Telecom最新文献

筛选
英文 中文
Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM) 安全设计的实时医疗物联网架构:电子健康人口监测 (RTPM)
Telecom Pub Date : 2024-07-10 DOI: 10.3390/telecom5030031
Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet, Ben Sanders
{"title":"Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)","authors":"Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet, Ben Sanders","doi":"10.3390/telecom5030031","DOIUrl":"https://doi.org/10.3390/telecom5030031","url":null,"abstract":"The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"16 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141659426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Network Deployment Planning Using Metaheuristic Approaches 利用元智方法进行 5G 网络部署规划
Telecom Pub Date : 2024-07-09 DOI: 10.3390/telecom5030030
Binod Sapkota, Rijan Ghimire, Paras Pujara, Shashank Ghimire, Ujjwal Shrestha, Roshani Ghimire, Babu R. Dawadi, Shashidhar R. Joshi
{"title":"5G Network Deployment Planning Using Metaheuristic Approaches","authors":"Binod Sapkota, Rijan Ghimire, Paras Pujara, Shashank Ghimire, Ujjwal Shrestha, Roshani Ghimire, Babu R. Dawadi, Shashidhar R. Joshi","doi":"10.3390/telecom5030030","DOIUrl":"https://doi.org/10.3390/telecom5030030","url":null,"abstract":"The present research focuses on optimizing 5G base station deployment and visualization, addressing the escalating demands for high data rates and low latency. The study compares the effectiveness of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), and Grey Wolf Optimizer (GWO) in both Urban Macro (UMa) and Remote Macro (RMa) deployment scenarios that overcome the limitations of the current method of 5G deployment, which involves adopting Non-Standalone (NSA) architecture. Emphasizing population density, the optimization process eliminates redundant base stations for enhanced efficiency. Results indicate that PSO and GA strike the optimal balance between coverage and capacity, offering valuable insights for efficient network planning. The study includes a comparison of 28 GHz and 3.6 GHz carrier frequencies for UMa, highlighting their respective efficiencies. Additionally, the research proposes a 2.6 GHz carrier frequency for Remote Macro Antenna (RMa) deployment, enhancing 5G Multi-Tier Radio Access Network (RAN) planning and providing practical solutions for achieving infrastructure reduction and improved network performance in a specific geographical context.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"113 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams 研究不同 TCP DoS 攻击对 VoIP 流参数的影响
Telecom Pub Date : 2024-07-08 DOI: 10.3390/telecom5030029
Ivan Nedyalkov
{"title":"Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams","authors":"Ivan Nedyalkov","doi":"10.3390/telecom5030029","DOIUrl":"https://doi.org/10.3390/telecom5030029","url":null,"abstract":"In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the performance of the specific devices under attack. In this work, a study was carried out to determine how individual TCP DoS attacks affect the parameters of VoIP (Voice over IP) voice and video streams. For the purpose of this work, a model of a simple IP network has been created using the GNS3 IP network-modeling platform. The VoIP platform used was Asterisk Free PBX. Tools from Kali Linux were used to implement the individual TCP DoS attacks; IP-network-monitoring tools and round-trip-delay-measurement tools were also used. The proposed study is applicable to multiple VoIP platforms wherein voice and video traffic are passed/processed by the VoIP server. From the obtained results, it was found that Asterisk Free PBX is very well secured against TCP DoS attacks, which do not affect the platform performance or the parameters of the voice and video streams. The values of the observed parameters, such as jitter, packet loss, round-trip delay, etc., are very far from the maximum allowable values. We also observed a low load on the CPU and RAM of the system during the whole study.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":" 673","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-GRU-APSO: Bi-Directional Gated Recurrent Unit with Adaptive Particle Swarm Optimization Algorithm for Sales Forecasting in Multi-Channel Retail Bi-GRU-APSO:双向门控循环单元与自适应粒子群优化算法用于多渠道零售业销售预测
Telecom Pub Date : 2024-07-01 DOI: 10.3390/telecom5030028
Aruna Mogarala Guruvaya, Archana Kollu, P. Divakarachari, Przemysław Falkowski‐Gilski, H. Praveena
