Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm 无人机群安全保障成群运动的数字孪生深度强化学习
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-06 DOI: 10.1002/ett.70011
Zhilin Li, Lei Lei, Gaoqing Shen, Xiaochang Liu, Xiaojiao Liu
{"title":"Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm","authors":"Zhilin Li,&nbsp;Lei Lei,&nbsp;Gaoqing Shen,&nbsp;Xiaochang Liu,&nbsp;Xiaojiao Liu","doi":"10.1002/ett.70011","DOIUrl":"https://doi.org/10.1002/ett.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Multi-agent deep reinforcement learning (MADRL) has become a typical paradigm for the flocking motion of UAV swarm in dynamic, stochastic environments. However, sim-to-real problems, such as reality gap, training efficiency, and safety issues, restrict the application of MADRL in flocking motion scenarios. To address these problems, we first propose a digital twin (DT)-enabled training framework. With the assistance of high-fidelity digital twin simulation, effective policies can be efficiently trained. Based on the multi-agent proximal policy optimization (MAPPO) algorithm, we then design the learning approach for flocking motion with matching observation space, action space, and reward function. Afterward, we employ a distributed flocking center estimation algorithm based on position consensus. The estimated center is used as a policy input to improve the aggregation behavior. Moreover, we introduce a repulsion scheme, which applies an additional repulsion force to the action to prevent UAVs from colliding with neighbors and obstacles. Simulation results show that our method performs well in maintaining flocking formation and avoiding collisions, and has better decision-making ability in near-realistic environments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology 利用深度学习和可信路由辅助区块链技术在 VANET 中预防流量和增强安全性
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-06 DOI: 10.1002/ett.70004
Cloudin Swamynathan, Revathy Shanmugam, Kanagasabapathy Pradeep Mohan Kumar, Balasubramani Subbiyan
{"title":"Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology","authors":"Cloudin Swamynathan,&nbsp;Revathy Shanmugam,&nbsp;Kanagasabapathy Pradeep Mohan Kumar,&nbsp;Balasubramani Subbiyan","doi":"10.1002/ett.70004","DOIUrl":"https://doi.org/10.1002/ett.70004","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary concept with enormous potential for developing safe and efficient transportation systems. Because VANETs are open networks that require regular information sharing, it might be difficult to ensure the security of data delivered through VANETs as well as driver privacy. This paper proposes a blockchain technology that supports trusted routing and deep learning for traffic prevention and security enhancement in VANETs. Initially, the proposed Feature Attention-based Extended Convolutional Capsule Network (FA_ECCN) model predicts the driver's behaviors such as normal, drowsy, distracted, fatigued, aggressive, and impaired. Next, the Binary Fire Hawks-based Optimized Link State Routing Protocol (BFH_OLSRP) is used to route traffic after trust values have been assessed. Furthermore, Binary Fire Hawks Optimization (BFHO) determines the best routing path based on criteria such as link stability and node stability degree. Finally, blockchain storage is supported by the Interplanetary File System (IPFS) technology to improve the security of VANET data. Additionally, the validation process is established by using Delegated Practical Byzantine Fault Tolerance (DPBFT). As a result, the proposed study employs the blockchain system to securely send data to neighboring vehicles via trust-based routing, thereby accurately predicting the driver's behavior. The proposed method achieves a better outcome in terms of latency, packet delivery ratio (PDR), overhead packets, throughputs, end-to-end delay, transmission overhead, and computational cost. According to simulation results and efficiency evaluation, the proposed approach outperforms existing approaches and enhances vehicle communication security in an effective manner.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security DSDOS 云:利用混合加密、基于区块链智能合约的访问控制和哈希验证码实现云安全的去中心化安全数据外包系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-06 DOI: 10.1002/ett.70016
K. L. Neela
