{"title":"Hybrid Spectrum Sensing Enhancement for Cognitive Radio in 6G Radio System","authors":"Nishant Gaur, Nidhi Gour, Himanshu Sharma","doi":"10.3103/s0735272723050023","DOIUrl":"https://doi.org/10.3103/s0735272723050023","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>This article highlights the potential advantages of the proposed hybrid algorithm for 6G. The algorithm’s adaptability addresses the dynamic spectral characteristics of 6G environments, enabling a seamless transition between different spectral conditions. The hybrid approach holds promise for enhancing spectrum utilization, reducing interference, and optimizing overall communication system performance. As 6G technology evolves, the integration of energy detection and cyclostationary spectrum sensing through the hybrid algorithm offers a glimpse into innovative techniques that can shape the future of wireless communication, unlocking the potential for enhanced connectivity, efficiency, and user experience. Several parameters such as the probability of detection (<i>P</i><sub>d</sub>), probability of false alarm (<i>P</i><sub>fa</sub>), bit error rate (BER), and power spectral density (PSD) are compared and analyzed with the conventional spectrum sensing algorithms. We see that the proposed hybrid algorithms obtain a substantial detection performance at the low signal-to-noise ratio (SNR).</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Battula Nancharaiah, Kiran Chand Ravi, Ajeet Kumar Srivastava, K. Arunkumar, Shams Tabrez Siddiqui, M. R. Arun
{"title":"Analysis of Data Science and AI-enabled 6G Wireless Communication Networks","authors":"Battula Nancharaiah, Kiran Chand Ravi, Ajeet Kumar Srivastava, K. Arunkumar, Shams Tabrez Siddiqui, M. R. Arun","doi":"10.3103/s0735272723050059","DOIUrl":"https://doi.org/10.3103/s0735272723050059","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Current networks (such as 4G and the forthcoming 5G networks) may not be capable of fully congregating quickly emerging traffic strains due to the proliferation of smart fatal, infrastructures and the explosion of diverse applications with varying necessities. As a result, 6G network research has already seen participation from both the private sector and the academic community. Recently, an innovative paradigm has emerged for the intelligent design and optimization of 6G networks based on the combination of artificial intelligence (AI) and data science (DS). Therefore, this article proposes an AI-enabled architecture for 6G networks, which is alienated into four layers: intelligent sensing, data analytics, intelligent control, and smart application, to realize patterns sighting, smart resource management, automatic network adjustment, and intelligent service provisioning. We go over the uses of DS&AI methods in 6G networks, such as AI-enhanced mobile edge computing, intelligent mobility, and smart-spectrum management, and how to implement these methods to maximize the network’s performance. We also emphasize key areas for future study and clarifications for AI-enabled 6G networks, together with computational efficiency, algorithm resilience, hardware development, and energy management.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, Aasif Aftab, Mohammad Shahid Kamal, Fazal Imam Shahi
{"title":"Evolution of Wireless Communication Networks from 5G to 6G: Future Perspective","authors":"Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, Aasif Aftab, Mohammad Shahid Kamal, Fazal Imam Shahi","doi":"10.3103/s0735272723050047","DOIUrl":"https://doi.org/10.3103/s0735272723050047","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Industry 4.0 relies heavily on artificial intelligence (AI) and cloud computing (CC), both of which have been greatly aided by the 5-generation mobile network (5G). However, the arrival of 5G, is seen as a watershed moment that will radically alter the current global trends in wireless communication practices and the lives of the masses. 5G envisions a future where the digital and physical worlds merge. The 6th-generation (6G) wireless communication network will likely unite terrestrial, aerial, and maritime communications into a single, unified system that is both more stable and faster and can accommodate a far larger number of devices with ultra-low latency needs. The purpose of this research is to foresee a scenario in which 6G supersedes 5G as the dominant standard for wireless communication in the years to come. Several advances have been made, but the desired instantaneous global communication and computation with no latency has not arrived yet. In this paper, there are represented the most significant obstacles and difficulties that the transition from 5G to 6G can encounter on the way to realizing these loftier goals. The main purpose of “technology for humanity” is to improve service to the world’s most disadvantaged people, and this paper lays out a plan for 6G that includes the enabling technology infrastructures, obstacles, and research directions that will get us there.