[go: up one dir, main page]

Previous Issue
Volume 5, June
 
 

Telecom, Volume 5, Issue 3 (September 2024) – 21 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
13 pages, 1005 KiB  
Article
Modulation Recognition System of Electromagnetic Interference Signal Based on SDR
by Wei Dai and Changpeng Ji
Telecom 2024, 5(3), 928-940; https://doi.org/10.3390/telecom5030046 - 11 Sep 2024
Viewed by 265
Abstract
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate [...] Read more.
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate of the interference signal and completes clock synchronization and matching filtering under the condition of unknown a priori information. By extracting high-order cumulants as characteristic parameters, combined with the decision tree classifier, the classification and recognition of six modulation types of interference signals and signal phase correction are realized. This method can distinguish the recognition results in combination with the signal constellation, and complete the real-time reception and recognition of interference signals. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of the software radio modulation recognition system.</p>
Full article ">Figure 2
<p>Simulation results of different characteristic parameter.</p>
Full article ">Figure 3
<p>Simulation results of characteristic parameter <math display="inline"><semantics> <msub> <mi>f</mi> <mn>4</mn> </msub> </semantics></math> after order reduction processing.</p>
Full article ">Figure 4
<p>HackRF One hardware structure diagram.</p>
Full article ">Figure 5
<p>GRC flow chart of interference recognition syste.</p>
Full article ">Figure 6
<p>Structure diagram of system test platform.</p>
Full article ">Figure 7
<p>Time domain waveform and constellation of each interference signal.</p>
Full article ">
21 pages, 4750 KiB  
Article
Empowering a Broadband Communications Course with a Unified Module on 5G and Fixed 5G Networks
by Dimitris Uzunidis, Gerasimos Pagiatakis, Ioannis Moscholios and Michael Logothetis
Telecom 2024, 5(3), 907-927; https://doi.org/10.3390/telecom5030045 - 4 Sep 2024
Viewed by 333
Abstract
Telecommunications profoundly impacts all major aspects of our everyday life. As a consequence, student instruction typically includes a series of specialized courses, each addressing a distinct telecommunication area, separating wireless from fixed (optical) communications. This creates the problem of knowledge fragmentation, hindering the [...] Read more.
Telecommunications profoundly impacts all major aspects of our everyday life. As a consequence, student instruction typically includes a series of specialized courses, each addressing a distinct telecommunication area, separating wireless from fixed (optical) communications. This creates the problem of knowledge fragmentation, hindering the student’s perception of the topic since, at the service level, the applications and services offered to the users seem “virtually” independent from the underlying infrastructure. In this paper, to address this problem, we designed, analyzed, and implemented a 6 h course module on the five generations of wireless and fixed networks, which was presented as an integral part of the undergraduate course “Broadband Communications”, which was offered at the Dept. of Electrical and Electronic Engineering, School of Pedagogical and Technological Education (ASPETE), Athens, Greece. The main targets of this module are the following. Firstly, it aims to familiarize students with the fixed generations taxonomy, defined by the ETSI Industry Specification Group (ISG) F5G. This taxonomy serves as a foundation for understanding the evolution of telecommunications technologies. Secondly, the module seeks to integrate the acquired knowledge of the students in their previous telecommunication-related courses. During their curriculum, this knowledge was divided into two separate parts: wireless and fixed (optical). By coupling these two areas, students can develop a deeper understanding of the field. Lastly, the module aims to explore cutting-edge technologies and advancements in the telecommunications industry. In this way, it prepares students to enter the professional world during the fifth-generation era. Additionally, it provides them with valuable insights into the ongoing research and development in the field of 6G. Overall, this module serves as a comprehensive platform for students to enhance their understanding of telecommunications, from the foundational concepts to the latest advancements. To evaluate the impact of this module, the students were asked to fill out a questionnaire that included seven questions upon module completion. This questionnaire was completed successfully by 32 students in the previous academic year and by 16 students in this academic year. Moreover, a 20-question multiple choice quiz was offered to the students, allowing us to probe more into the typical errors and misconceptions about the topic. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

Figure 1
<p>Timeline of four Industrial Revolutions.</p>
Full article ">Figure 2
<p>Classification of services based on three key requirements (latency, bit rate, and fiber density/connectivity) [<a href="#B22-telecom-05-00045" class="html-bibr">22</a>]. eFBB: Enhanced Fiber Broadband, FFC: Full Fiber Connection, GRE: Guaranteed Reliable Experience, FFBC: Full Fiber Broadband Connection, GRFB: Guaranteed Reliable Fiber Broadband, GRFFE: Guaranteed Reliable Full Fiber Experience, and FFGRB: Full Fiber Guaranteed Reliable Broadband.</p>
Full article ">Figure 3
<p>Illustration of the main services, network characteristics, novelties, limitations, and standards of the five generations of fixed networks in a layered approach [<a href="#B4-telecom-05-00045" class="html-bibr">4</a>].</p>
Full article ">Figure 4
<p>Percentage distribution of student’s responses to the question, “How would you rate your knowledge on the subject 5G-F5G?” for the previous and the current academic years.</p>
Full article ">Figure 5
<p>Percentage distribution of students’ responses to the question, “How would you rate the importance in general of the 5G-F5G subject?” for the previous and the current academic years.</p>
Full article ">Figure 6
<p>Percentage distribution of students’ responses to the question, “How likely is it to engage further with the 5G-F5G subject (e.g., through a thesis, further reading, or choosing a relevant postgraduate course)?” for the previous and current academic years.</p>
Full article ">Figure 7
<p>Percentage distribution of student’s responses to the question, “How much has this particular module influenced your opinion about the 5G-F5G subject?” for the previous and the current academic years.</p>
Full article ">Figure 8
<p>The percentage distribution of students’ responses to the question, “Which topic of this particular module did you find most interesting?”.</p>
Full article ">Figure 9
<p>Percentage of correct answers for the 20 questions of a multiple-choice quiz. The average score was 69%.</p>
Full article ">Figure 10
<p>Grading distribution for the 22 students who submitted their answers in the 20-question multiple choice quiz. The average score is 6.86 and the standard deviation equals 0.86.</p>
Full article ">
15 pages, 9305 KiB  
Article
Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model
by Ala’a Talib Khudhair, Abeer Tariq Maolood and Ekhlas Khalaf Gbashi
Telecom 2024, 5(3), 892-906; https://doi.org/10.3390/telecom5030044 - 3 Sep 2024
Viewed by 380
Abstract
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust enough to safeguard resource-constrained environments. This paper presents a [...] Read more.
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust enough to safeguard resource-constrained environments. This paper presents a new method of making long symmetric keys for lightweight algorithms. A pre–trained convolutional neural network (CNN) model called visual geometry group 16 (VGG16) is used to take features from two images, turn them into binary strings, make the two strings equal by cutting them down to the length of the shorter string, and then use XOR to make a symmetric key from the binary strings from the two images. The key length depends on the number of features in the two images. Compared to other lightweight algorithms, we found that this method greatly decreases the time required to generate a symmetric key and improves defense against brute force attacks by creating exceptionally long keys. The method successfully passed all 15 tests when evaluated using the NIST SP 800-22 statistical test suite and all Basic Five Statistical Tests. To the best of our knowledge, this is the first research to explore the generation of a symmetric encryption key using a pre–trained VGG16 model. Full article
Show Figures

Figure 1

Figure 1
<p>Symmetric key encryption.</p>
Full article ">Figure 2
<p>AES encryption algorithm.</p>
Full article ">Figure 3
<p>DES encryption algorithm.</p>
Full article ">Figure 4
<p>Blowfish encryption algorithm.</p>
Full article ">Figure 5
<p>Conventional Machine Learning vs. Transfer Learning.</p>
Full article ">Figure 6
<p>The graphic above depicts the “top” portion of the model being removed. A 3D stack of feature maps convolves the remaining pre–trained output layers.</p>
Full article ">Figure 7
<p>The results of matrix multiplication are summed onto the feature map.</p>
Full article ">Figure 8
<p>Activation function (ReLU).</p>
Full article ">Figure 9
<p>Types of pooling.</p>
Full article ">Figure 10
<p>Flowchart of the proposed symmetric key generation using pre–trained VGG16 model.</p>
Full article ">
46 pages, 3730 KiB  
Article
Performance Evaluation of CF-MMIMO Wireless Systems Using Dynamic Mode Decomposition
by Freddy Pesantez Diaz and Claudio Estevez
Telecom 2024, 5(3), 846-891; https://doi.org/10.3390/telecom5030043 - 2 Sep 2024
Viewed by 530
Abstract
Cell-Free Massive Multiple-Input–Multiple-Output (CF-MIMO) systems have transformed the landscape of wireless communication, offering unparalleled enhancements in Spectral Efficiency and interference mitigation. Nevertheless, the large-scale deployment of CF-MIMO presents significant challenges in processing signals in a scalable manner. This study introduces an innovative methodology [...] Read more.
Cell-Free Massive Multiple-Input–Multiple-Output (CF-MIMO) systems have transformed the landscape of wireless communication, offering unparalleled enhancements in Spectral Efficiency and interference mitigation. Nevertheless, the large-scale deployment of CF-MIMO presents significant challenges in processing signals in a scalable manner. This study introduces an innovative methodology that leverages the capabilities of Dynamic Mode Decomposition (DMD) to tackle the complexities of Channel Estimation in CF-MIMO wireless systems. By extracting dynamic modes from a vast array of received signal snapshots, DMD reveals the evolving characteristics of the wireless channel across both time and space, thereby promising substantial improvements in the accuracy and adaptability of channel state information (CSI). The efficacy of the proposed methodology is demonstrated through comprehensive simulations, which emphasize its superior performance in highly mobile environments. For performance evaluation, the most common techniques have been employed, comparing the proposed algorithms with traditional methods such as MMSE (Minimum Mean Squared Error), MRC (Maximum Ration Combining), and ZF (Zero Forcing). The evaluation metrics used are standard in the field, namely the Cumulative Distribution Function (CDF) and the average UL/DL Spectral Efficiency. Furthermore, the study investigates the impact of DMD-enabled Channel Estimation on system performance, including beamforming strategies, spatial multiplexing within realistic time- and delay-correlated channels, and overall system capacity. This work underscores the transformative potential of incorporating DMD into massive MIMO wireless systems, advancing communication reliability and capacity in increasingly dynamic and dense wireless environments. Full article
Show Figures