{"title":"DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security","authors":"K. L. Neela","doi":"10.1002/ett.70016","DOIUrl":"https://doi.org/10.1002/ett.70016","url":null,"abstract":"<div>\u0000 \u0000 <p>With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an access key distributed by a third party. If this third party is untrustworthy, it poses a significant security threat to the system. To address this challenge, we propose a Decentralized Secure Data Outsourcing System (DSDOS) that uses blockchain technology to ensure data security and privacy. The DSDOS system comprises three modules: data security and privacy, access control and authorization, and data integrity and availability. The data security and privacy module uses a hybrid encryption scheme that combines Advanced Encryption Standard (AES), partially homomorphic encryption (PHE), and Diffie–Hellman (DH) to ensure secure data storage and access. The access control and authorization module uses a blockchain-based smart contract system to manage access to the encrypted data. The data integrity and availability module uses hash-based message authentication code (HMAC) to ensure that the data are not tampered with and is always available. We conducted a security and performance analysis of the DSDOS system and found that it outperforms previous schemes in terms of security and performance. The DSDOS system is a secure and privacy-preserving data outsourcing system that can be used to mitigate the security risks associated with traditional cloud storage systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints 基于深度强化学习的物理层安全增强设计,适用于具有实际约束条件的 RIS 辅助毫米波通信
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-05 DOI: 10.1002/ett.70007
Qingqing Tu, Zheng Dong, Chenfei Xie, Xianbing Zou, Ning Wei, Ya Li, Fei Xu
{"title":"A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints","authors":"Qingqing Tu,&nbsp;Zheng Dong,&nbsp;Chenfei Xie,&nbsp;Xianbing Zou,&nbsp;Ning Wei,&nbsp;Ya Li,&nbsp;Fei Xu","doi":"10.1002/ett.70007","DOIUrl":"https://doi.org/10.1002/ett.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Reconfigurable intelligent surfaces (RIS) offer new opportunities for enhancing security in millimeter-wave (mmWave) communications. However, some significant practical challenges still need to be addressed before their extensive implementation in future wireless networks. This article considers the practical constraints in a secure mmWave system aided by distributed RISs, including imperfect channel state information (CSI) in dynamic channel conditions and high complexity of non-convex optimization in complex environments. To address these challenges, we propose a robust and efficient physical layer security (PLS) enhancement algorithm based on the deep reinforcement learning (DRL) framework to effectively tackle the issues of limited dynamic adaptation and high computational complexity encountered with conventional optimization methods. This algorithm, utilizing an actor-critic architecture, can dynamically track channel variations and optimize strategies for improved system secrecy rate. Numerical simulations demonstrate that the proposed DRL-based PLS enhancement algorithm outperforms non-convex optimization benchmarks in robustness and efficiency for secure mmWave communication systems aided by distributed RISs and affected by imperfect CSI.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication 针对 IRS 辅助无线电力传输的最佳电容设计,实现可持续的物联网通信
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-30 DOI: 10.1002/ett.70010
Bhupendra Sharma, Anirudh Agarwal, Deepak Mishra, Soumitra Debnath, Santosh Shah
{"title":"Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication","authors":"Bhupendra Sharma,&nbsp;Anirudh Agarwal,&nbsp;Deepak Mishra,&nbsp;Soumitra Debnath,&nbsp;Santosh Shah","doi":"10.1002/ett.70010","DOIUrl":"https://doi.org/10.1002/ett.70010","url":null,"abstract":"<div>\u0000 \u0000 <p>Intelligent reflecting surface (IRS) is a cutting-edge technique that can significantly improve wireless propagation. It can efficiently utilize wireless power transfer to enable sustainable Internet-of-Things (IoT) transmission by reconfiguring the incident signal from the active transmitter. However, the flexibility of capacitance tuning in the IRS system, which controls underlying reflections, is often overlooked. The effective capacitance design in the IRS system can provide a new degree of freedom in the IoT communication system, which can enable additional performance gain in the received power. To achieve this, a novel IRS circuital optimization model is proposed in this work. It incorporates various electrical parameters of the meta-surface unit cell for improved IoT-enabled communication. The proposed optimization model provides an optimal capacitance as a function of phase shift (PS), which is controlled by IRS, incident frequency, and other IRS electrical parameters. This optimal capacitance is then used to define the received power. The convexity of the optimization problem is proved, and the global optimal capacitance is obtained for received power maximization. Our simulations show that the proposed optimization model outperforms the existing constructive interference-based optimal PS method, for which the capacitance is first calculated. Finally, the analytical results are numerically validated with several optimal design insights.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET 城域网中的恶意节点检测和安全路由协议深度人工免疫系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-25 DOI: 10.1002/ett.70008