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganographic Method with Code Control of Information Embedding Based on Multi-level Code Words","authors":"A. A. Kobozeva, A. V. Sokolov","doi":"10.3103/s0735272723040052","DOIUrl":"https://doi.org/10.3103/s0735272723040052","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Effective steganographic methods are an integral part of modern information security systems. At the same time, one of the key requirements for modern steganographic methods, taking into account their needed implementation on mobile and IoT devices, is their low resource consumption maintaining high perception reliability, throughput, and resistance to attacks against the embedded message. The steganographic method with code control of additional information embedding using multi-level code words is presented in this work. A new synthesis approach of multi-level code words with a high selectivity coefficient is developed. It allows us to ensure the specified properties of steganographic messages. Sets of multi-level code words of practically valuable sizes are synthesized and studied. Experimental studies of the effectiveness of the steganographic method with embedding code control based on the presented multi-level code words are conducted. They ensure a high level of its resistance to attacks against the embedded message, by compression, noise superimposing, and blurring, while ensuring sufficient bandwidth and perception reliability in practice.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Reflection Method in Problem of Constructive Synthesis of Polarizers and Phase Shifters Based on Three Non-dissipative Inhomogeneities in Waveguide","authors":"Fedor Dubrovka, Andrew Bulashenko","doi":"10.3103/s0735272722110036","DOIUrl":"https://doi.org/10.3103/s0735272722110036","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The paper presents the results of developing an analytical method for constructive synthesis of waveguide polarizers and phase shifters based on three non-dissipative inhomogeneous elements. The analytical synthesis of such devices was carried out based on solving the problem of electromagnetic wave propagation in a waveguide segment with three non-dissipative inhomogeneities by the method of multiple reflections in the single-wave approximation. The proposed approach allowed us to obtain a clear physical substantiation of the mathematical formulation of conditions for the analytical synthesis of polarizers and phase shifters based on three non-dissipative inhomogeneities in a waveguide. As a result, simple formulas have been obtained that determine the parameters of phase-shifting elements and the electrical distance between them, at which there are no reflections and the desired phase shift is provided. The constructive synthesis of a polarizer is based on the conditions of equality of the required and real admittances of the reactive elements in the waveguide and their derivatives at the central frequency of the operating frequency range. As a result, the optimal geometric dimensions of the device structure were determined. As a result, the optimal geometric dimensions of the device structure are determined. It is shown that a polarizer based on three pins in a square waveguide can provide an operating frequency bandwidth of 10% with electromagnetic energy reflection of less than 1% and a differential phase shift of Δφ = 90° ± 1°, and an operating frequency bandwidth of up to 18% with an admissible reflection of 10% of energy and a differential phase shift of Δφ = 90° ± 2°. The theoretical results are confirmed by high-precision electrodynamic simulation and by experiments on the manufactured prototype of the original controlled X-band polarizer with the maximally flat phase-frequency characteristic based on three symmetrical metal pins inserted into a circular waveguide. The developed analytical method for the constructive synthesis of waveguide polarizers based on three inhomogeneities is intended both for independent use and for obtaining initial values of dimensions of the polarizing device to radically accelerate the search for a global extremum in the process of multiparameter optimization in the high-precision constructive synthesis of such a device at the electrodynamic level, taking into account higher types of waves and the interaction between inhomogeneities on higher types of waves.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuriy Shapovalov, Dariya Bachyk, Ksenia Detsyk, Roman Romaniuk, Ivan Shapovalov
{"title":"Analysis of Complex Linear Periodically Time-Varying Circuits by Method of Reduced Matrix D-Trees","authors":"Yuriy Shapovalov, Dariya Bachyk, Ksenia Detsyk, Roman Romaniuk, Ivan Shapovalov","doi":"10.3103/s0735272723060018","DOIUrl":"https://doi.org/10.3103/s0735272723060018","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The paper proposes the method of reduced matrix D-trees, which is an improved version of the method of matrix d-trees. This method is a further development of the application of one of the subcircuit methods, the so-called d-tree method, to the symbolic analysis of linear circuits with constant parameters The method of reduced matrix D-trees, like the d-tree method, provides a significant reduction in the required computer time for modeling circuits, which has a mathematical meaning, consisting in the bringing out of similar terms in the formed complex symbolic expressions. Since there are, in fact, many symbolic terms in such expressions, this reduction in time is due to such factoring. The method is illustrated using a model of a long line consisting of a cascade connection of a large number of elementary links. The results of the computer simulation are also presented.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peak to Average Power Ratio Reduction Using Companding Algorithm for NOMA Waveform","authors":"Arun Kumar, Nishant Gaur","doi":"10.3103/s0735272723040039","DOIUrl":"https://doi.org/10.3103/s0735272723040039","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Future wireless communication systems can accommodate huge connections and improve spectrum efficiency by using the approach based on non-orthogonal multiple access (NOMA). High peak-to-average power ratio (PAPR) levels can, however, negatively affect NOMA, resulting in decreased system performance and more complicated power amplifiers. This study suggests PAPR reduction in NOMA by utilizing companding methods for 512, 256, and 64 sub-carriers to address this problem. The high peak power of NOMA signals may be effectively compressed by using nonlinear companding techniques, such as μ-law and A-law companding, which reduces distortion and improves overall system dependability. Simulations are used to assess the effectiveness of the suggested companding methods, and the findings show a significant reduction in PAPR assuring an increased bit error rate (BER) effectiveness and transmission resilience in NOMA-based communication systems. The suggested method is contrasted with the conventional A-law (C-A-Law) and μ-law (C-μ-law).</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivan Vikulin, Oleksandr Nazarenko, Lidiya Vikulina, Pavlo Markolenko