Figure 1

Figure 1
<p>CF-MMIMO system [<a href="#B19-telecom-05-00043" class="html-bibr">19</a>]. Each color represents a dynamically formed user-centric cell.</p>
Full article ">Figure 2
<p>Communication blocks in the time–frequency plane. There appear uplink data pilots (<math display="inline"><semantics> <msub> <mi>τ</mi> <mi>p</mi> </msub> </semantics></math>) and uplink (<math display="inline"><semantics> <msub> <mi>τ</mi> <mi>u</mi> </msub> </semantics></math>) and downlink data.</p>
Full article ">Figure 3
<p>A random realization of the proposed scenarios. APs are located randomly within the circle of radius R, and the paths followed by each UE are shown with different colors.</p>
Full article ">Figure 4
<p>Propagation illustration and the multi-path sources.</p>
Full article ">Figure 5
<p>The formation of the <math display="inline"><semantics> <msub> <mo>Φ</mo> <mi>k</mi> </msub> </semantics></math> matrix involves <span class="html-italic">n</span> pilots and <span class="html-italic">k</span> consecutive samples. (<b>A</b>) Time–frequency snapshot Number 1. Pilots are show as red squares. (<b>B</b>) <span class="html-italic">k</span> time frequency snapshots. Each column of matrix <math display="inline"><semantics> <msub> <mo>Φ</mo> <mi>k</mi> </msub> </semantics></math> is formed by <span class="html-italic">k</span> consecutive pilot samples.</p>
Full article ">Figure 6
<p>Norm of the entries of matrix <span class="html-italic">R</span>.</p>
Full article ">Figure 7
<p>Normalized eigenvalue of the empirical matrix <span class="html-italic">R</span>. The red circle encloses a small group of eigenvalues that are significantly more representative in magnitude than the rest.</p>
Full article ">Figure 8
<p>Norm of entries of an empirical correlation matrix.</p>
Full article ">Figure 9
<p>Norm of entries ofthe empirical correlation matrix applied to DMD.</p>
Full article ">Figure 10
<p>PiDMD is used to obtain a Toeplitz matrix from empirical data.</p>
Full article ">Figure 11
<p>The matrix <math display="inline"><semantics> <mi mathvariant="bold">R</mi> </semantics></math> obtained from empirical data through the successive application of DMD and PiDMD.</p>
Full article ">Figure 12
<p>Structure of the R correlation matrix after sequentially applying DMD and mpeDMD to empirical data. mpeDMD is able to detect the Toeppliz form of the R matrix.</p>
Full article ">Figure 13
<p>The matrix <math display="inline"><semantics> <mi mathvariant="bold">R</mi> </semantics></math> matrix is presented with varying numbers of antennas to highlight its effect on the phenomenon known as <span class="html-italic">channel hardening</span>. PiDMD is used.</p>
Full article ">Figure 14
<p>The matrix <math display="inline"><semantics> <mi mathvariant="bold">R</mi> </semantics></math> is presented with varying numbers of pilots to highlight its effect on the phenomenon known as <span class="html-italic">favorable propagation</span>. mpeDMD is used.</p>
Full article ">Figure 15
<p>Downlink CDF of the per-user SE for non-coherent transmission with full power with <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>0.0005</mn> </mrow> </semantics></math> (X-scale in the graphs are scaled by <math display="inline"><semantics> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>).</p>
Full article ">Figure 16
<p>CDF of UL SE for <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>p</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mo>[</mo> <mn>10</mn> <mo>,</mo> <mn>40</mn> <mo>]</mo> </mrow> </semantics></math>. (<b>A</b>) MR, MR-mpeDMD, and MR-PiDMD is shown for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>. (<b>B</b>) MMSE, MMSE-mpeDMD, and MMSE-PiDMD is shown for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>. (<b>C</b>) ZF, ZF-mpeDMD, and ZF-PiDMD is shown for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>. (<b>D</b>) PZFZ, PZFZ-mpeDMD, and PFZF-PiDMD is shown for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 17
<p>The average uplink SE per UE as a function of pilot sequence length, <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>p</mi> </msub> </semantics></math>, We consider <span class="html-italic">L</span> = 100, <span class="html-italic">N</span> = 4, <span class="html-italic">K</span> = 40, and spatially correlated Rayleigh fading with ASD <math display="inline"><semantics> <mrow> <msub> <mi>σ</mi> <mi>ϕ</mi> </msub> <mo>=</mo> <msub> <mi>σ</mi> <mi>θ</mi> </msub> <mo>=</mo> <mn>15</mn> <mi>°</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 18
<p>The relative error of the average SE achieved by the asymptotic closed-form expression versus the number of UEs, with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mi>K</mi> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>64</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>p</mi> </msub> <mo>=</mo> <mi>K</mi> <mo>/</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>50</mn> <mo>≤</mo> <mi>v</mi> <mo>≤</mo> <mn>150</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>p</mi> <mi>k</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math> mW for each UE.</p>
Full article ">Figure 19
<p>Channel prediction algorithm comparison: Machine Learning, Kalman Filter, mpeDMD, and PiDMD.</p>
Full article ">Figure 20
<p>The average uplink Spectral Efficiency (SE) per User Equipment (UE) as a function of the angular spread (ASD) for azimuth and elevation angles, where <math display="inline"><semantics> <mrow> <msub> <mi>σ</mi> <mi>ϕ</mi> </msub> <mo>=</mo> <msub> <mi>σ</mi> <mi>θ</mi> </msub> </mrow> </semantics></math>, is analyzed for different operations of CF-MMIMO and small-cell systems. We consider <math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>p</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>. The results for uncorrelated Rayleigh fading are included as a reference.</p>
Full article ">Figure 21
<p>Varying data frame length and non-coherent transmission (<span class="html-italic">L</span> = 100, <span class="html-italic">K</span> = 20, <span class="html-italic">N</span> = 2, ASD = 30°).</p>
Full article ">Figure 22
<p>Average UL SE vs. number of <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>p</mi> </msub> </semantics></math>, centralized LSFD (<span class="html-italic">L</span> = 100, <span class="html-italic">K</span> = 20, <span class="html-italic">N</span> = 2, ASD = 30°).</p>
Full article ">Figure 23
<p>CDF of median SE and 95% likely per-user uplink transmission with full power and <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>0.002</mn> <mo>]</mo> </mrow> </mrow> </semantics></math> (X-scale in Graphs are scaled by <math display="inline"><semantics> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>). (<b>A</b>) Uplink CDF of different Channel Estimation techniques (<math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, ASD = 30°, <math display="inline"><semantics> <mrow> <mn>50</mn> <mo>&lt;</mo> <mi>v</mi> <mo>&lt;</mo> <mn>150</mn> </mrow> </semantics></math>). (<b>B</b>) 95%-likely per-user uplink SE vs. <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>D</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> </mrow> </semantics></math> (<math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, ASD = 30°, <math display="inline"><semantics> <mrow> <mn>50</mn> <mo>&lt;</mo> <mi>v</mi> <mo>&lt;</mo> <mn>150</mn> </mrow> </semantics></math>). (X-axis scale multiplied by <math display="inline"><semantics> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>).</p>
Full article ">Figure 24
<p>CDF of the per-user downlink SE for coherent and non-coherent transmission with full power with <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>0.0005</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>0.001</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>d</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>0.0015</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>0.002</mn> </mrow> </semantics></math> (X-scale in the graphs are multiplied by <math display="inline"><semantics> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>). (<b>A</b>) The 95%-likely per-user coherent downlink Spectral Efficiency (SE) against the value of <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>D</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> </mrow> </semantics></math> for coherent transmission (<math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ASD</mi> <mo>=</mo> <msup> <mn>30</mn> <mo>∘</mo> </msup> </mrow> </semantics></math>). (<b>B</b>) The 95%-likely per-user non-coherent downlink Spectral Efficiency (SE) against the value of <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mi>D</mi> </msub> <msub> <mi>T</mi> <mi>s</mi> </msub> </mrow> </semantics></math> for non-coherent transmission (<math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ASD</mi> <mo>=</mo> <msup> <mn>30</mn> <mo>∘</mo> </msup> </mrow> </semantics></math>).</p>
Full article ">Figure 25
<p>Average SE per UE against L (number of APs), with <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>p</mi> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <span class="html-italic">N</span> = 8 and <math display="inline"><semantics> <msub> <mi>p</mi> <mi>k</mi> </msub> </semantics></math> = 100 mW for each UE.</p>
Full article ">Figure 26
<p>CDF of UL sum SE for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math> as a function of the number of AP antennas for different channel estimators.</p>
Full article ">Figure 27
<p>Average UL SE[bits/s/Hz] vs. number of time–frequency snapshots <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>p</mi> </msub> </semantics></math>.</p>
Full article ">
23 pages, 521 KiB  
Article
Sum-Rate Maximization for a Hybrid Precoding-Based Massive MIMO NOMA System with Simultaneous Wireless Information and Power Transmission
by Samarendra Nath Sur, Huu Q. Tran, Agbotiname Lucky Imoize, Debdatta Kandar and Sukumar Nandi
Telecom 2024, 5(3), 823-845; https://doi.org/10.3390/telecom5030042 - 2 Sep 2024
Viewed by 286
Abstract
Non-orthogonal multiple access (NOMA) has emerged as a key enabling technology in the realm of millimeter-wave (mmWave) massive MIMO (mMIMO) systems for enhancing spectral efficiency (SE). Furthermore, it is believed that simultaneous wireless information and power transmission (SWIPT) will allow for the system’s [...] Read more.
Non-orthogonal multiple access (NOMA) has emerged as a key enabling technology in the realm of millimeter-wave (mmWave) massive MIMO (mMIMO) systems for enhancing spectral efficiency (SE). Furthermore, it is believed that simultaneous wireless information and power transmission (SWIPT) will allow for the system’s energy efficiency (EE) to be maximised. The effectiveness of the mmWave mMIMO-NOMA system along with SWIPT has been examined in this article under multi-user (MU) scenarios. This paper’s major goal is to construct a low-complexity hybrid-precoder (HP) while taking into account the sub-connected (SC) architecture. The linear precoder is a computationally demanding technique as a result of the matrix inversion. The authors of this paper have suggested a symmetric sequential over-relaxation (SSOR) complex regularised zero-forcing (CRZF) linear precoder. The power distribution for the mmWave mMIMO-NOMA system and power splitting factors for SWIPT are jointly tuned to maximize the sum rate along with the suggested SSOR-CRZF precoder. In regards to complexity, SE, and EE, the SSOR-CRZF-HP surpasses conventional linear precoders. Full article
Show Figures