{"title":"Bi-GRU-APSO: Bi-Directional Gated Recurrent Unit with Adaptive Particle Swarm Optimization Algorithm for Sales Forecasting in Multi-Channel Retail","authors":"Aruna Mogarala Guruvaya, Archana Kollu, P. Divakarachari, Przemysław Falkowski‐Gilski, H. Praveena","doi":"10.3390/telecom5030028","DOIUrl":"https://doi.org/10.3390/telecom5030028","url":null,"abstract":"In the present scenario, retail sales forecasting has a great significance in E-commerce companies. The precise retail sales forecasting enhances the business decision making, storage management, and product sales. Inaccurate retail sales forecasting can decrease customer satisfaction, inventory shortages, product backlog, and unsatisfied customer demands. In order to obtain a better retail sales forecasting, deep learning models are preferred. In this manuscript, an effective Bi-GRU is proposed for accurate sales forecasting related to E-commerce companies. Initially, retail sales data are acquired from two benchmark online datasets: Rossmann dataset and Walmart dataset. From the acquired datasets, the unreliable samples are eliminated by interpolating missing data, outlier’s removal, normalization, and de-normalization. Then, feature engineering is carried out by implementing the Adaptive Particle Swarm Optimization (APSO) algorithm, Recursive Feature Elimination (RFE) technique, and Minimum Redundancy Maximum Relevance (MRMR) technique. Followed by that, the optimized active features from feature engineering are given to the Bi-Directional Gated Recurrent Unit (Bi-GRU) model for precise retail sales forecasting. From the result analysis, it is seen that the proposed Bi-GRU model achieves higher results in terms of an R2 value of 0.98 and 0.99, a Mean Absolute Error (MAE) of 0.05 and 0.07, and a Mean Square Error (MSE) of 0.04 and 0.03 on the Rossmann and Walmart datasets. The proposed method supports the retail sales forecasting by achieving superior results over the conventional models.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"1 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141703289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Beamforming Efficiency Utilizing Taguchi Optimization and Neural Network Acceleration 利用田口优化和神经网络加速提高波束成形效率
Telecom Pub Date : 2024-06-07 DOI: 10.3390/telecom5020023
Ramzi Kheder, R. Ghayoula, A. Smida, I. El Gmati, Lassad Latrach, W. Amara, Amor Hammami, J. Fattahi, M. Waly
{"title":"Enhancing Beamforming Efficiency Utilizing Taguchi Optimization and Neural Network Acceleration","authors":"Ramzi Kheder, R. Ghayoula, A. Smida, I. El Gmati, Lassad Latrach, W. Amara, Amor Hammami, J. Fattahi, M. Waly","doi":"10.3390/telecom5020023","DOIUrl":"https://doi.org/10.3390/telecom5020023","url":null,"abstract":"This article presents an innovative method for efficiently synthesizing radiation patterns by combining the Taguchi method and neural networks, validating the results on a ten-element antenna array. The Taguchi method aims to minimize product and process variability, while neural networks are used to model the relationship between antenna design parameters and radiation pattern characteristics. This approach utilizes Taguchi parameters as inputs for the neural network, which is then trained on a dataset generated by the Taguchi method. After training, the network is validated using a real ten-element antenna array. Analytical results demonstrate that this method enables efficient synthesis of radiation patterns, with a significant reduction in computation time compared to traditional approaches. Furthermore, validation on the antenna array confirms the accuracy and robustness of the approach, showing a high correlation between the performance predicted by the neural network model and actual measurements on the antenna array. In summary, our article highlights that the combined use of the Taguchi method and neural networks, with validation on a real antenna array, offers a promising approach for efficient synthesis of antenna radiation patterns. This approach combines speed, accuracy, and reliability in antenna system design.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":" 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141373163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging Industrial Internet of Things Open-Source Platforms and Applications in Diverse Sectors 新兴工业物联网开源平台及在各行各业的应用
Telecom Pub Date : 2024-05-14 DOI: 10.3390/telecom5020019
Eyuel Debebe Ayele, Stylianos Gavriel, Javier Ferreira Gonzalez, Wouter B. Teeuw, Panayiotis Philimis, Ghayoor Gillani
