Journal of Telecommunications and Information Technology最新文献

筛选
英文 中文
Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion 低复杂度 Turbo 解码停止规则:最大对数准则
Journal of Telecommunications and Information Technology Pub Date : 2024-02-12 DOI: 10.26636/jtit.2024.1.1377
Aissa Ouardi
{"title":"Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion","authors":"Aissa Ouardi","doi":"10.26636/jtit.2024.1.1377","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1377","url":null,"abstract":"This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"16 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139783113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based System Identification with Binary Output Data Using Kernel Methods 基于机器学习的系统识别,使用核方法识别二进制输出数据
Journal of Telecommunications and Information Technology Pub Date : 2024-02-12 DOI: 10.26636/jtit.2024.1.1430
Rachid Fateh, Hicham Oualla, Es-said Azougaghe, A. Darif, A. Boumezzough, Said Safi, M. Pouliquen, M. Frikel
{"title":"Machine Learning Based System Identification with Binary Output Data Using Kernel Methods","authors":"Rachid Fateh, Hicham Oualla, Es-said Azougaghe, A. Darif, A. Boumezzough, Said Safi, M. Pouliquen, M. Frikel","doi":"10.26636/jtit.2024.1.1430","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1430","url":null,"abstract":"Within the realm of machine learning, kernel methods stand out as a prominent class of algorithms with widespread applications, including but not limited to classification, regression, and identification tasks. Our paper addresses the challenging problem of identifying the finite impulse response (FIR) of single-input single-output nonlinear systems under the influence of perturbations and binary-valued measurements. To overcome this challenge, we exploit two algorithms that leverage the framework of reproducing kernel Hilbert spaces (RKHS) to accurately identify the impulse response of the Proakis C channel. Additionally, we introduce the application of these kernel methods for estimating binary output data of nonlinear systems. We showcase the effectiveness of kernel adaptive filters in identifying nonlinear systems with binary output measurements, as demonstrated through the experimental results presented in this study.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139842162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Low Power Thinned Smart Antenna for 6G Sky Connection 设计用于 6G 天空连接的低功耗薄型智能天线
Journal of Telecommunications and Information Technology Pub Date : 2024-02-12 DOI: 10.26636/jtit.2024.1.1438
Anindita Khan, J. S. Roy
{"title":"Design of Low Power Thinned Smart Antenna for 6G Sky Connection","authors":"Anindita Khan, J. S. Roy","doi":"10.26636/jtit.2024.1.1438","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1438","url":null,"abstract":"To improve radio access capability, sky connections relying on satellites or unmanned aerial vehicles (UAV), as well as high-altitude platforms (HAP) will be exploited in 6G wireless communication systems, complementing terrestrial networks. For long-distance communication, a large smart antenna will be used that is characterized by high amounts of power consumed by digital beamformers. This paper focuses on reducing power consumption by relying on a thinned smart antenna (TSA). The performance of TSA is investigated in the sub-6 GHz band. The differential evolution (DE) algorithm is used to optimize excitation weights of the individual dipoles in the antenna array and these excitation weights are then used in TSA for beamforming, with signal processing algorithms deployed. The DE technique is used with the least mean square, recursive least square and sample matrix inversion algorithms. The proposed method offers almost the same directivity, simultaneously ensuring lower side lobes (SLL) and reduced power consumption. For a TSA of 20, 31, and 64 dipoles, the power savings are 20%, 19.4%, and 17.2%, respectively. SLL reductions achieved, in turn, vary from 5.2 dB to 8.1 dB.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"119 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139785224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polarization Independent Ultra-wideband Meta-material Absorber Using Conductive Ink Resonator 使用导电墨水谐振器的独立于偏振的超宽带超材料吸收器
Journal of Telecommunications and Information Technology Pub Date : 2024-02-12 DOI: 10.26636/jtit.2024.1.1392
Bharti Kumari, Abhinav Kumar, Prashant Kumar, Mintu Singh
{"title":"Polarization Independent Ultra-wideband Meta-material Absorber Using Conductive Ink Resonator","authors":"Bharti Kumari, Abhinav Kumar, Prashant Kumar, Mintu Singh","doi":"10.26636/jtit.2024.1.1392","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1392","url":null,"abstract":"A wideband meta-material absorber with square and circular split rings that is based on a frequency selective surface of conductive ink is proposed. With over 90% absorptivity, the structure demonstrates broad absorption for the C, X, KU and K bands, as well as polarization independent characteristics for both TE and TM, at angles of up to 45°. Research has been performed to better understand the absorption phenomenon by looking into real and imaginary permittivity, permeability, normalized impedance, and surface current density. The meta-material absorber (MA) discussed in this study finds use in defense-related applications, such as radar surveillance, stealth technology, terrestrial and satellite communications.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"139 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139842946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion 低复杂度 Turbo 解码停止规则:最大对数准则
Journal of Telecommunications and Information Technology Pub Date : 2024-02-12 DOI: 10.26636/jtit.2024.1.1377
Aissa Ouardi
{"title":"Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion","authors":"Aissa Ouardi","doi":"10.26636/jtit.2024.1.1377","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1377","url":null,"abstract":"This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"181 27","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139843263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Complexity DOA Estimation Method Based on Joined Coprime Array 基于接合共点阵列的低复杂度 DOA 估算方法