S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar
{"title":"Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET","authors":"S. Syed Jamaesha,&nbsp;M. S. Gowtham,&nbsp;M. Ramkumar","doi":"10.1002/ett.70008","DOIUrl":"https://doi.org/10.1002/ett.70008","url":null,"abstract":"<div>\u0000 \u0000 <p>In the context of Mobile Ad Hoc Networks (MANETs), the dynamic and decentralized topology poses significant challenges like unreliable connectivity, limited bandwidth, node mobility, and vulnerability to security threats from malicious nodes. Ensuring secure and energy-efficient data transmission in such environments is crucial for mission-critical applications. This research addresses these pressing challenges by introducing a robust routing protocol capable of detecting and mitigating malicious nodes, thereby enhancing MANET's Quality of Service (QoS). The proposed approach, the Dendritic Cell with Adaptive Trust Q-learning Protocol (dDC-ATQP), integrates several innovative techniques to tackle these issues. Firstly, the trust evaluation mechanism assesses the behavior of nodes to identify potential malicious actors, mitigating the effect of malicious nodes on system execution. Secondly, the adaptive routing strategy optimizes data transmission paths based on real-time network conditions, reducing latency and packet loss. To evaluate the effectiveness of this approach, extensive simulations are conducted using a range of performance metrics. The results demonstrate significant improvements over existing methods, including a throughput increase of (79.2% in 50 s), lower end-to-end-delay (0.075 s for 20 nodes), energy consumption of (38.55/J), higher packet delivery ratio (98% for 20 nodes), reduced packet loss ratio (5% for 100 nodes), enhanced security (80% for 70 nodes).</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits 一种用于边缘计算资源分配的新颖有预算限制的成交拍卖机制
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-25 DOI: 10.1002/ett.70005
Jixian Zhang, Hao Sun, Zhemin Wang, Qian Su, Weidong Li
{"title":"A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits","authors":"Jixian Zhang,&nbsp;Hao Sun,&nbsp;Zhemin Wang,&nbsp;Qian Su,&nbsp;Weidong Li","doi":"10.1002/ett.70005","DOIUrl":"https://doi.org/10.1002/ett.70005","url":null,"abstract":"<div>\u0000 \u0000 <p>An auction mechanism is an effective resource allocation method that can increase the revenue of resource providers in the field of edge computing. Existing auction mechanism designs mostly aim to maximize social welfare when allocating resources, but these schemes lead to low revenue. In contrast, clinching auctions have achieved good results in spectrum allocation and advertising due to their high revenue. Therefore, a clinching auction mechanism is a promising tool for allocating edge computing resources. However, clinching auctions have the drawback that they can only allocate homogeneous finitely divisible goods, meaning that they cannot be directly applied for resource allocation in edge computing. This article presents two new auction mechanisms that improve on the clinching auction. Specifically, based on the principle of increasing global prices and local competition, two mechanisms are designed, one from the perspective of resource providers (MDCAM-ECS) and the other from the perspective of users (MDCAM-User), to solve the problem of edge computing resource allocation and pricing with deployment constraints and user budget constraints. The mechanisms proposed in this article have the properties of individual rationality, truthfulness, and computational efficiency. In the experiments, in terms of social welfare and revenue, our algorithms can achieve a 20% improvement over existing algorithms, such as fixed-price, Vickery–Clarke–Groves (VCG), and monotonic critical-price mechanisms. Additionally, in most experiments, our algorithm can ensure resource utilization greater than 80%.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning 深度强化学习驱动卫星通信中对延迟敏感的服务功能链智能迁移
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-24 DOI: 10.1002/ett.70006
Peiying Zhang, Yilin Li, Lizhuang Tan, Kai Liu, Miao Wen, Hao Hao
