Search results  2013  Articles
32 results

The article reports on the experience from the courses called ‘Analysis of information sources’ and ‘Designing communication and information systems (CIS) - Information management’ at the University of Defence in Brno. The courses are a part of the Master’s Study Programme. Their goal is to master work with Tovek Tools (TT) created by TOVEK [2] and established within the Ministry of Defence of the Czech Republic. Students gain knowledge from using the TT. They undergo orientation training and then they can manage the information resources workflow. The course has been designed to contribute to the development of creative abilities of individual students. There is also a course book [3] available for them. The courses are suitable for both face-to-face instruction and distance learning.


The Cisco Networking Academy (CNA) has been established at the University of Defence fourteenth years ago. That project allows very effective teaching of basic and advanced issues of computer networks, network security, etc. - both theoretically and especially practically.


The paper describes two projectsof Deparment of Communication and Information Systems of University of Defencein Brno. The first one is the Crypto Mouse. It is a computer mouse emulating OpenPGP crypto card. It contains ARM micro-controller with Gnuk software installed. Unlike ordinary solution using card and crypto card reader this solutionis inconspicious. Signing, validating, encrypting and decrypting of data can be used by mouse. Gnuk is free software so anyone can download the code and verify it. The second project isthe Trojan USB Device. This Trojan USB Device can look like ordinary USB flash drive but in reality it can be for example a fake keyboard. When this Trojan USB Device is plugged into USB port it is activated and started to "write" prepared words or even run prepared commands. For example it starts the web browser and surf to the prepared web site, starts the Command Promt and run the command format C: to format hard drive or collects the private data and send them by email or transfer by ftp to the Trojan USB Device owner. Both pojects are used in computer security lessons at the Department of Communication and Infomation Systems.

 


The Elliptic Jes window form 2 is an original study introduced by the author in Mathematics and in Signal Processing in 2012. Similar to other windows used in signal processing such as: Hamming, Hanning, Blackman, Kaiser, Lanczos, Tukey and many other windows, the main goal of introducing the Elliptic Jes window form 1is to improve the convergence of the Fourier Series at the discontinuity. The different points between the proposed window function and the previous ones are: -The proposed window function is variable in form; it can take more than 6 different forms by varying only one parameter.-It can help the Fourier series to converge more rapidly compared to the traditional ones. –It can be used in both analog design of filters and digital design of filters. –It is used to truncate the Fourier series with a variable window shape that keep the necessary information about the signal even after truncation.
In fact, the Elliptic Jes window form 2 is an application of the Elliptic Trigonometry in Signal Processing. The Elliptical Trigonometry is an original study introduced also by the author in mathematics in 2004, and it has an ultimate importance in all fields related to the Trigonometry topics such as Mathematics, Electrical engineering, Electronics, Signal Processing, Image Processing, Relativity, Physics, Chemistry, and many other domains. The Elliptical Trigonometry is the general case of the traditional trigonometry in which an Ellipse is used instead of a Circle, so the Elliptical Trigonometry functions are much more important compared to the traditional trigonometry functions. Therefore, all topics related to the traditional trigonometry will be ultimately improved by using the Elliptical Trigonometry functions including Signal Processing and Specifically the design of windows and filters. As a consequence, the Elliptic Jes window form 2 will replace all traditional window functions.

Remove Filters

Domains

Timeline

Sources

cefme-lnk-arr.pngCefme changes cefme-lnk-arr.pngAbout us
cefme-lnk-arr.pngContributions welcome!
cefme-lnk-arr.pngFAQ cefme-lnk-arr.pngContacts cefme-lnk-arr.pngNATO & Research
                              
Powered by ATOM – web database ontology engine