Figure 1

Figure 1
<p>HP-aided mmWave mMIMO-NOMA-SWIPT system with SC architecture.</p>
Full article ">Figure 2
<p>Spectral efficiency against SNR.</p>
Full article ">Figure 3
<p>Spectral efficiency against SNR with the variation in <math display="inline"><semantics> <msub> <mi>N</mi> <mrow> <mi>R</mi> <mi>F</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>Spectral efficiency of SC-SSOR-CRZF with the variation in <math display="inline"><semantics> <msub> <mi>N</mi> <mrow> <mi>R</mi> <mi>F</mi> </mrow> </msub> </semantics></math> and SNR.</p>
Full article ">Figure 5
<p>SE variation against a number of users.</p>
Full article ">Figure 6
<p>Spectral efficiency variation with B.</p>
Full article ">Figure 7
<p>Impact of the iteration number associated with SSOR-CRZF over spectral efficiency.</p>
Full article ">Figure 8
<p>Spectral efficiency versus the number of iterations for the joint PA and PS optimization.</p>
Full article ">Figure 9
<p>Spectral efficiency against SNR [<a href="#B3-telecom-05-00042" class="html-bibr">3</a>,<a href="#B17-telecom-05-00042" class="html-bibr">17</a>].</p>
Full article ">Figure 10
<p>Spectral efficiency variation with the fading parameter <span class="html-italic">m</span>.</p>
Full article ">Figure 11
<p>Impact of imperfect CSI.</p>
Full article ">Figure 12
<p>Energy efficiency against SNR.</p>
Full article ">Figure 13
<p>SE variation against a number of BS antennas.</p>
Full article ">
19 pages, 1225 KiB  
Review
AI-Enabled 6G Internet of Things: Opportunities, Key Technologies, Challenges, and Future Directions
by Madduma Wellalage Pasan Maduranga, Valmik Tilwari, R. M. M. R. Rathnayake and Chamali Sandamini
Telecom 2024, 5(3), 804-822; https://doi.org/10.3390/telecom5030041 - 16 Aug 2024
Viewed by 1036
Abstract
The advent of sixth-generation (6G) networks promises revolutionary advancements in wireless communication, marked by unprecedented speeds, ultra-low latency, and ubiquitous connectivity. This research paper delves into the integration of Artificial Intelligence (AI) in 6G network applications, exploring the challenges and outlining future directions [...] Read more.
The advent of sixth-generation (6G) networks promises revolutionary advancements in wireless communication, marked by unprecedented speeds, ultra-low latency, and ubiquitous connectivity. This research paper delves into the integration of Artificial Intelligence (AI) in 6G network applications, exploring the challenges and outlining future directions for this transformative synergy. The study investigates the key AI technologies for 6G: the potential of AI to optimize network performance, enhance user experience, and enable novel applications in diverse domains and AI-enabled applications. Analyzing the current landscape, the paper identifies key challenges such as scalability, security, and ethical considerations in deploying AI-enabled 6G networks. Moreover, it explores the dynamic interplay between AI and 6G technologies, shedding light on the intricate relationships that underpin their successful integration. The research contributes valuable insights to the ongoing discourse surrounding the convergence of AI and 6G networks, laying the groundwork for a robust and intelligent future communication infrastructure. Full article
Show Figures

Figure 1

Figure 1
<p>A road map from 1G to 6G network [<a href="#B4-telecom-05-00041" class="html-bibr">4</a>].</p>
Full article ">Figure 2
<p>PRISMA Flowchart of the Selection Process.</p>
Full article ">Figure 3
<p>AI-enabled smart cities.</p>
Full article ">Figure 4
<p>Virtual reality.</p>
Full article ">
12 pages, 4991 KiB  
Article
A 77 GHz Transmit Array for In-Package Automotive Radar Applications
by Francesco Greco, Emilio Arnieri, Giandomenico Amendola, Raffaele De Marco and Luigi Boccia
Telecom 2024, 5(3), 792-803; https://doi.org/10.3390/telecom5030040 - 14 Aug 2024
Viewed by 452
Abstract
A packaged transmit array (TA) antenna is designed for automotive radar applications operating at 77 GHz. The compact dimensions of the proposed configuration make it compatible with standard quad flat no-lead package (QFN) technology. The TA placed inside the package cover is used [...] Read more.
A packaged transmit array (TA) antenna is designed for automotive radar applications operating at 77 GHz. The compact dimensions of the proposed configuration make it compatible with standard quad flat no-lead package (QFN) technology. The TA placed inside the package cover is used to focus the field radiated by a feed placed in the same package. The unit cell of the array is composed of two pairs of stacked patches separated by a central ground plane. A planar patch antenna surrounded by a mushroom-type EBG (Electromagnetic Band Gap) structure is used as the primary feed. An analytical approach is employed to evaluate the primary parameters of the suggested TA, including its directivity, gain and spillover efficiency. The final design has been refined using comprehensive full-wave simulations. The simulated gain is 14.2 dBi at 77 GHz, with a half-power beamwidth of 22°. This proposed setup is a strong contender for highly integrated mid-gain applications in the automotive sector. Full article
Show Figures

Figure 1

Figure 1
<p>Transmit array’s antenna configuration.</p>
Full article ">Figure 2
<p>Feeding patch antenna with EBG structure. a = 4.55 mm; b = 1.6 mm; c = 0.98 mm; d = 0.15 mm; e = 0.5 mm; s = 0.25 mm.</p>
Full article ">Figure 3
<p>Dispersion diagram of the unit cell EBG structure printed on a Rogers RO3003 substrate. Dp = 1.05 mm; Wp = 0.7 mm; h_sub = 0.25 mm. Blue line: first mode; orange line: second mode.</p>
Full article ">Figure 4
<p>Normalized radiation patterns (E-plane) of the patch antenna with (black line) and without (grey line) mushroom-type EBGs.</p>
Full article ">Figure 5
<p>Transmit array unit cell structure. (<b>a</b>) 3D vies; (<b>b</b>) side view.</p>
Full article ">Figure 6
<p>Simulated S21 in terms of phase (<b>a</b>) and magnitude (<b>b</b>) as a function of patch size (Lp) for different angles of incidence.</p>
Full article ">Figure 7
<p>Transmit array geometry.</p>
Full article ">Figure 8
<p>x8 array: calculated gain (dashed line), directivity (continuous line) and spillover efficiency (dotted line) for different values of <span class="html-italic">f</span>/<span class="html-italic">D</span> (spacing λ/3).</p>
Full article ">Figure 9
<p>x8 array: calculated directivity of the unit cell as a function of inter-element spacing.</p>
Full article ">Figure 10
<p>Simulated gain patterns (H plane) at 77 Hz for the EBG patch antenna with (black line) and without (gray line) a transmit array.</p>
Full article ">Figure 11
<p>Fabricated prototype of the transmit array. (<b>a</b>) A 12 × 12 mm<sup>2</sup> package. (<b>b</b>) The feed patch with the EBG (<b>c</b>) measurement setup.</p>
Full article ">Figure 12
<p>Simulated (continuous line) and measured (dots) reflection coefficients.</p>
Full article ">Figure 13
<p>Transmit array radiation pattern: comparison between full-wave simulations and measurements. The measured gain is 14.2 dBi.</p>
Full article ">
18 pages, 406 KiB  
Article
Toward Sustainable Development: Exploring the Value and Benefits of Digital Twins
by Paweł Weichbroth, Krystian Jandy and Jozef Zurada
Telecom 2024, 5(3), 774-791; https://doi.org/10.3390/telecom5030039 - 12 Aug 2024
Viewed by 516
Abstract
The complexity and number of data streams generated by internal processes exceed the capabilities of most current simulation environments. Consequently, there is a need for the development of more advanced solutions that can handle any number of simultaneous simulations. One of the most [...] Read more.
The complexity and number of data streams generated by internal processes exceed the capabilities of most current simulation environments. Consequently, there is a need for the development of more advanced solutions that can handle any number of simultaneous simulations. One of the most promising ideas to address these and other challenges is the concept of a Digital Twin (DT), which refers to a digital representation or a virtual model designed to accurately reflect an intended or actual physical product, system, or process (i.e., a physical twin). As a Digital Twin spans the life-cycle of its physical twin, its development and application can bring considerable benefits to organizations seeking to improve existing processes as well as implement new ones. However, few studies have comprehensively examined the value and benefits of Digital Twins. To fill this gap, this study aims to provide a better understanding of this technology by reviewing the contemporary literature, with a particular focus on the documented case studies, as well as reported business and industrial deployments. The results obtained show that Digital Twins have proven beneficial for maintenance, cost reduction, optimization, simulation performance, monitoring, product life-cycle understanding, assessment validation, performance evaluation, product design, and safety and risk mitigation. In addition, when considering the human factor, DTs can facilitate education and training, team collaboration, and decision making. Undeniably, Digital Twins are a game changer for safer, faster, and more sustainable development. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