{"title":"Effect of Penetrating Radiation on Sensitivity of Magnetotransistors","authors":"Ivan Vikulin, Oleksandr Nazarenko, Lidiya Vikulina, Pavlo Markolenko","doi":"10.3103/s0735272723060055","DOIUrl":"https://doi.org/10.3103/s0735272723060055","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>An experimental study of the effect of radiation emissions (neutrons, gamma radiation) on the sensitivity of industrial bipolar <i>n-p-n</i> magnetotransistors has been carried out. It has been shown that neutron irradiation leads to defects in the structure, which reduces the effective lifetime of the injected charge carriers and decreases the magnetosensitivity. Gamma radiation with increasing intensity first destroys the surface structural defects and increases the lifetime of carriers and magnetoresponsiveness, and then penetrates deeper forming defects and reducing magnetoresponsiveness. This makes it possible to use gamma radiation with an intensity of up to 10<sup>7</sup> R as a technological method of increasing magnetosensitivity.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"164 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahendra Shridhar Naik, Desai Karanam Sreekantha, Kanduri V. S. S. S. S. Sairam
{"title":"Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review)","authors":"Mahendra Shridhar Naik, Desai Karanam Sreekantha, Kanduri V. S. S. S. S. Sairam","doi":"10.3103/s0735272723050011","DOIUrl":"https://doi.org/10.3103/s0735272723050011","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Lightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we consider hardware-based block ciphers (BC). The BCs are thoroughly described using the substitution permutation network (SPN) and Feistel network (FN) structures. A detailed summary of each SPN and FN-based BC is provided. Furthermore, the paper compares and thoroughly analyses the performance analysis of modern SPN and FN-based BCs. For each block cipher, performance measures such as chip area (slices), frequency, latency, throughput, and hardware efficiency are reviewed. The paper also recommends appropriate ciphers for the greatest and lowest performance indicators. Among BCs, the PRINCE cipher has minimal latency and great throughput. The research also reveals that the LED and PRESENT ciphers are more compact than other ciphers. The open research challenges are also presented with a forward-looking perspective.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140591731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Framework for Analysis of Health Factors in Internet-of-Medical Things","authors":"Syed Hauider Abbas, Ramakrishna Kolikipogu, Vuyyuru Lakshma Reddy, Jnaneshwar Pai Maroor, Deepak Kumar, Mangal Singh","doi":"10.3103/s0735272723030056","DOIUrl":"https://doi.org/10.3103/s0735272723030056","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The introduction of IoT technologies, such as those used in remote health monitoring applications, has revolutionized conventional medical care. Furthermore, the approach utilized to obtain insights from the scrutiny of lifestyle elements and activities is crucial to the success of tailored healthcare and disease prevention services. Intelligent data retrieval and classification algorithms allow for the investigation of disease and the prediction of aberrant health states. The convolutional neural network (CNN) strategy is utilized to forecast such anomaly because it can successfully recognize the knowledge significant to disease anticipation from amorphous medical heath records. Conversely, if a fully coupled network-topology is used, CNN guzzles a huge memory. Furthermore, the complexity analysis of the model may rise as the number of layers grows. Therefore, we present a CNN target recognition and anticipation strategy based on the Pearson correlation coefficient (PCC) and standard pattern activities to address these shortcomings of the CNN model. It is built in this framework and used for classification purposes. In the initial hidden layer, the most crucial health-related factors are chosen, and in the next, a correlation-coefficient examination is performed to categorize the health factors into positively and negatively correlated groups. Mining the occurrence of regular patterns among the categorized health parameters also reveals the behavior of regular patterns. The model output is broken down into obesity, hypertension, and diabetes-related factors with known correlations. To lessen the impact of the CNN-typical knowledge discovery paradigm, we use two separate datasets. The experimental results reveal that the proposed model outperforms three other machine learning techniques while requiring less computational effort.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"203 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140592053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}