Logo

Publikacije (45441)

Nazad
Miralem Mehic, Libor Michalek, Emir Dervisevic, Patrik Burdiak, Matej Plakalovic, J. Rozhon, Nerman Mahovac, Filip Richter et al.

Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establishes a cryptographic code based on the computational complexity of mathematical problems. However, this type of cryptography, which is widely used in today’s telecommunications systems, is under threat as electronics and computing rapidly develop. The development of fifth-generation cellular networks (5G) is gaining momentum, and given its wide field of application, security requires special attention. This is especially true faced with the development of quantum computers. One solution to this security challenge is to use more advanced techniques to establish cryptographic keys that are not susceptible to attack. An essential part of quantum cryptography, Quantum Key Distribution (QKD) uses the principles of quantum physics to establish and distribute symmetric cryptographic keys between two geographically distant users. QKD establishes information-theoretically secure cryptographic keys that are resistant to eavesdropping when they are created. In this paper, we survey the security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations. We begin by examining the fundamentals of QKD and discuss the creation of QKD networks and their applications. We then outline QKD network architecture and its components and standards, following with a summary of QKD and post-quantum key distribution techniques and approaches for its integration into existing security frameworks such as VPNs (IPsec and MACsec). We also discuss the requirements, architecture and methods for implementing the FPGA-based encryptors needed to execute cryptographic algorithms with security keys. We discuss the performance and technologies of post-quantum cryptography, and finally, examine reported 5G demonstrations which have used quantum technologies, highlighting future research directions.

Jakob Axelsson, Damir Bilić, Daniel Brahneborg, Joakim Fröberg, Henrik Gustavsson, R. Jongeling, Daniel Sundmark

This article describes the architecture life cycle effect analysis (ALCEA) method, a structured method for evaluating proposed new architectures for software-intensive systems. The method evaluates a proposed architecture by quantifying its effect on the performance of system life-cycle phases. The method is instantiated by identifying the relevant life-cycle phases of the system under investigation and a set of evaluation functions that capture, in terms of basic factors, the effect of different architectural decisions on key life-cycle PAs, such as revenue, operating resources, and investments. The method results in a transparent cost and revenue structure, documented in a tabular form, based on quantifiable factors from the developing organization. The results of the method can be used directly as part of a business case, and their robustness can be estimated by sensitivity analysis. The ALCEA method is designed for system-level architectural analysis, covering both software and hardware aspects. In this article, we introduce the ALCEA method and provide a detailed example of how to apply it in the evolution of embedded systems. Moreover, we share early experiences of using the method in large-scale industrial settings.

Adriana Lipovac, Ante Mihaljevic, V. Lipovac

Large peak-to-average power ratio (PAPR) and carrier frequency offset (CFO) are dominant impairments of the orthogonal frequency-division multiplexing (OFDM) symbol transmission that is applied within the state-of-the-art wireless operator networks. In this work, we deal with consequences of the amplitude peak clipping that is commonly used at the transmitter to reduce the PAPR of the OFDM symbol, and thus prevent its non-linear distortion which would otherwise be imposed by the output high-power amplifier (HPA). Accordingly, regardless of the clipping generating mechanism at the transmitter being either inherent (related to the HPA) or deliberate (due to PAPR reduction), the clipped incoming OFDM symbol at the receiver may lead to degraded detection accuracy and transmission performance. However, the methods that have been applied so far at the receiver for compensating non-linear distortion due to clipping, are quite complex and computationally demanding. On the contrary, we propose effective mitigation of the problem to be performed at the receiver, by deriving the closed-form enhanced detection criterion, which requires common measurements of the mean and the rms values, as well as the autocorrelation of the received OFDM symbol comprising both un-clipped and clipped sections. Such improved detection was shown to significantly reduce the side effects of clipping, and restore satisfactory transmission performance – the bit error rate (BER) in particular. The proposed analytical model was preliminarily verified by versatile Monte-Carlo simulations and professional industry-standard vector signal analysis (VSA) test system, as well as by BER testing. The evident convergence of the three methods’ test results leads to the conclusion that the proposed clipped OFDM symbol detection method provides clear improvement with respect to the conventional one.

Amar Kustura, Berina Hasanefendić, Lajla Halilović, L. Ibričević-Balić, M. Suljić, Velda Smailbegović

Introduction: Breast cancer (BC) is a malignant disease that predominantly affects women, with known genetic components such as mutations in tumor suppressor genes BRCA1 and BRCA2. Other risk factors include unhealthy lifestyles, lack of physical activity, and consumption of alcohol and cigarettes. Aging also plays a role in BC development, with hormonal influences such as estrogen and progesterone promoting cancer growth. Material and Methods: Research was conducted using data collection tools for risk factors and tumor markers from primary healthcare unit records. The sample comprised 200 women, divided into two groups based on BC diagnosis, with complete medical documentation. Male BC cases were excluded. Results: Statistical significance was found between genetic components, family history, aging, obesity, alcohol and cigarette consumption, longer hormone exposure, and female BC development using the Chi-Square test, confirmed by Fisher's Exact test. Tumor markers CA 15-3, CEA, CA 19-9, and CA 125 were useful for BC screening and metastasis detection, as determined by the One Sample T-test. In Sarajevo Canton, invasive ductal BC was the most common type among women, while lobular carcinoma in situ was the least common. Conclusion: Correlations between risk factors, including aging, unhealthy lifestyles, and hormone exposure, and increased BC risk were confirmed. Tumor markers CA 15-3, CEA, CA 19-9, and CA 125 were effective in diagnosis, screening, and metastasis detection in females, with sensitivity for regression detection at 81.8% and specificity at 100%.

Indira Husić, Amela Dautbegović

The aim of the research was to examine the prevalence of unpleasant emotional states among students. An online survey was conducted in the month of April, 2023, and the participants were students of public universities in Bosnia and Herzegovina (N=170). Among the measuring instruments used was the DASS-21questionnaire (The Depression, Anxiety and Stress Scale-21, Lovibond and Lovibond 1995) and a sociodemographic questionnaire, constructed for the purposes of this research. It is expected that students will experience unpleasant emotional states such as anxiety, depression and stress, and that there will be certain differences in the manifestation of symptoms with regard to gender and age. The obtained findings showed that 34.3% of the subjects are in the category of moderate, severe and extremely severe depressive symptoms, then 49,9% of the subjects feel moderate, severe or extremly severe anxiety, while 38.2% of the subjects show moderate, severe and extremly severe symptoms of stress. As for gender and age differences, the results show that female students are more susceptible to the prevalence of unpleasant emotional states, while the hypotesis related to age differences was not confirmed. Namely, the findings indicate that there are no age differences in the manifestation of unpleasant emotional states. Considering the obtained findings, we believe that it is necessary to raise awareness about the significant growing problems of mental health among students and to highlight the need for preventive and intervention programs at universities.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više