Figure 1
<p>The cloud of codes with regard to the benefits expected and documented from Digital Twin deployment.</p>
Full article ">Figure 2
<p>The top 10 benefits of Digital Twin deployment.</p>
Full article ">
14 pages, 12198 KiB  
Article
Super-Wideband Monopole Printed Antenna with Half-Elliptical-Shaped Patch
by Fitri Yuli Zulkifli, Aditya Inzani Wahdiyat, Abdurrahman Zufar, Nurhayati Nurhayati and Eko Setijadi
Telecom 2024, 5(3), 760-773; https://doi.org/10.3390/telecom5030038 - 5 Aug 2024
Viewed by 530
Abstract
Super-wideband (SWB) antennas have emerged as a promising technology for next-generation wireless communication systems due to their ability to transmit and receive signals across a wide frequency spectrum. A half-elliptical-shaped patch antenna for a super-wideband antenna is proposed in this paper. The proposed [...] Read more.
Super-wideband (SWB) antennas have emerged as a promising technology for next-generation wireless communication systems due to their ability to transmit and receive signals across a wide frequency spectrum. A half-elliptical-shaped patch antenna for a super-wideband antenna is proposed in this paper. The proposed antenna was composed of a half-elliptical-shaped patch with a microstrip feedline and a partial ground plane with a triangular inset and a bent edge ground plane. This proposed antenna was designed using Taconic TLY-5 with a dielectric permittivity of 2.2 and a total dimension of 200 × 220 × 1.57 mm3. The proposed antenna demonstrates a bandwidth of 23 GHz (from 0.5 GHz to 23.5 GHz) with a bandwidth ratio of 47:1. Full article
Show Figures

Figure 1

Figure 1
<p>Geometry of proposed SWB antenna (<b>a</b>) Step 1; (<b>b</b>) Step 2; (<b>c</b>) Step 3; (<b>d</b>) Step 4.</p>
Full article ">Figure 1 Cont.
<p>Geometry of proposed SWB antenna (<b>a</b>) Step 1; (<b>b</b>) Step 2; (<b>c</b>) Step 3; (<b>d</b>) Step 4.</p>
Full article ">Figure 2
<p>Simulated reflection coefficient of Steps 1–4.</p>
Full article ">Figure 3
<p>Simulated reflection coefficient of various L1 values.</p>
Full article ">Figure 4
<p>Simulated 3D far-field characteristic of proposed antenna: (<b>a</b>) 0.5 GHz; (<b>b</b>) 2.4 GHz; (<b>c</b>) 6 GHz; (<b>d</b>) 15 GHz; (<b>e</b>) 30 GHz; (<b>f</b>) 40 GHz.</p>
Full article ">Figure 5
<p>Simulated normalized radiation pattern of proposed antenna: (<b>a</b>) 0.5 GHz, 2.4 GHz, and 6 GHz; (<b>b</b>) 15 GHz, 30 GHz, and 40 GHz.</p>
Full article ">Figure 6
<p>Simulated realized gain and radiation efficiency of the proposed antenna.</p>
Full article ">Figure 7
<p>Fabricated antenna, front (<b>a</b>) and back (<b>b</b>).</p>
Full article ">Figure 8
<p>Comparison of S<sub>11</sub> results of simulation and measurements.</p>
Full article ">Figure 9
<p>The 2.92 mm connector is included in the simulation model (<b>a</b>) instead of the waveguide port (<b>b</b>).</p>
Full article ">Figure 10
<p>Comparison of simulated S<sub>11</sub> with and without connector model.</p>
Full article ">Figure 11
<p>Surface current at 29 GHz in different phases: (<b>a</b>) 90°; (<b>b</b>) 135°; (<b>c</b>) 180°; (<b>d</b>) 235°.</p>
Full article ">Figure 12
<p>Surface current comparison at 29 GHz in 90° phase between (<b>a</b>) simulation without connector model and (<b>b</b>) with connector model.</p>
Full article ">
13 pages, 71992 KiB  
Article
The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions
by Zisis-Rafail Tzoannos, Dimitrios Kosmanos, Apostolos Xenakis and Costas Chaikalis
Telecom 2024, 5(3), 747-759; https://doi.org/10.3390/telecom5030037 - 2 Aug 2024
Viewed by 997
Abstract
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) [...] Read more.
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) relate to smart transport services and offer benefits to both society and the environment. However, the development of autonomous vehicles may create vulnerabilities in security systems, through which attacks could harm both vehicles and their drivers. To this end, CAV development in vehicular ad hoc networks (VANETs) requires secure wireless communication. However, this kind of communication is vulnerable to a variety of cyber-attacks, such as spoofing. In essence, this paper presents an in-depth analysis of spoofing attack impacts under realistic road conditions, which may cause some traffic congestion. The novelty of this work has to do with simulation scenarios that take into consideration a set of cross-layer parameters, such as packet delivery ratio (PDR), acceleration, and speed. These parameters can determine the integrity of the exchanged wave short messages (WSMs) and are aggregated in a central trusted authority (CTA) for further analysis. Finally, a statistical metric, coefficient of variation (CoV), which measures the consequences of a cyber-attack in a future crash, is estimated, showing a significant increase (12.1%) in a spoofing attack scenario. Full article
Show Figures

Figure 1

Figure 1
<p>Vehicle route, highlighting its start and end points.</p>
Full article ">Figure 2
<p>(<b>a</b>) The platoon of vehicles under normal conditions; (<b>b</b>) the platoon of vehicles under spoofing attack.</p>
Full article ">Figure 3
<p>Vehicles create a queue of vehicles with almost zero speed due to spoofing attack while the Node 0 (Spoofer) continues its route normally.</p>
Full article ">Figure 4
<p>At the next crossroads, the vehicles from the node “Node 2” (in blue) and below are dynamically separated from the influence of the Victim node “Node 1” (in red) and continue their course on an alternative route. The green shows the notification of nodes in serial mode for “Change Route()”.</p>
Full article ">Figure 5
<p>Speed of platoon of vehicles in normal scenario.</p>
Full article ">Figure 6
<p>Speed of platoon of vehicles in spoofing attack scenario with a density of 10 vehicles/km.</p>
Full article ">Figure 7
<p>Acceleration of platoon of vehicles in normal scenario.</p>
Full article ">Figure 8
<p>Acceleration of platoon of vehicles in spoofing attack scenario with a density of 10 vehicles/km.</p>
Full article ">Figure 9
<p>Speed of platoon of vehicles with 25 vehicles/km in normal scenario.</p>
Full article ">Figure 10
<p>Speed of platoon of vehicles in spoofing attack scenario with a density of 25 vehicles/km.</p>
Full article ">Figure 11
<p>Acceleration of platoon of vehicles with 25 vehicles/km in normal scenario.</p>
Full article ">Figure 12
<p>Acceleration of platoon of vehicles in spoofing attack scenario with a density of 25 vehicles/km.</p>
Full article ">Figure 13
<p>Mean value of PDR and average total distance for different vehicle density values.</p>
Full article ">Figure 14
<p>Bar graphs for average total traveled distance for all nodes within a range of vehicle density.</p>
Full article ">
24 pages, 478 KiB  
Article
Energy Consumption Modeling for Heterogeneous Internet of Things Wireless Sensor Network Devices: Entire Modes and Operation Cycles Considerations
by Canek Portillo, Jorge Martinez-Bauset, Vicent Pla and Vicente Casares-Giner
Telecom 2024, 5(3), 723-746; https://doi.org/10.3390/telecom5030036 - 2 Aug 2024
Viewed by 567
Abstract
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental [...] Read more.
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental issue in WSN is energy consumption. Additional issues also arise in heterogeneous scenarios due to the coexistence of sensor nodes with different features. In these scenarios, the modeling process becomes more challenging as an efficient orchestration of the sensor nodes must be achieved to guarantee a successful operation in terms of medium access, synchronization, and energy conservation. We propose a novel methodology to determine the energy consumed by sensor nodes deploying a recently proposed synchronous duty-cycled MAC protocol named Priority Sink Access MAC (PSA-MAC). We model the operation of a WSN with two classes of sensor devices by a pair of two-dimensional Discrete-Time Markov Chains (2D-DTMC), determine their stationary probability distribution, and propose new expressions to compute the energy consumption based solely on the obtained stationary probability distribution. This new approach is more systematic and accurate than previously proposed ones. The new methodology to determine energy consumption takes into account different specific features of the PSA-MAC protocol as: (i) the synchronization among sensor nodes; (ii) the normal and awake operation cycles to ensure synchronization among sensor nodes and energy conservation; (iii) the two periods that compose a full operation cycle: the data and sleep periods; (iv) two transmission schemes, SPT (single packet transmission) and APT (aggregated packet transmission) (v) the support of multiple sensor node classes; and (vi) the support of different priority assignments per class of sensor nodes. The accuracy of the proposed methodology has been validated by an independent discrete-event-based simulation model, showing that very precise results are obtained. Full article
Show Figures