Journal of Telecommunications and Information Technology Pub Date : 2024-01-18 DOI: 10.26636/jtit.2024.1.1350
Fatimah Salman, B. Sabbar
{"title":"Low-Complexity DOA Estimation Method Based on Joined Coprime Array","authors":"Fatimah Salman, B. Sabbar","doi":"10.26636/jtit.2024.1.1350","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1350","url":null,"abstract":"In this article, the elimination of ambiguity of a joined coprime array has been examined, with a focus on such of its properties as large aperture size and complete degree of freedom (DOF). The existing methods suffer from a high degree of computation complexity due to the loss constant characteristic and high peak searching. Therefore, in this paper, a DOA estimation method for a jointed coprime array, characterized by a low degree of computational complexity, is proposed. The variance of the diagonal eigenvalues of the estimated covariance matrix is designed to enhance the accuracy of the covariance matrix of the joined coprime array. Then, the Capon beamforming methods is employed for peak searching. The simulation shows that the proposed method accomplishes accurate estimation with shorter computation times and fewer operations compared to other DOA estimation methods.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"121 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks 星形拓扑无线传感器网络的高能效 ECC 验证密钥交换协议
Journal of Telecommunications and Information Technology Pub Date : 2024-01-18 DOI: 10.26636/jtit.2024.1.1389
A. Chmielowiec, Leszek Klich, Weronika Woś
{"title":"Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks","authors":"A. Chmielowiec, Leszek Klich, Weronika Woś","doi":"10.26636/jtit.2024.1.1389","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1389","url":null,"abstract":"The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"112 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Problem of Detecting Stops While Tracking Moving Objects Under the Stream Processing Regime 在流处理机制下跟踪移动物体时检测停止点的问题
Journal of Telecommunications and Information Technology Pub Date : 2023-12-29 DOI: 10.26636/jtit.2023.4.1481
Paweł Białoń
{"title":"A Problem of Detecting Stops While Tracking Moving Objects Under the Stream Processing Regime","authors":"Paweł Białoń","doi":"10.26636/jtit.2023.4.1481","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1481","url":null,"abstract":"The tracking of moving objects with the use of GPS/GNSS or other techniques is relied upon in numerous applications, from health monitoring and physical activity support, to social investigations to detection of fraud in transportation. While monitoring movement, a common subtask consists in determining the object's moving periods, and its immobility periods. In this paper, we isolate the mathematical problem of automatic detection of a stop of tracking objects under the stream processing regime (ideal data processing algorithm regime) in which one is allowed to use only a constant amount of memory, while the stream of GNSS positions of the tracked object increases in size. We propose an approximation scheme of the stop detection problem based on the fuzziness in the approximation of noise level related to the position reported by GNSS. We provide a solving algorithm that determines some upper bounds for the problem's complexity. We also provide an experimental illustration of the problem at hand.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139147308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Threat of Optical Transmission Jamming 光传输干扰的威胁
Journal of Telecommunications and Information Technology Pub Date : 2023-12-27 DOI: 10.26636/jtit.2023.4.1402
Marcin Kowalczyk, Michal Marzecki, Jerzy Siuzdak
{"title":"The Threat of Optical Transmission Jamming","authors":"Marcin Kowalczyk, Michal Marzecki, Jerzy Siuzdak","doi":"10.26636/jtit.2023.4.1402","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1402","url":null,"abstract":"In this paper, we investigate how data transmissions may be affected by various types of optical interference introduced into the fiber on purpose, via a clip-on coupler. The research proved that transmissions may be jammed completely using inexpensive equipment readily available on the market, provided that the attacker has physical access to the fiber optic cable. The most dangerous attacks rely on a typical, slowly modulated communication laser with a rectangular waveform. This study urges further research aimed at counteracting such attacks.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"107 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139154182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brief History of UTC Leap Second UTC闰秒简史
Journal of Telecommunications and Information Technology Pub Date : 2023-12-27 DOI: 10.26636/jtit.2023.4.1486
Włodzimierz Lewandowski, Michał Marszalec
{"title":"A Brief History of UTC Leap Second","authors":"Włodzimierz Lewandowski, Michał Marszalec","doi":"10.26636/jtit.2023.4.1486","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1486","url":null,"abstract":"Approximately once a year, since 1972, a leap second is introduced into UTC, the world's atomic time scale for civil time, to keep it in phase with the rotation of the Earth. Leap seconds ensure that, on average, the Sun continues to be overhead on the Greenwich meridian at noon to within about 1 s. The question of leap second is being debated since 2000 in different working groups of various international organizations, especially in the ITU-R WP 7A, is whether there still a need for the leap second, with its many technical inconveniences. In these groups overwhelmingly prevails an opinion that it would be better simply to let atomic time run freely and accept that the world's civil time scale will slowly diverge from the rotation of the Earth. The National Institute of Telecommunications in recent years became one of the leaders of this process. This article gives brief history of the current practice of UTC and outlines various solutions.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"19 S26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139154456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信