{"title":"Emerging Industrial Internet of Things Open-Source Platforms and Applications in Diverse Sectors","authors":"Eyuel Debebe Ayele, Stylianos Gavriel, Javier Ferreira Gonzalez, Wouter B. Teeuw, Panayiotis Philimis, Ghayoor Gillani","doi":"10.3390/telecom5020019","DOIUrl":"https://doi.org/10.3390/telecom5020019","url":null,"abstract":"Revolutionary advances in technology have been seen in many industries, with the IIoT being a prime example. The IIoT creates a network of interconnected devices, allowing smooth communication and interoperability in industrial settings. This not only boosts efficiency, productivity, and safety but also provides transformative solutions for various sectors. This research looks into open-source IIoT and edge platforms that are applicable to a range of applications with the aim of finding and developing high-potential solutions. It highlights the effect of open-source IIoT and edge computing platforms on traditional IIoT applications, showing how these platforms make development and deployment processes easier. Popular open-source IIoT platforms include DeviceHive and Thingsboard, while EdgeX Foundry is a key platform for edge computing, allowing IIoT applications to be deployed closer to data sources, thus reducing latency and conserving bandwidth. This study seeks to identify potential future domains for the implementation of IIoT solutions using these open-source platforms. Additionally, each sector is evaluated based on various criteria, such as development requirement analyses, market demand projections, the examination of leading companies and emerging startups in each domain, and the application of the International Patent Classification (IPC) scheme for in-depth sector analysis.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"107 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140977857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wide Bandwidth Vivaldi Antenna Suitable for 5G/6G Communication Utilizing a CMOS 0.18 μm Process 利用 CMOS 0.18 μm 工艺制造的适用于 5G/6G 通信的宽带宽 Vivaldi 天线
Telecom Pub Date : 2024-05-14 DOI: 10.3390/telecom5020020
Ming-An Chung, Chung-Wu Ting, Kuo-Chun Tseng
{"title":"A Wide Bandwidth Vivaldi Antenna Suitable for 5G/6G Communication Utilizing a CMOS 0.18 μm Process","authors":"Ming-An Chung, Chung-Wu Ting, Kuo-Chun Tseng","doi":"10.3390/telecom5020020","DOIUrl":"https://doi.org/10.3390/telecom5020020","url":null,"abstract":"This text proposes a Vivaldi structure array antenna, using a power divider structure. The composition includes an antenna array with four antennas, suitable for a wideband array structure antenna in the 100 GHz frequency band. The goal is to address the challenges faced by monolithic systems in modern wireless communications, particularly the issue of the inapplicability of antennas on silicon substrates. The Vivaldi antenna was chosen for its wide bandwidth, high efficiency, and stable radiation pattern. It combines the characteristics of a wide scanning angle and ultra-wide bandwidth. Through integration with CMOS technology, the developed antenna achieved a bandwidth of 85.47–102.40 GHz. The peak gain reached −4 dBi, corresponding to a bandwidth of 17.7%. And the antenna volume was only 1.2 mm × 1.2 mm, demonstrating its immense potential in high-frequency wireless applications.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"28 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140980134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Cost, Open-Source, Experimental Setup Communication Platform for Emergencies, Based on SD-WAN Technology 基于 SD-WAN 技术的低成本、开源、试验性应急设置通信平台
Telecom Pub Date : 2024-05-02 DOI: 10.3390/telecom5020018
Vasileios Cheimaras, Spyridon Papagiakoumos, Nikolaos Peladarinos, Athanasios Trigkas, P. Papageorgas, Dimitrios D. Piromalis, R. A. Munteanu
{"title":"Low-Cost, Open-Source, Experimental Setup Communication Platform for Emergencies, Based on SD-WAN Technology","authors":"Vasileios Cheimaras, Spyridon Papagiakoumos, Nikolaos Peladarinos, Athanasios Trigkas, P. Papageorgas, Dimitrios D. Piromalis, R. A. Munteanu","doi":"10.3390/telecom5020018","DOIUrl":"https://doi.org/10.3390/telecom5020018","url":null,"abstract":"The rapid advancement of communication technologies underscores the urgent need for robust and adaptable emergency communication systems (ECSs), particularly crucial during crises and natural disasters. Although network-based ECSs have been extensively studied, integrating open-source technologies, such as software-defined wide area networks (SD-WAN) with private long-term evolution (LTE) base stations, is a relatively unexplored domain. This study endeavors to fill this gap by introducing an experimental ECS platform that utilizes a hybrid network, incorporating a VoIP network to enhance open-source and on-premises communications in targeted areas. Our hypothesis posits