Figure 1

Figure 1
<p>Heterogeneous WSN scenario with <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> SNs, and corresponding <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Transmission process in a transmission cycle for a heterogeneous WSN with two classes of nodes.</p>
Full article ">Figure 3
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 4
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 6
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 7
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 9
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 10
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 11
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle due to PF transmissions with success and failure, and to overhearing, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 12
<p>Average packet delay for both SNs classes.</p>
Full article ">Figure 13
<p>Average relative errors of the current and previous (Pre-method) energy computation methodologies.</p>
Full article ">
17 pages, 3480 KiB  
Article
Measurement of Dielectric Properties of Thin Materials for Radomes Using Waveguide Cavities
by Tayla Dahms, Douglas B. Hayman, Bahare Mohamadzade and Stephanie L. Smith
Telecom 2024, 5(3), 706-722; https://doi.org/10.3390/telecom5030035 - 1 Aug 2024
Viewed by 953
Abstract
We present waveguide cavity measurements used to evaluate several thin materials for use in radomes. In addition to the data on the materials, we show how these measurements can be performed with common laboratory equipment and simple calculations. We sought an approach that [...] Read more.
We present waveguide cavity measurements used to evaluate several thin materials for use in radomes. In addition to the data on the materials, we show how these measurements can be performed with common laboratory equipment and simple calculations. We sought an approach that allowed candidate materials to be readily evaluated to deal with formerly selected materials becoming unavailable or cost-prohibitive. We used lengths of standard waveguide (WR650 and WR137 here) with readily manufactured irises and a vector network analyzer (Keysight N5225B here). To select the iris size and determine the limits of the simplifications in the equations used, we employed a full-wave 3D electromagnetic simulator (CST Microwave Studio). The equations required to calculate the dielectric properties of samples and their contribution to the equivalent system noise temperature from unloaded and loaded resonant frequencies and Q factors are shown. While these formulations can be found elsewhere, we did not find these assembled as conveniently in other studies in the literature. We also show that orienting the sample down the length of the cavity allows for higher-order modes to be fully utilized. We did not find this straightforward adaptation of the common cross-guide orientation in other works. Overall, the results allowed us to recommend three fabrics for use at the frequencies tested (1.7 and 5.6 GHz). The complete process is outlined to assist others in performing these measurements themselves. Full article
Show Figures

Figure 1

Figure 1
<p>TE and TM mode field orientations, where the E-field is depicted in blue and the H-field in red [<a href="#B6-telecom-05-00035" class="html-bibr">6</a>] (reproduced with permission from T.R. Kuphaldt, Lessons in Electric Circuits; 2021).</p>
Full article ">Figure 2
<p>Permittivity measurement methods most appropriate for various bands of the frequency spectrum [<a href="#B2-telecom-05-00035" class="html-bibr">2</a>].</p>
Full article ">Figure 3
<p>Coordinate system and dimensions of a general rectangular waveguide [<a href="#B15-telecom-05-00035" class="html-bibr">15</a>].</p>
Full article ">Figure 4
<p>Rectangular waveguide cavity with the variations in electric field for resonant modes TE<sub>101</sub> (<span class="html-italic">p</span> = 1) and TE<sub>102</sub> (<span class="html-italic">p</span> = 2) [<a href="#B21-telecom-05-00035" class="html-bibr">21</a>].</p>
Full article ">Figure 5
<p>Material under test orientations: (<b>a</b>) sample in y-z (used in this work); (<b>b</b>) sample in x-y plane (traditionally used) [<a href="#B24-telecom-05-00035" class="html-bibr">24</a>].</p>
Full article ">Figure 6
<p>Various stages of setup for measuring dielectric properties of materials: (<b>a</b>) material under test within the foam blocks; (<b>b</b>) foam and sample within WR650 waveguide cavity; (<b>c</b>) shims on either side of the WR650 waveguide cavity before the final waveguide adapter is attached.</p>
Full article ">Figure 7
<p>Final WR650 waveguide cavity and network analyzer setup to measure the dielectric properties of possible radome materials. Multiple resonant peaks are displayed on the network analyzer in the background.</p>
Full article ">Figure 8
<p>Examples of normalized simulated and experimental resonant peak of dominant TE<sub>101</sub> mode for WR650 cavity: (<b>a</b>) empty; (<b>b</b>) with only foam; (<b>c</b>) with foam and PTFE Fabric sample [<a href="#B30-telecom-05-00035" class="html-bibr">30</a>,<a href="#B31-telecom-05-00035" class="html-bibr">31</a>,<a href="#B34-telecom-05-00035" class="html-bibr">34</a>].</p>
Full article ">
26 pages, 15291 KiB  
Article
The Scale-Up of E-Commerce in Romania Generated by the Pandemic, Automation, and Artificial Intelligence
by Andreea Nistor and Eduard Zadobrischi
Telecom 2024, 5(3), 680-705; https://doi.org/10.3390/telecom5030034 - 30 Jul 2024
Viewed by 549
Abstract
This study examines the significant growth of e-commerce in Romania, which has surpassed the rates of expansion observed in other more developed countries of the European Union. Based on market analysis by sector-specific companies, the Romanian e-commerce market has reached over €6.5 billion. [...] Read more.
This study examines the significant growth of e-commerce in Romania, which has surpassed the rates of expansion observed in other more developed countries of the European Union. Based on market analysis by sector-specific companies, the Romanian e-commerce market has reached over €6.5 billion. This rapid growth trajectory is expected to continue, driven by various factors, including the impact of the COVID-19 pandemic and the natural evolution of the market. The main purpose of this study is to assess the expansion of the e-commerce market in Romania, identify the key factors behind this growth, and project future market values. Data for this analysis has been collected from industry reports, market analysis, and relevant statistical databases. The study uses a quantitative approach, utilizing financial data and growth rates to forecast future market trends. The dataset includes financial figures from e-commerce sales, digital services such as bill payments, and airline and hotel bookings from 2018 to 2023. Projections for 2024 and beyond were derived from this historical data. In 2019, the e-commerce market in Romania was valued at €4.68 billion, representing a significant increase compared to previous years. By 2020, amid the pandemic, the market value increased to €5.5 billion, marking a 38.4% increase from the previous year. Forecasts for 2024 estimate that the market will exceed €8 billion. In addition, when related digital services are included, the total market value could exceed €10 billion, illustrating the substantial economic impact of the online sector and the growth potential. This study highlights the dynamic nature of the e-commerce landscape in Romania and underlines the significant economic opportunities it presents. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

Figure 1
<p>The revenue generated by the e-commerce market in Romania from 2018 to 2023 (in billions of euros).</p>
Full article ">Figure 2
<p>Top 10 countries with the most e-commerce websites (26 June 2023).</p>
Full article ">Figure 3
<p>Top 50 countries with most online shops.</p>
Full article ">Figure 4
<p>Ranking of countries with the fastest acceleration in the e-commerce segment.</p>
Full article ">Figure 5
<p>Ranking of online platform by number of stores and market share.</p>
Full article ">Figure 6
<p>Sales and orders growth in Q1 2024 compared to Q1 2023.</p>
Full article ">Figure 7
<p>Transaction growth and average order value in 2023.</p>
Full article ">Figure 8
<p>Value of the e-commerce market in Romania.</p>
Full article ">Figure 9
<p>Main categories of products and services bought online by Romanians in 2023.</p>
Full article ">Figure 10
<p>Annual online spending comparison 2022 vs. 2023.</p>
Full article ">Figure 11
<p>Comparison of e-commerce platforms on the Romanian market.</p>
Full article ">Figure 12
<p>The graph shows the daily number of orders for Shein and Temu.</p>
Full article ">Figure 13
<p>Graph showing correlations between different variables according to the number of products for an online shop.</p>
Full article ">Figure 14
<p>(<b>a</b>) A simple product image of a mobile phone case on a white background. The phone case is sleek and modern, clearly displayed front and center to showcase the phone case. (<b>b</b>) A captivating product image of a mobile phone case, with a modern and stylish background created by AI.</p>
Full article ">Figure 15
<p>Comparative analysis of processing times and costs for manual vs. automated e-commerce order management.</p>
Full article ">
28 pages, 5300 KiB  
Article
Performance Analysis of a Sound-Based Steganography Wireless Sensor Network to Provide Covert Communications
by Ariadna I. Rodriguez-Gomez, Mario E. Rivero-Angeles, Izlian Y. Orea Flores and Gina Gallegos-García
Telecom 2024, 5(3), 652-679; https://doi.org/10.3390/telecom5030033 - 25 Jul 2024
Viewed by 557
Abstract
Given the existence of techniques that disrupt conventional RF communication channels, the demand for innovative alternatives to electromagnetic-based communications is clear. Covert communication, which claims to conceals the communication channel, has been explored using bio-inspired sounds in aquatic environments, but its application in [...] Read more.
Given the existence of techniques that disrupt conventional RF communication channels, the demand for innovative alternatives to electromagnetic-based communications is clear. Covert communication, which claims to conceals the communication channel, has been explored using bio-inspired sounds in aquatic environments, but its application in terrestrial areas is largely unexplored. This work develops a mathematical analysis of a wireless sensor network that operates stealthily in outdoor environments by using birdsong audio signals from local birds for covert communication. Stored bird sounds are modified to insert sensor data while altering the sound minimally, both in characteristics and random silence/song patterns. This paper introduces a technique that modifies a fourth-level coefficient detail with a wavelet transform, then applies an inverse transform to achieve imperceptible audio modifications. The mathematical analysis includes a statistical study of the On/Off periods of different birds’ songs and a Markov chain capturing the system’s main dynamics. We derive the system throughput to highlight the potential of using birdsong as a covert communication medium in terrestrial environments. Additionally, we compare the performance of the sound-based network to the RF-based network to identify the proposed system’s capabilities. Full article
(This article belongs to the Special Issue Advances in Wireless Communication: Applications and Developments)
Show Figures