{"title":"Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning","authors":"Peiying Zhang,&nbsp;Yilin Li,&nbsp;Lizhuang Tan,&nbsp;Kai Liu,&nbsp;Miao Wen,&nbsp;Hao Hao","doi":"10.1002/ett.70006","DOIUrl":"https://doi.org/10.1002/ett.70006","url":null,"abstract":"<div>\u0000 \u0000 <p>Satellite communication technology solves the problem that the traditional wired network infrastructure is difficult to achieve global communication coverage. However, factors such as satellite orbits introduce frequent changes to the network topology, and challenges like satellite failures and communication link interruptions are prevalent. In the face of these issues, service function chain (SFC) migration becomes a crucial method for swiftly adjusting SFCs during faults, maintaining service continuity and availability. This article proposes a latency-sensitive SFC migration algorithm tailored to satellite networks. The algorithm first models the satellite network as a multi-domain virtual network, capturing the constraints faced during SFC migration. Subsequently, a deep reinforcement learning algorithm integrated attention mechanism is designed to more accurately capture and understand the complex network environment and dynamic satellite network topology and derive optimal SFC migration strategies for superior performance. Finally, through experimentation and evaluation of the deep reinforcement learning-driven latency-sensitive service function chain intelligent migration algorithm (LS-SFCM) in satellite communication, this study validates the effectiveness and superior performance of the algorithm in latency-sensitive scenarios. It provides a new avenue for enhancing the service quality and efficiency of satellite communication networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability 关于区块链技术的大量多语种文献综述:演变、挑战、平台、安全性和互操作性
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-23 DOI: 10.1002/ett.5037
Monika, Rajesh Bhatia, Manish Kumar
{"title":"An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability","authors":"Monika,&nbsp;Rajesh Bhatia,&nbsp;Manish Kumar","doi":"10.1002/ett.5037","DOIUrl":"https://doi.org/10.1002/ett.5037","url":null,"abstract":"<p>Blockchain technology has gained enormous interest from industry and academia recently. Technology enthusiasts are exploring its use case beyond cryptocurrencies and claim that blockchain technology can overcome the inefficiencies of centralized systems. In this study, we continue the work of previous authors, aiming to provide a more comprehensive understanding of the technical aspects of blockchain. This study is the first of its kind to review and analyze the current status of different technical aspects of blockchain technology influencing its adoption. We performed an extensive multivocal review to (i) demonstrate the progress of blockchain, (ii) discuss the challenges related to the wide-scale adoption of the technology, (iii) present a detailed analysis of blockchain platforms, (iv) highlight security and interoperability issues followed by the solutions proposed in the literature. We have considered 259 peer-reviewed research papers and the gray literature related to 40 blockchain platforms to provide an in-depth analysis of blockchain technology. In conclusion, this comprehensive survey provides a holistic view of blockchain technology's progress. It identifies challenges, trends, and future research directions, serving as a valuable resource for researchers and practitioners seeking to navigate the dynamic blockchain landscape.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Sierpinski Fractal Antennas for Millimeter-Wave 5G and Ground-Based Radio Navigation Applications 毫米波 5G 和地面无线电导航应用中的西尔平斯基分形天线设计与分析
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-22 DOI: 10.1002/ett.70001
Arun Raj, Durbadal Mandal
{"title":"Design and Analysis of Sierpinski Fractal Antennas for Millimeter-Wave 5G and Ground-Based Radio Navigation Applications","authors":"Arun Raj,&nbsp;Durbadal Mandal","doi":"10.1002/ett.70001","DOIUrl":"https://doi.org/10.1002/ett.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>The paper describes compact fractal antennae combined with ground defected structures (DGS) and substrate integrated waveguide (SIW) techniques for enhancing resonate and multiband behavior concerning bandwidth, gain, and radiation in the desired mm-wave region. Based on the proposed antennae, multiple good notches over wide bands depict a good radiation pattern. The antennae's ultra wide bandwidths (UWB) are 16, 16, and 11.4 GHz concerning resonant frequencies 26.34, 30.35, 34.5, 36.65 GHz; 25.8, 32.2, 35.3 GHz; 30.22, 37.68 GHz, of concerning antennae ant 1 (FA1), 4 (FA2), and 6 (FA3), respectively. The proposed antenna (FA3) with the SIW technique has a peak gain of 5.9 dBi and a peak front-to-back ratio of 20 dB, respectively. The proposed antennas are targeted to cover the practical contribution aspect, including advanced 5G bands support (24–40 GHz), broadband spectrum, frequency agility, low 3 dB beamwidth, interference reduction, and medical application suitability, respectively. The proposed antennae also cover the desired mm wave 5G region with different resonating notches over ultra-wide bandwidth, such as n257, n258, n259, n260, and n261, and ground-based radio navigation applications. Results are validated with vector network analyzer, spectrum analyzer, and power sensor in the presence of absorber, respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信