Oriented Architecture: Integration of Business Process and Service Modeling

    This paper addresses issues of the Service-Oriented Architecture Modeling (SOAM). SOAM comprises gathering requirements, analyzing the requirements to identify services and business processes, and finally implementing the services and processes. It is a heterogeneous approach that combines a number of well-established practices. The key question in SOAM is how to...

    Provided By Brno University of Technology

  • White Papers // Oct 2013

    A Universal Frame of Access Control in Computer Networks

    In the paper, the classification of Access Control (AC) systems and AC networks is proposed. This classification facilitates the description and security analysis of complex AC systems and networks. The applicability of the proposed terminology and classification is illustrated in the description of a representative range of AC systems and...

    Provided By Brno University of Technology

  • White Papers // Aug 2008

    Multicast Routing in Wireless Sensor Networks

    This paper deals with the state of the nowadays research of the multicast routing protocols for wireless sensor networks. They describe how to establish efficient multicast tree for wireless sensor network environment and introduce the two base groups of the multicast routing protocols. For these groups, blind flooding and geographic...

    Provided By Brno University of Technology

  • White Papers // Dec 2008

    Data Gathering Model for Wireless Sensor Networks Based on the Hierarchical Aggregation Algorithms for IP Networks

    This paper deals with the data gathering in the sessions with the large number of end nodes. This situation can be represented by the networks with the IPTV service or by the monitoring process in the large-scale wireless sensor networks. The main aim of this paper is to propose and...

    Provided By Brno University of Technology

  • White Papers // Jan 2009

    Connectivity in a Wireless Sensor Network

    This paper describes the issue of full connection probability and network efficiency using a minimum number of nodes in wireless sensor networks is addressed. It investigates the network characteristics through a number of simulations in Matlab. Using various input parameters, it tries to approximate four realistic scenarios: a football pitch,...

    Provided By Brno University of Technology

  • White Papers // Jan 2009

    Threat Analysis Based on the Graph of Elementary Threats

    At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a...

    Provided By Brno University of Technology

  • White Papers // Dec 2009

    Implementation of TCP/IP Stack for 3L Diamond Operating System

    This paper deals with implementation of TCP/IP stack for 3L Diamond operating system. After short introduction to multiprocessor operating system 3L Diamond, main implementation issues are described. Digital signal processor module based on TMS320C6455 is used as a target platform. Processor based digital systems are used in the broad spectrum...

    Provided By Brno University of Technology

  • White Papers // Apr 2010

    New Channel Coding Methods for Satellite Communication

    This paper deals with the new progressive channel coding methods for short message transmission via satellite transponder using predetermined length of frame. The key benefits of this contribution are modification and implementation of a new turbo code and utilization of unique features with applications of methods for bit error rate...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Collection of Different Face Gestures and Realization of Experiments

    This paper deals with the influence of face gesticulation to the face recognition algorithms. The authors have acquired the own database with different gestures and tried to test two face recognition tools for the reliability. They used a tool for change of face gesticulation and his impact to the face...

    Provided By Brno University of Technology

  • White Papers // Oct 2011

    Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis

    Together with the massive expansion of smartphones, tablets, and other smart devices, the authors can notice a growing number of malware threats targeting these platforms. Software security companies are not prepared for such diversity of target platforms and there are only few techniques for platform-independent malware analysis. This is a...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Satellite Free Space Optics Test Generator

    Free Space Optics (FSO) is relatively a new type of communication. Laser beam as a data carrier is propagated from a source to a target without any extra transmission medium. The transmission medium is an atmosphere or a cosmic environment. It is similar with standard radio transmission. However, the optical...

    Provided By Brno University of Technology

  • White Papers // Apr 2009

    Customer Services and Their Role for Industrial Small and Medium Companies

    The aim of this paper is to present the problems of customer services and their important role for small and medium companies from the theoretical view. Customer services are kind of services being provided by companies to their products. Customer services can be found in all economic spheres, such as...

    Provided By Brno University of Technology

  • White Papers // Jun 2009

    Designing a Novel General Sorting Network Constructor Using Artificial Evolution

    A method is presented for the construction of arbitrary even-input sorting networks exhibiting better properties than the networks created using a conventional technique of the same type. The method was discovered by means of a genetic algorithm combined with an application-specific development. Similarly to human inventions in the area of...

    Provided By Brno University of Technology

  • White Papers // Dec 2009

    Risk Management And Soft Computing

    Risk management is a sphere that covers wide scale of techniques that are used in many branches. This branch has started to develop since the 21 century namely for the purpose to improve the risk management. It led to spread in many branches such as banking, insurance, industry, direct mailing...

    Provided By Brno University of Technology

  • White Papers // Dec 2008

    New Analytical Model of Distributed Coordination Function

    Wireless access networks of various types are the most frequently used technologies in the last mile solution i.e. bringing connectivity to the customer or end user. Wireless connections are also increasingly used inside buildings instead of cables, mainly in cases where the support of mobile users is needed. They are...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Best Effort Hierarchical Aggregation Tree for IPTV Signaling

    As more and more households are connected with broadband internet connection a new type of services are emerging. One of these services is also the IPTV service. According to current research the TV development is divided into four stages. The first and four stages are in the name of interaction...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Visualization of a Hierarchical Aggregation in the IPTV Network Environment

    This paper deals with IPTV (Internet Protocol TeleVision) system. It explains basic principles of multimedia transmission to wide range of user trough Internet. There is an overview of advantages and possibilities of IPTV in general given in the first part, hierarchical aggregation possible usage follows and then description of signalization...

    Provided By Brno University of Technology

  • White Papers // Nov 2008

    Interference in Data Communication Over Narrow-Band PLC

    Interference in narrow-band PLC (Power Line Communication) is discussed in the paper. In power lines, interference greatly affects the attainable data rate and reliability. Communication rate was measured and evaluated for different media, using various facilities with special narrow-band modems for data communication. The spectrum of signals measured for different...

    Provided By Brno University of Technology

  • White Papers // Nov 2009

    Performance Evaluation of Quality of Service Assurance in MPLS Networks

    The paper introduces the main features of the mechanism of MultiProtocol Label Switching (MPLS) and evaluates the behaviour of MPLS implementation in current IP networks with respect to Quality of Service support. For this purpose a simulation model was created to examine several aspects of service differentiation in MPLS networks...

    Provided By Brno University of Technology

  • White Papers // Nov 2009

    Simulation of PMD Cause in WDM Systems

    The model of signal propagation for two channel WDM system called coupled Non-Linear Schrodinger Equations (NLSE) is introduced. The authors demonstrate effect of nonlinearities and birefringence in 2 channel WDM system. The simulation model and its numeric solution was designed including Polarization Mode Dispersion (PMD). The coupled NLSE was applied...

    Provided By Brno University of Technology