Figure 1

Figure 1
<p>Signal decomposition in four levels after applying a wavelet transformation. The coefficient in gray is the Detail coefficient that hosts the modifications.</p>
Full article ">Figure 2
<p>The cA coeffient is divided into <span class="html-italic">C</span> chunks, then we select the last value of each of the chunks, and the insertion is made by calculating <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>n</mi> <mi>e</mi> <mi>w</mi> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>o</mi> <mi>r</mi> <mi>i</mi> <mi>g</mi> <mi>i</mi> <mi>n</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> <mo>+</mo> <mi>m</mi> <mo>)</mo> </mrow> <mo>×</mo> <mi>α</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Signal reconstruction after modifying the Detail coefficient at a fourth transformation. The spread of the modification is signalized with the degradation of the modification.</p>
Full article ">Figure 4
<p>Signal reconstructed of the XC3951Solitario audio recording is shown before modification (<b>top part</b> of the figure) and after modification (<b>bottom part</b> of the figure), separated by channel.</p>
Full article ">Figure 5
<p>Spectrum analysis and absolute value of the amplitude of the spectrum of the <span class="html-italic">Myadestes occidentalis</span> birdsong. (<b>a</b>) Audio spectrum of <span class="html-italic">Myadestes occidentalis</span> birdsong. (<b>b</b>) Absolute value of spectrum of <span class="html-italic">Myadestes occidentalis</span> birdsong.</p>
Full article ">Figure 6
<p>Sampled spectrum of birdsong and spectrum digitalized signal of the <span class="html-italic">Myadestes occidentalis</span> birdsong. (<b>a</b>) Sampled spectrum of the <span class="html-italic">Myadestes occidentalis</span> birdsong. (<b>b</b>) Spectre digitalized of the <span class="html-italic">Myadestes occidentalis</span> birdsong.</p>
Full article ">Figure 7
<p>Markov chain for the case when the <span class="html-italic">On</span>/<span class="html-italic">Off</span> periods are exponentially distributed.</p>
Full article ">Figure 8
<p>Markov chain of the transition process of a node which depends on the birdsongs behavior, Hyper-exponentional case.</p>
Full article ">Figure 9
<p>Markov chain of the transition process of a node which depends on the birdsongs behavior, Erlang case.</p>
Full article ">Figure 10
<p>Comparison between analytical and simulation results for (<b>a</b>) Throughput, (<b>b</b>) Idle time slot probability, and (<b>c</b>) Collision probability.</p>
Full article ">Figure 11
<p>Mean Square Error for (<b>a</b>) Throughput, (<b>b</b>) Idle time slot, and (<b>c</b>) Collision.</p>
Full article ">Figure 12
<p>Comparison between the system with nodes turning <span class="html-italic">On</span>/<span class="html-italic">Off</span> and nodes always in <span class="html-italic">On</span> mode (<b>a</b>) Throughput, (<b>b</b>) Idle time slot, and (<b>c</b>) Collision.</p>
Full article ">Figure 13
<p>System Lifespan and efficiency of Nodes with <span class="html-italic">On</span>/<span class="html-italic">Off</span> transitions, and nodes always <span class="html-italic">On</span>. (<b>a</b>) Lifespan, (<b>b</b>) Efficiency.</p>
Full article ">Figure 14
<p>Transmission Rate comparison between modified audios and Zigbee minimum and maximum transition rates. (<b>a</b>) <span class="html-italic">Curve-billed Trasher</span>, and Zigbee minimum and maximum transition rates, (<b>b</b>) Birds’ audios, and Zigbee minimum transition rates.</p>
Full article ">
20 pages, 1255 KiB  
Article
Training from Zero: Forecasting of Radio Frequency Machine Learning Data Quantity
by William H. Clark IV and Alan J. Michaels
Telecom 2024, 5(3), 632-651; https://doi.org/10.3390/telecom5030032 - 18 Jul 2024
Viewed by 731
Abstract
The data used during training in any given application space are directly tied to the performance of the system once deployed. While there are many other factors that are attributed to producing high-performance models based on the Neural Scaling Law within Machine Learning, [...] Read more.
The data used during training in any given application space are directly tied to the performance of the system once deployed. While there are many other factors that are attributed to producing high-performance models based on the Neural Scaling Law within Machine Learning, there is no doubt that the data used to train a system provide the foundation from which to build. One of the underlying heuristics used within the Machine Learning space is that having more data leads to better models, but there is no easy answer to the question, “How much data is needed to achieve the desired level of performance?” This work examines a modulation classification problem in the Radio Frequency domain space, attempting to answer the question of how many training data are required to achieve a desired level of performance, but the procedure readily applies to classification problems across modalities. The ultimate goal is to determine an approach that requires the lowest amount of data collection to better inform a more thorough collection effort to achieve the desired performance metric. By focusing on forecasting the performance of the model rather than the loss value, this approach allows for a greater intuitive understanding of data volume requirements. While this approach will require an initial dataset, the goal is to allow for the initial data collection to be orders of magnitude smaller than what is required for delivering a system that achieves the desired performance. An additional benefit of the techniques presented here is that the quality of different datasets can be numerically evaluated and tied together with the quantity of data, and ultimately, the performance of the architecture in the problem domain. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) A visualization of how the generalized problem space, <math display="inline"><semantics> <mi mathvariant="script">S</mi> </semantics></math>, encompasses the application space, <math display="inline"><semantics> <mi mathvariant="script">V</mi> </semantics></math>, as well as all possible data collection methods, <math display="inline"><semantics> <mi mathvariant="script">T</mi> </semantics></math>. (<b>b</b>) The process of sampling from a collection method, <math display="inline"><semantics> <mi mathvariant="script">T</mi> </semantics></math>, in order to produce a training dataset, <math display="inline"><semantics> <mi mathvariant="script">Y</mi> </semantics></math>. (<b>c</b>) The sampling of data from the application space to produce an evaluation dataset, <math display="inline"><semantics> <mi mathvariant="script">X</mi> </semantics></math>, for estimating a trained model’s performance if used within the application space. (<b>d</b>) The training process, <math display="inline"><semantics> <mrow> <mi>g</mi> <mo>(</mo> <mo>·</mo> <mo>)</mo> </mrow> </semantics></math>, with a given architecture, <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>(</mo> <mo>·</mo> <mo>)</mo> </mrow> </semantics></math>, and training set, <math display="inline"><semantics> <mi mathvariant="script">Y</mi> </semantics></math>, to produce the parameters, <math display="inline"><semantics> <mi>θ</mi> </semantics></math>, that can be used for inference with the architecture, <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>(</mo> <mo>·</mo> <mo>;</mo> <mi>θ</mi> <mo>)</mo> <mo>≡</mo> <mi>ϕ</mi> <mo>(</mo> <mo>·</mo> <mo>)</mo> </mrow> </semantics></math>. (<b>e</b>) The inference process using a trained model on the evaluation dataset, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>l</mi> <mo>˘</mo> </mover> <mrow> <mi>y</mi> <mo>|</mo> <mi>x</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>DL NN image representing the CLDNN architecture used in this work as the DL approach for the 10-class waveform AMC problem space.</p>
Full article ">Figure 3
<p>Visualization of the relationships between the three metrics (Left column: NCE, Middle column: LEEP, Right column: LogME) and the performance metric (Accuracy) of each network when measured on the results of the evaluation set <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mrow> <mi>T</mi> <mi>C</mi> </mrow> </msub> </semantics></math>, or the <span class="html-italic">target</span> dataset in TL vernacular. Each dataset used for training is positioned along the rows (Top row: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>C</mi> </msub> </semantics></math>, Middle row: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>S</mi> </msub> </semantics></math>, Bottom row: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>A</mi> </msub> </semantics></math>).</p>
Full article ">Figure 4
<p>Relationship between the quantity of data used from each dataset (Top: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>C</mi> </msub> </semantics></math>, Middle: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>S</mi> </msub> </semantics></math>, Bottom: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>A</mi> </msub> </semantics></math>) and the accuracy achieved by networks trained on that amount of data.</p>
Full article ">Figure 5
<p>Residuals between the regressed log-linear fits of the quantity of data available during training and the accuracy of each trained network and the observed accuracy of each network.</p>
Full article ">Figure 6
<p>The change in the values of {Top Left: Accuracy (1-Accuracy, log scale); Top Right: NCE (log scale); Bottom Left: LEEP (log scale); Bottom Right: LogME (linear scale)} as a function of the induced error, <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>, expected to achieve accuracy from the whitening the truth labels of the evaluation set <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mrow> <mi>T</mi> <mi>C</mi> </mrow> </msub> </semantics></math>. The results plotted are the average values over 1000 iterations per data point.</p>
Full article ">Figure 7
<p>Relationship between the quantity of data used from each dataset (Left: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>C</mi> </msub> </semantics></math>, Center: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>S</mi> </msub> </semantics></math>, Right: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>A</mi> </msub> </semantics></math>) and the metric (Top: NCE, Middle: LEEP, Bottom: LogME) achieved by networks trained on that amount of data.</p>
Full article ">Figure 8
<p>Quantity predictions based on a limited number of available data used to regress the estimate on the {Top Row: Capture <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>C</mi> </msub> </semantics></math>; Bottom Row: Augmented <math display="inline"><semantics> <msub> <mi mathvariant="normal">Ω</mi> <mi>A</mi> </msub> </semantics></math>} datasets when being used to estimate across the {Left: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Φ</mi> <mn>3</mn> </msub> </semantics></math>; Center: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Φ</mi> <mn>5</mn> </msub> </semantics></math>; Right: <math display="inline"><semantics> <msub> <mi mathvariant="normal">Φ</mi> <mn>10</mn> </msub> </semantics></math>} waveform space. The lines represent using {Accuracy: circle, NCE: square, LEEP: diamond, LogME: pentagram, Log Scale Midpoint of NCE and LogME: hexagram, Target: none} to predict data quantity needed, while Target is determined in <a href="#telecom-05-00032-t006" class="html-table">Table 6</a>.</p>
Full article ">
23 pages, 5137 KiB  
Article
Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)
by Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet and Ben Sanders
Telecom 2024, 5(3), 609-631; https://doi.org/10.3390/telecom5030031 - 10 Jul 2024
Viewed by 964
Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific [...] Read more.
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested. Full article
Show Figures