that a hybrid network architecture, combining SD-WAN and private LTE, can substantially improve the reliability and efficiency of ECSs. Our findings, supported by the open-source OMNeT++ simulator, illuminate the enhanced communication reliability of the network. Moreover, the proposed platform, characterized by autonomous wireless 4G/LTE base stations and an Asterisk VoIP server, demonstrates improved quality of service (QoS) and quality of experience (QoE), with minimal data loss. This research not only has immediate practical applications but also bears significant implications for the development of cost-effective, open-source communication networks, optimized for emergencies, critical infrastructure, and remote areas.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"60 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141019456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature-Selection-Based DDoS Attack Detection Using AI Algorithms 利用人工智能算法进行基于特征选择的 DDoS 攻击检测
Telecom Pub Date : 2024-04-17 DOI: 10.3390/telecom5020017
Muhammad Saibtain Raza, M. A. Sheikh, I. Hwang, M. Ab-Rahman
{"title":"Feature-Selection-Based DDoS Attack Detection Using AI Algorithms","authors":"Muhammad Saibtain Raza, M. A. Sheikh, I. Hwang, M. Ab-Rahman","doi":"10.3390/telecom5020017","DOIUrl":"https://doi.org/10.3390/telecom5020017","url":null,"abstract":"SDN has the ability to transform network design by providing increased versatility and effective regulation. Its programmable centralized controller gives network administration employees more authority, allowing for more seamless supervision. However, centralization makes it vulnerable to a variety of attack vectors, with distributed denial of service (DDoS) attacks posing a serious concern. Feature selection-based Machine Learning (ML) techniques are more effective than traditional signature-based Intrusion Detection Systems (IDS) at identifying new threats in the context of defending against distributed denial of service (DDoS) attacks. In this study, NGBoost is compared with four additional machine learning (ML) algorithms: convolutional neural network (CNN), Stochastic Gradient Descent (SGD), Decision Tree, and Random Forest, in order to assess the effectiveness of DDoS detection on the CICDDoS2019 dataset. It focuses on important measures such as F1 score, recall, accuracy, and precision. We have examined NeTBIOS, a layer-7 attack, and SYN, a layer-4 attack, in our paper. Our investigation shows that Natural Gradient Boosting and Convolutional Neural Networks, in particular, show promise with tabular data categorization. In conclusion, we go through specific study results on protecting against attacks using DDoS. These experimental findings offer a framework for making decisions.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":" 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140690272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Horn Antenna on Chip Operating at 180 GHz Using the SiGe CMOS Process 使用 SiGe CMOS 工艺在 180 GHz 频率下工作的片上喇叭天线
Telecom Pub Date : 2024-04-08 DOI: 10.3390/telecom5020015
Ming-An Chung, Zi-Yu Huang, Yu-Hsun Chen
{"title":"Horn Antenna on Chip Operating at 180 GHz Using the SiGe CMOS Process","authors":"Ming-An Chung, Zi-Yu Huang, Yu-Hsun Chen","doi":"10.3390/telecom5020015","DOIUrl":"https://doi.org/10.3390/telecom5020015","url":null,"abstract":"This article proposes a chip antenna on millimeter-Waves. This antenna combined with TSMC 180 nm SiGe CMOS technology has the advantage of being small in size and is suitable for wireless communications. The multilayer architecture Horn antenna implemented on M4–M6 can meet both process reliability specifications and radiation performance. The results of the simulation show that the maximum gain is −4.2 dBi. The return loss measurement results are almost consistent with the simulation results, and the bandwidth range is 177.4–183 GHz. This article first describes the antenna production process and measurement results, analyses the impact of the parameters on the antenna, and further compares it with other designs. The excellence of this article is that it proposes a design that solves the problem of large millimeter wave loss and successfully reduces the area. At the same time, this article can contribute to readers’ future optimization and continued research directions, and at the same time contribute simulation and measurement trends to let readers understand the stability of CMOS chip antenna simulation and measurement.","PeriodicalId":509646,"journal":{"name":"Telecom","volume":"78 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信