Volume 50, Issue 3-4, 2015

Issue 3-4, 2015


Vol. 50. No 3-4/2015
Monthly scientific and technical journal
Published by:
The Union of Electronics, Electrical Engineering and Telecommunications /CEEC/, BULGARIA




Nikolay Krastanov
SSH keys exchange protocol using identity based encryption 2

Kiril M. Kassev
 ...  read more

Performance evaluation of Internet traffic by network measurements

A review of the main methods for measurement Internet traffic is made. Some of software platforms for network measurements are discussed. The reasons for the need of measurement and monitoring of traffic in IP-based networks are: optimization ...  read more

A model of a single-phase synchronous generator with rare earth magnets

This paper makes a study of a single-phase synchronous 16-pole generator with axial magnetic field and rare earth magnets. A model of the synchronous generator has first been developed, taking into consideration its geometric dimensions, ...  read more

Algorithms for carrier frequency recovery in DVB−S2 receivers

In this paper six algorithm for carrier frequency recovery are examined, namely D&M, L&R, Fitz, M&M, Modified M&M and Kay. A mathematical description of algorithms and expressions for determining the frequency estimation ...  read more

Investigation of intrusion detection and intrusion prevention systems in eHealth hospital network

The fast growth of the requirements in the eHealth area leads to the problem of protection of personal data and the need of secure transmission via communication channels. The investigated and proposed in the paper solution may be used ...  read more

Power supply circuits for mobile wireless applications

Wireless battery-powered portable electronic devices give opportunity to the people to have faster communication with each other. The increased functionality of mobile phones enables large data packages to be transmitted in the real ...  read more

Energy efficiency of IEEE 802.11 WLANs with adaptive modulation schemes

Energy efficiency of wireless communication systems has recently drawn rising attention due to their widespread deployment. Wireless local area networks (WLANs) are an attractive choice for a broadband wireless connectivity to the global ...  read more

SSH keys exchange protocol using identity based encryption

This paper presents a protocol for exchanging SSH keys based on Identity Based Encryption (IBE). This type of encryption is used as an alternative to traditional cryptosystems. Its first practical solution is discussed in details (mathematical ...  read more