Figure 1

Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Use case diagram.</p>
Full article ">Figure 3
<p>Proposed balanced system requirement over device limitation, security and performance.</p>
Full article ">Figure 4
<p>Proposed IoMT monitoring architecture.</p>
Full article ">Figure 5
<p>RTPM controller architecture of the client.</p>
Full article ">Figure 6
<p>Model network diagram of key management.</p>
Full article ">Figure 7
<p>User registration for monitoring.</p>
Full article ">Figure 8
<p>User authorisation process.</p>
Full article ">Figure 9
<p>Connection establishment, identification, and authentication.</p>
Full article ">Figure 10
<p>Warning message so that the device is not moved.</p>
Full article ">Figure 11
<p>Warning when coming too close.</p>
Full article ">Figure 12
<p>Capturing evidence if the system is moved.</p>
Full article ">Figure 13
<p>The body temperature and moisture level.</p>
Full article ">Figure 14
<p>Air quality of the room and movement monitoring.</p>
Full article ">Figure 15
<p>Lighting and noise monitoring.</p>
Full article ">
21 pages, 4258 KiB  
Article
5G Network Deployment Planning Using Metaheuristic Approaches
by Binod Sapkota, Rijan Ghimire, Paras Pujara, Shashank Ghimire, Ujjwal Shrestha, Roshani Ghimire, Babu R. Dawadi and Shashidhar R. Joshi
Telecom 2024, 5(3), 588-608; https://doi.org/10.3390/telecom5030030 - 9 Jul 2024
Viewed by 1731
Abstract
The present research focuses on optimizing 5G base station deployment and visualization, addressing the escalating demands for high data rates and low latency. The study compares the effectiveness of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), and Grey Wolf Optimizer [...] Read more.
The present research focuses on optimizing 5G base station deployment and visualization, addressing the escalating demands for high data rates and low latency. The study compares the effectiveness of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), and Grey Wolf Optimizer (GWO) in both Urban Macro (UMa) and Remote Macro (RMa) deployment scenarios that overcome the limitations of the current method of 5G deployment, which involves adopting Non-Standalone (NSA) architecture. Emphasizing population density, the optimization process eliminates redundant base stations for enhanced efficiency. Results indicate that PSO and GA strike the optimal balance between coverage and capacity, offering valuable insights for efficient network planning. The study includes a comparison of 28 GHz and 3.6 GHz carrier frequencies for UMa, highlighting their respective efficiencies. Additionally, the research proposes a 2.6 GHz carrier frequency for Remote Macro Antenna (RMa) deployment, enhancing 5G Multi-Tier Radio Access Network (RAN) planning and providing practical solutions for achieving infrastructure reduction and improved network performance in a specific geographical context. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of System Architecture for BS Location Optimization and Deployment.</p>
Full article ">Figure 2
<p>Block Diagram for Metaheuristic Optimization.</p>
Full article ">Figure 3
<p>Population density of Thapathali. (<b>a</b>) P.D. in Map. (<b>b</b>) P.D. in Coordinate System.</p>
Full article ">Figure 4
<p>Initial arrangement of BSs (<b>a</b>) for 28 GHz and (<b>b</b>) for 3.6 GHz.</p>
Full article ">Figure 5
<p>Using PSO for 28 GHz. (<b>a</b>) BSs before elimination. (<b>b</b>) Voronoi Plot for BSs before elimination.</p>
Full article ">Figure 6
<p>Base station after Elimination using PSO 28 GHz. (<b>a</b>) Base station after elimination. (<b>b</b>) Voronoi Plot.</p>
Full article ">Figure 7
<p>UMa and RMa PSO. (<b>a</b>) UMa at 28 GHz. (<b>b</b>) RMa at 2.6 GHz.</p>
Full article ">Figure 8
<p>After elimination GA 28 GHz. (<b>a</b>) Base stations after elimination GA 28 GHz. (<b>b</b>) Voronoi plot of BSs after elimination GA 28 GHz.</p>
Full article ">Figure 9
<p>GWO 28 GHz. (<b>a</b>) BSs after elimination. (<b>b</b>) Voronoi Plot of BSs after elimination.</p>
Full article ">Figure 10
<p>Using SA 28GHz. (<b>a</b>) After elimination of redundant BS. (<b>b</b>) Voronoi plot after elimination of BS.</p>
Full article ">
32 pages, 31472 KiB  
Article
Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams
by Ivan Nedyalkov
Telecom 2024, 5(3), 556-587; https://doi.org/10.3390/telecom5030029 - 8 Jul 2024
Viewed by 548
Abstract
In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the performance of [...] Read more.
In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the performance of the specific devices under attack. In this work, a study was carried out to determine how individual TCP DoS attacks affect the parameters of VoIP (Voice over IP) voice and video streams. For the purpose of this work, a model of a simple IP network has been created using the GNS3 IP network-modeling platform. The VoIP platform used was Asterisk Free PBX. Tools from Kali Linux were used to implement the individual TCP DoS attacks; IP-network-monitoring tools and round-trip-delay-measurement tools were also used. The proposed study is applicable to multiple VoIP platforms wherein voice and video traffic are passed/processed by the VoIP server. From the obtained results, it was found that Asterisk Free PBX is very well secured against TCP DoS attacks, which do not affect the platform performance or the parameters of the voice and video streams. The values of the observed parameters, such as jitter, packet loss, round-trip delay, etc., are very far from the maximum allowable values. We also observed a low load on the CPU and RAM of the system during the whole study. Full article
Show Figures

Figure 1

Figure 1
<p>Topology of the modeled network.</p>
Full article ">Figure 2
<p>Number of different TCP packets sent during normal operation.</p>
Full article ">Figure 3
<p>Summarized results for the main parameters of the voice stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during normal operation mode.</p>
Full article ">Figure 4
<p>Instantaneous values of the jitter for the voice stream between VM_4 and Asterisk (<b>a</b>) and between VM_3 and Asterisk (<b>b</b>) during normal operation mode.</p>
Full article ">Figure 5
<p>Number of different TCP packets sent during the TCP SYN attack.</p>
Full article ">Figure 6
<p>Summarized results for the main parameters of the voice stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP SYN attack.</p>
Full article ">Figure 7
<p>Instantaneous values of the jitter for the voice stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP SYN attack.</p>
Full article ">Figure 8
<p>Number of different TCP packets sent during the TCP ACK attack.</p>
Full article ">Figure 9
<p>Summarized results for the main parameters of the voice stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP ACK attack.</p>
Full article ">Figure 10
<p>Instantaneous values of the jitter for the voice stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP ACK attack.</p>
Full article ">Figure 11
<p>Number of different TCP packets sent during the TCP RST attack.</p>
Full article ">Figure 12
<p>Summarized results for the main parameters of the voice stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP RST attack.</p>
Full article ">Figure 13
<p>Instantaneous values of the jitter for the voice stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP RST attack.</p>
Full article ">Figure 14
<p>Number of different TCP packets sent during the TCP FIN attack.</p>
Full article ">Figure 15
<p>Summarized results for the main parameters of the voice stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP FIN attack.</p>
Full article ">Figure 16
<p>Instantaneous values of the jitter for the voice stream between VM_4 and Asterisk (<b>a</b>) and VM_3 between and Asterisk (<b>b</b>) during the TCP FIN attack.</p>
Full article ">Figure 17
<p>Traffic processed by Asterisk during the whole study period.</p>
Full article ">Figure 18
<p>Number of different TCP packets for the whole study period during the voice-stream study.</p>
Full article ">Figure 19
<p>RTD between VM_1 and Asterisk.</p>
Full article ">Figure 20
<p>RTD between VM_2 and Asterisk.</p>
Full article ">Figure 21
<p>RTD between VM_3 and Asterisk.</p>
Full article ">Figure 22
<p>RTD between VM_4 and Asterisk.</p>
Full article ">Figure 23
<p>Number of different TCP packets sent during normal operation for a video conversation.</p>
Full article ">Figure 24
<p>Summarized results for the main parameters of the video stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during normal operation.</p>
Full article ">Figure 25
<p>Instantaneous values of the jitter for the video stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during normal operation mode.</p>
Full article ">Figure 26
<p>Number of different TCP packets sent during the TCP SYN attack for the video conversation.</p>
Full article ">Figure 27
<p>Summarized results for the main parameters of the video stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP SYN attack.</p>
Full article ">Figure 28
<p>Instantaneous values of the jitter for the video stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP SYN attack.</p>
Full article ">Figure 29
<p>Number of different TCP packets sent during the TCP ACK attack for the video conversation.</p>
Full article ">Figure 30
<p>Summarized results for the main parameters of the video stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP ACK attack.</p>
Full article ">Figure 31
<p>Instantaneous values of the jitter for the video stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP ACK attack.</p>
Full article ">Figure 32
<p>Number of different TCP packets sent during the TCP RST attack for the video conversation.</p>
Full article ">Figure 33
<p>Summarized results for the main parameters of the video stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP RST attack.</p>
Full article ">Figure 34
<p>Instantaneous values of the jitter for the video stream between VM_4 and Asterisk (<b>a</b>) and VM_3 and Asterisk (<b>b</b>) during the TCP RST attack.</p>
Full article ">Figure 35
<p>Number of different TCP packets sent during the TCP FIN attack for the video conversation.</p>
Full article ">Figure 36
<p>Summarized results for the main parameters of the video stream between VM_3 and the Asterisk (<b>a</b>) and between VM_4 and the Asterisk (<b>b</b>) during the TCP FIN attack.</p>
Full article ">Figure 37
<p>Instantaneous values of the jitter for the video stream between VM_4 and Asterisk (<b>a</b>) and between VM_3 and Asterisk (<b>b</b>) during the TCP FIN attack.</p>
Full article ">Figure 38
<p>Proceeded video traffic from Asterisk during the whole study period.</p>
Full article ">Figure 39
<p>Number of different TCP packets for the whole study period during the video-stream study.</p>
Full article ">Figure 40
<p>RTD between VM_3 and Asterisk for the video-stream study.</p>
Full article ">Figure 41
<p>RTD between VM_4 and Asterisk for the video-stream study.</p>
Full article ">Figure 42
<p>CPU load of the Asterisk Free PBX during the two studies.</p>
Full article ">Figure 43
<p>Memory load of the Asterisk Free PBX during the two studies.</p>
Full article ">
19 pages, 1474 KiB  
Article
Bi-GRU-APSO: Bi-Directional Gated Recurrent Unit with Adaptive Particle Swarm Optimization Algorithm for Sales Forecasting in Multi-Channel Retail
by Aruna Mogarala Guruvaya, Archana Kollu, Parameshachari Bidare Divakarachari, Przemysław Falkowski-Gilski and Hirald Dwaraka Praveena
Telecom 2024, 5(3), 537-555; https://doi.org/10.3390/telecom5030028 - 1 Jul 2024
Viewed by 717
Abstract
In the present scenario, retail sales forecasting has a great significance in E-commerce companies. The precise retail sales forecasting enhances the business decision making, storage management, and product sales. Inaccurate retail sales forecasting can decrease customer satisfaction, inventory shortages, product backlog, and unsatisfied [...] Read more.
In the present scenario, retail sales forecasting has a great significance in E-commerce companies. The precise retail sales forecasting enhances the business decision making, storage management, and product sales. Inaccurate retail sales forecasting can decrease customer satisfaction, inventory shortages, product backlog, and unsatisfied customer demands. In order to obtain a better retail sales forecasting, deep learning models are preferred. In this manuscript, an effective Bi-GRU is proposed for accurate sales forecasting related to E-commerce companies. Initially, retail sales data are acquired from two benchmark online datasets: Rossmann dataset and Walmart dataset. From the acquired datasets, the unreliable samples are eliminated by interpolating missing data, outlier’s removal, normalization, and de-normalization. Then, feature engineering is carried out by implementing the Adaptive Particle Swarm Optimization (APSO) algorithm, Recursive Feature Elimination (RFE) technique, and Minimum Redundancy Maximum Relevance (MRMR) technique. Followed by that, the optimized active features from feature engineering are given to the Bi-Directional Gated Recurrent Unit (Bi-GRU) model for precise retail sales forecasting. From the result analysis, it is seen that the proposed Bi-GRU model achieves higher results in terms of an R2 value of 0.98 and 0.99, a Mean Absolute Error (MAE) of 0.05 and 0.07, and a Mean Square Error (MSE) of 0.04 and 0.03 on the Rossmann and Walmart datasets. The proposed method supports the retail sales forecasting by achieving superior results over the conventional models. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

