The RFID Propagation Scenario

2016 ◽  
Vol 92 (2) ◽  
pp. 437-454
Author(s):  
Adriano Almeida Goes ◽  
Paulo Cardieri ◽  
Michel Daoud Yacoub
Keyword(s):  
2000 ◽  
Vol 177 ◽  
pp. 267-268
Author(s):  
Alexis von Hoensbroech

AbstractPulsar polarimetry is an important tool for the investigation of the physical processes and the environment in the magnetosphere. However, the great variety of observed polarization states and the few obvious systematics hamper a straightforward interpretation. In this paper it is shown that the polarimetric features of pulsars are much more systematic at high radio frequencies. An analysis of 116 profiles at 4.85 GHz reveals a clear correlation between the degree of polarization andĖ. Also evidence is shown for pulsars with a heavily increasing degree of circular polarization. Further, a basic concept of a simple magnetospheric propagation scenario is presented, which can account for a variety of polarimetric properties of pulsars.


2002 ◽  
Vol 2002.4 (0) ◽  
pp. 195-196
Author(s):  
Yukio HISHINUMA ◽  
Takemi CHIKAHISA ◽  
Kei KAWAKAMI

2018 ◽  
Vol 5 (1) ◽  
pp. 11-19
Author(s):  
Alfius Yonathan

This paper presented an analysis of malware propagation scenario in which attacker exploit news spreading dynamics on Twitter. The malware propagation starts with an attacker crafting tweets about breaking news, event or tragedy that will lure user to click the short-URL provided in the tweet which then redirect user to malicious website, which in turn installed the malware in the user mobile device or computer. As the information spread in the Twitter then more users will be infected with malware. The underlying principle to analyze this type of malware propagation is that the spreading of information in Twitter can be modeled by using formal epidemic model of disease. The simulation result of the model shows parameters that highly impacting the spread of malware using Twitter as the medium.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xin-Rui Liu ◽  
Yuan Meng ◽  
Peng Chang

The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario.


2007 ◽  
Vol 3 (2) ◽  
pp. 99 ◽  
Author(s):  
Zoran Blažević ◽  
Igor Zanchi ◽  
Ivan Marinović

In this paper we analyze measurements conducted in an indoor environment of our university building at a centralfrequency of 2.4 GHz in terms of the Saleh-Valenzuela channel. The channel parameters are extrapolated by processing the power-delay profiles measured by a vector network analyzer. Final adjustments of the parameters are obtained by comparison of simulated and measured delay-spread cumulative density functions, where a quite good agreement between the two is obtained. The predictions of the coherence bandwidth are satisfactory as well. We also considered some extensions to the original form of the model and concluded that the one that would be worthy to apply is the one that, besides temporal, incorporates also spatial information about the channel, whereas other modifications are found to be unnecessary or even unjustified for evaluation of this indoor propagation scenario.


2021 ◽  
Vol 2 (7) ◽  
pp. 63-80
Author(s):  
Yifei Wu ◽  
Johannes Koch ◽  
Martin Vossiek ◽  
Wolfgang Gerstacker

Single-Carrier Frequency Division Multiple Access (SC-FDMA) is a promising technique for high data rate indoor Terahertz (THz) communications in future beyond 5G systems. In an indoor propagation scenario, the Line-Of-Sight (LOS) component may be blocked by the obstacles. Thus, efficient THz SC-FDMA communications require a fast and reliable Beam Alignment (BA) method for both LOS and Non-Line-Of-Sight (NLOS) scenarios. In this paper, we first adopt the hierarchical discrete Fourier transform codebook for LOS BA, and introduce the hierarchical k-means codebook for NLOS BA to improve the beamforming gain. Simulation results illustrate that the hierarchical DFT codebook and the hierarchical k-means codebook can achieve the beamforming gain close to that of the maximum ratio transmission in LOS and NLOS cases, respectively. Based on these two codebooks, we propose a Multi-Armed Bandit (MAB) algorithm named Hierarchical Beam Alignment (HBA) for single-user SC-FDMA THz systems to reduce the BA latency. HBA utilizes a hierarchical structure in the adopted codebook and prior knowledge regarding the noise power to speed up the BA process. Both theoretical analysis and simulation results indicate that the proposed BA method converges to the optimal beam with high probability for both the hierarchical DFT codebook and the hierarchical k-means codebook in the LOS and NLOS scenarios, respectively. The latency introduced by HBA is significantly lower when compared to an exhaustive search method and other MAB-based methods.


Sign in / Sign up

Export Citation Format

Share Document