International Journal of Electronics and Telecommunications
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 66 No. 3 (2020)
Vol. 66 No. 3 (2020)
Published:
2020-09-07
ARTICLES / PAPERS / General
Permutation Coding with Injections for Modified PAM System
Opeyemi O Ogunyanda, Thokozani Shongwe, Theo G Swart
399-404
PDF
Access Logs – Underestimated Privacy Risks
Kamil Kaczyński, Michał Glet
405-410
PDF
Applied Informatics
Information Technologies for Assessing the Quality of IT-specialties Graduates' Training of University by Means of Fuzzy Logic and Neural Networks
Anzhelika O. Azarova, Larysa E. Azarova, Sergii V. Pavlov, Iryna S. Kaplun, Nataliia B. Savina, Waldemar Wójcik, Saule Smailova, Aliya Kalizhanova
411-416
PDF
Model of integral assessment of innovation implementation in higher educational establishments
Svetlana A. Yaremko, Irina I. Nikolina, Elena М. Kuzmina, Serghiy S. Pugach, Waldemar Wójcik, Nataliya Denissova, Ainur Kozbakova
417-423
PDF
Improved method of searching the associative rules while developing the software
Tamara O. Savchuk, Nataliia V. Pryimak, Nina V. Slyusarenko, Andrzej Smolarz, Saule Smailova, Yedilkhan Amirgaliyev
425-430
PDF
Cryptography and Cybersecurity
SIDH hybrid schemes with a classical component based on the discrete logarithm problem over finite field extension
Michał Jakub Wroński, Elżbieta Burek, Łukasz Dzierzkowski
431-441
PDF
Using SAT solvers to finding short cycles in cryptographic algorithms
Władysław Dudzic, Krzysztof Kanciak
443-448
PDF
Towards an auditable cryptographic access control to high-value sensitive data
Krzysztof Kanciak, Konrad Wrona
449-458
PDF
Simple verification of completeness of two addition formulas on twisted Edwards curves
Robert Dryło, Tomasz Kijko
459-464
PDF
Optimal strategies for computation of degree $\ell^n$ isogenies for SIDH
Michał Jakub Wroński, Andrzej Bolesław Chojnacki
465-472
PDF
Improving security of existentially unforgeable signature schemes
Mariusz Jurkiewicz
473-480
PDF
Electromagnetic Compatibility
Impact of IT equipment location in buildings on electromagnetic safety
Leszek Nowosielski
481-486
PDF
Intelligent Transport
Modelling the one channel systems of a delivery of goods provided by unmanned aerial vehicles
Roman N. Kvyetnyy, Yaroslav Kulyk, Bohdan Knysh, Yuryy Ivanov, Andrzej Smolarz, Orken Mamyrbaev, Aimurat Burlibayev
487-492
PDF
Security, Safety, Military
Optimization Model of Adaptive Decision Taking Support System for Distributed Systems Cyber Security Facilities Placement
Aliya Kalizhanova, Sultan Akhmetov, Valery Lakhno, Waldemar Wojcik, Gulnaz Nabiyeva
493-498
PDF
Security assessment methodology for isolated systems of a certain class
Daniel Wiechecki
499-505
PDF
Signals, Circuits, Systems
Further Discussion on Modeling of Measuring Process via Sampling of Signals
Andrzej Marek Borys
507-513
PDF
Telecommunications
A simple nonlinear companding transform for nonlinear compensation of direct-detection optical OFDM systems
Thu Trang Ngo, Duc Nhan Nguyen
515-520
PDF
Wireless and Mobile Communications
Θ(1) Time Algorithm for Master Selection in Ad-hoc Wireless Networks
Mohammed El Khattabi, Jelloul Elmesbahi, Mohammed Khaldoun, Ahmed Errami, Omar Bouattane
521-527
PDF
Power Scaling and Antenna Selection Techniques for Hybrid Beamforming in mmWave Massive MIMO Systems
Abdul Haq Nalband, Mrinal Sarvagya, Mohammed Riyaz Ahmed
529-535
PDF
Properties of a wireless mesh network constructed with the use of IQRF modules in the indoor environment
Sławomir Pluta, Patryk Roszkowski
537-544
PDF
VHDL, Hardware Intelligence
Fixed-latency system for high-speed serial transmission between FPGA devices with Forward Error Correction
Michał Kruszewski, Wojciech Marek Zabołotny
545-553
PDF
Analog Electronics
Application of the averaged model of the diode-transistor switch for modelling characteristics of a boost converter with an IGBT
Paweł Górecki
555-560
PDF
Image Processing
Determination of the Optimal Threshold Value and Number of Keypoints in Scale Invariant Feature Transform-based Copy-Move Forgery Detection
R Rizal Isnanto, Ajub Ajulian Zahra, Imam Santoso, Muhammad Salman Lubis
561-569
PDF
Efficient H.264 intra Frame CODEC with Best prediction matrix mode algorithm
Sara Hamdy, Abdelhalim Zekry, Wael A. Mohamed
571-582
PDF
Space technologies, Astronomy
Development of Speaker Voice Identification Using Main Tone Boundary Statistics for Applying To Robot-Verbal Systems
Yedilkhan Amirgaliyev, Timur Musabayev, Didar Yedilkhan, Waldemar Wojcik, Zhazira Amirgaliyeva
583-588
PDF
Digital Signal Processing
Filtering Property of Signal Sampling in General and Under-Sampling as a Specific Operation of Filtering Connected with Signal Shaping at the Same Time
Andrzej Marek Borys
589-594
PDF
Information
For Readers
For Authors
For Librarians
Current Issue