Figure 1
<p>Workflow of the proposed automated regression model.</p>
Full article ">Figure 2
<p>Architecture of the APSO algorithm.</p>
Full article ">Figure 3
<p>Architecture of the Bi-GRU model.</p>
Full article ">Figure 4
<p>Graphical comparison between the proposed and existing regression models.</p>
Full article ">
15 pages, 2222 KiB  
Article
Two-Level Clustering Algorithm for Cluster Head Selection in Randomly Deployed Wireless Sensor Networks
by Sagun Subedi, Shree Krishna Acharya, Jaehee Lee and Sangil Lee
Telecom 2024, 5(3), 522-536; https://doi.org/10.3390/telecom5030027 - 26 Jun 2024
Viewed by 928
Abstract
Clustering strategy in wireless sensor networks (WSNs) affects the lifetime, adaptability, and energy productivity of the wireless network system. The low-energy adaptive clustering hierarchy (LEACH) protocol is a convention used to improve the lifetime of WSNs. In this paper, a novel energy-efficient clustering [...] Read more.
Clustering strategy in wireless sensor networks (WSNs) affects the lifetime, adaptability, and energy productivity of the wireless network system. The low-energy adaptive clustering hierarchy (LEACH) protocol is a convention used to improve the lifetime of WSNs. In this paper, a novel energy-efficient clustering algorithm is proposed, with the aim of improving the energy efficiency of WSNs by reducing and balancing the energy consumptions. The clustering-based convention adjusts the energy utilization by allowing an equal opportunity for each node to turn them into a cluster head (CH). Two-level clustering (TLC) is introduced by adopting LEACH convention where CH selection process undergoes first and second level of clustering to overcome boundary problem in LEACH protocol. The TLC method structures nodes within the scope of the appointed CHs, in order to extend the lifetime of the system. The simulation results show that, in comparison with state-of-the-art methodologies, our proposed method significantly enhanced the system lifetime. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

Figure 1
<p>Deciding the number of nodes in the specified grid (Matrix). Blue diamond symbol indicates the number of nodes in each grid.</p>
Full article ">Figure 2
<p>Flowchart showing the working mechanism of the proposed TLC.</p>
Full article ">Figure 3
<p>Distribution of random nodes (10) and corresponding angles with BS.</p>
Full article ">Figure 4
<p>The residual energy distribution of every sensor node toward the end of 200 rounds of information exchange in various algorithms cited in the literature, compared to the proposed method.</p>
Full article ">Figure 5
<p>Distribution of CHs in various algorithms cited in the literature, compared to the proposed method.</p>
Full article ">Figure 6
<p>Residual energy distribution of the network system toward the end of 1000 rounds of information exchange in various algorithms cited in the literature, compared to the proposed method.</p>
Full article ">Figure 7
<p>The number of dead nodes after different numbers of information exchange rounds: (<b>a</b>) 200 rounds; (<b>b</b>) 500 rounds; and (<b>c</b>) 1000 rounds.</p>
Full article ">Figure 8
<p>Performance comparison between proposed and existing state-of-the-art method: (<b>a</b>) network lifetime; and (<b>b</b>) network throughput.</p>
Full article ">
14 pages, 4673 KiB  
Article
Experimental Evaluation of a MIMO Radar Performance for ADAS Application
by Federico Dios, Sergio Torres-Benito, Jose A. Lázaro, Josep R. Casas, Jorge Pinazo and Adolfo Lerín
Telecom 2024, 5(3), 508-521; https://doi.org/10.3390/telecom5030026 - 24 Jun 2024
Viewed by 848
Abstract
Among the sensors necessary to equip vehicles with an autonomous driving system, there is a tacit agreement that cameras and some type of radar would be essential. The ability of radar to spatially locate objects (pedestrians, other vehicles, trees, street furniture, and traffic [...] Read more.
Among the sensors necessary to equip vehicles with an autonomous driving system, there is a tacit agreement that cameras and some type of radar would be essential. The ability of radar to spatially locate objects (pedestrians, other vehicles, trees, street furniture, and traffic signs) makes it the most economical complement to the cameras in the visible spectrum in order to give the correct depth to scenes. From the echoes obtained by the radar, some data fusion algorithms will try to locate each object in its correct place within the space surrounding the vehicle. In any case, the usefulness of the radar will be determined by several performance parameters, such as its average error in distance, the maximum errors, and the number of echoes per second it can provide. In this work, we have tested experimentally the AWR1843 MIMO radar from Texas Instruments to measure those parameters. Full article
(This article belongs to the Topic Radar Signal and Data Processing with Applications)
Show Figures

Figure 1

Figure 1
<p>Main lane of the parking lot where the measurements reported in this work have been carried out. Photograph was taken from the same point and with the same orientation as where the radar was located.</p>
Full article ">Figure 2
<p>Measurements of a turning reflector on the calibration grid points. Red circles are the reference points. The darker blue points correspond to correctly measured echoes, the lighter blue points correspond to incorrectly located echoes or false echoes.</p>
Full article ">Figure 3
<p>Global map of the received echoes along the time in scenario 1, while three pedestrians are walking along straight paths. False or dubious echoes are enclosed with dashed or continuous blue lines.</p>
Full article ">Figure 4
<p>Echoes received over time in the second experiment (little blue boxes), with two pedestrians going and coming along approximately the same path and a motorcycle, describe the longest and most vertical paths. Arrows indicates the direction of the movement.</p>
Full article ">Figure 5
<p>The graph shows the set of echoes received from a motorcycle (blue little boxes) occupying the center of the scene and doing some laps in front of the radar at an approximately constant speed. Red boxes mark the beginning and the end of their trip. A group of false echoes is enclosed with a dashed line. Arrows indicate the direction of the motorbike movement.</p>
Full article ">Figure 6
<p>Effective probability of false alarm in the three scenes, obtained as a function of the PFA parameter chosen for the detection of targets at a distance. For the selection of velocities, the value <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>F</mi> <msub> <mrow> <mi>A</mi> </mrow> <mrow> <mi>v</mi> <mi>e</mi> <mi>l</mi> </mrow> </msub> <mo>=</mo> <mn>0.2</mn> <mo> </mo> </mrow> </semantics></math> was used in all cases.</p>
Full article ">Figure 7
<p>Mean error in distance obtained for individual targets in the first scenario.</p>
Full article ">Figure 8
<p>Range error committed along the tracking of one of the targets in scenario 1, for two values of the <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>F</mi> <msub> <mrow> <mi>A</mi> </mrow> <mrow> <mi>r</mi> <mi>a</mi> <mi>n</mi> <mi>g</mi> <mi>e</mi> </mrow> </msub> </mrow> </semantics></math> parameter.</p>
Full article ">Figure 9
<p>Mean range error obtained in the localization of the motorbike in scenario 2 along the two different paths.</p>
Full article ">Figure 10
<p>Estimated range error in each motorcycle echo in scenario 3, as a function of distance to the radar, with <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>F</mi> <msub> <mrow> <mi>A</mi> </mrow> <mrow> <mi>r</mi> <mi>a</mi> <mi>n</mi> <mi>g</mi> <mi>e</mi> </mrow> </msub> <mo>=</mo> <mn>0.001</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>Number of valid echoes per second from each target in scene 1.</p>
Full article ">Figure 12
<p>Signal time evolution and parameters in the radar configuration.</p>
Full article ">
Previous Issue
Back to TopTop