scholarly journals Geolocation and diagnostics of trunk pipelines using an active acoustic sensor

2021 ◽  
Vol 2094 (5) ◽  
pp. 052008
Author(s):  
E A Kokhonkova ◽  
O A Maykov ◽  
V S Potylitsyn

Abstract The article discusses the issue of determining the location of the main pipeline to identify the deviation of its position from the design due to climatic factors. The possibility of using active sensors capable of operating both as diagnostic devices installed on the main pipeline and as a beacon is investigated, according to the signal of which it is possible to determine the location of this sensor with acceptable accuracy. The optimal operating frequencies are determined by mathematical modeling to ensure the maximum data transfer rate and the required signal-to-noise ratio. The simulation results show the possibility of assessing the attenuation of signals in the ground, as well as determining the limiting range of the method.

2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2021 ◽  
Vol 11 (10) ◽  
pp. 4440
Author(s):  
Youheng Tan ◽  
Xiaojun Jing

Cooperative spectrum sensing (CSS) is an important topic due to its capacity to solve the issue of the hidden terminal. However, the sensing performance of CSS is still poor, especially in low signal-to-noise ratio (SNR) situations. In this paper, convolutional neural networks (CNN) are considered to extract the features of the observed signal and, as a consequence, improve the sensing performance. More specifically, a novel two-dimensional dataset of the received signal is established and three classical CNN (LeNet, AlexNet and VGG-16)-based CSS schemes are trained and analyzed on the proposed dataset. In addition, sensing performance comparisons are made between the proposed CNN-based CSS schemes and the AND, OR, majority voting-based CSS schemes. The simulation results state that the sensing accuracy of the proposed schemes is greatly improved and the network depth helps with this.


2015 ◽  
Vol 719-720 ◽  
pp. 767-772
Author(s):  
Wei Jun Cheng

In this paper, we present the end-to-end performance of a dual-hop amplify-and-forward variablegain relaying system over Mixture Gamma distribution. Novel closed-form expressions for the probability density function and the moment-generation function of the end-to-end Signal-to-noise ratio (SNR) are derived. Moreover, the average symbol error rate, the average SNR and the average capacity are found based on the above new expressions, respectively. These expressions are more simple and accuracy than the previous ones obtained by using generalized-K (KG) distribution. Finally, numerical and simulation results are shown to verify the accuracy of the analytical results.


2013 ◽  
Vol 443 ◽  
pp. 392-396
Author(s):  
Peng Zhou ◽  
Chi Sheng Li

In this paper, we proposed a new symbol rate estimation algorithm for phase shift keying (PSK) and qua drawtube amplitude modulation (QAM) signals in AWGN channel First we constructe a delay-multiplied signal, from which we obtaine the modulated information. Then we calculated the instantaneous autocorrelation of the delay-multiplied signal to pick out the phase jump. To eliminate the restriction of frequency resolution in fast Fourier transform, we performed a Chirp-Z transform to find out the exact spectral line which represente the symbol rate of the signal to be analyzed. Compared with the existing algorithms, it is a simple solution that has a better performance and accuracy in low signal-to-noise-ratio channel conditions. Simulation results show that the probability of relative estimating deviation below 0.1% reaches 100% and the average and standard variance of absolute estimation deviation are at the magnitude of 10-2 when SNR is over 2dB.


2002 ◽  
Vol 41 (Part 1, No. 3B) ◽  
pp. 1804-1807 ◽  
Author(s):  
Gakuji Hashimoto ◽  
Hiroki Shima ◽  
Kenji Yamamoto ◽  
Tsutomu Maruyama ◽  
Takashi Nakao ◽  
...  

2013 ◽  
Vol 846-847 ◽  
pp. 1185-1188 ◽  
Author(s):  
Hua Bing Wu ◽  
Jun Liang Liu ◽  
Yuan Zhang ◽  
Yong Hui Hu

This paper proposes an improved acquisition method for high-order binary-offset-carrier (BOC) modulated signals based on fractal geometry. We introduced the principle of our acquisition method, and outlined its framework. We increase the main peak to side peaks ratio in the BOC autocorrelation function (ACF), with a simple fractal geometry transform. The proposed scheme is applicable to both generic high-order sine-and cosine-phased BOC-modulated signals. Simulation results show that the proposed method increases output signal to noise ratio (SNR).


2018 ◽  
Vol 45 (6) ◽  
pp. 767-778 ◽  
Author(s):  
Amjad Rehman ◽  
Tanzila Saba ◽  
Toqeer Mahmood ◽  
Zahid Mehmood ◽  
Mohsin Shah ◽  
...  

In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of personal and copyrighted material has become a critical issue. Consequently, secure means of data transfer are the most urgent need of the time. Steganography is the science and art of protecting the secret data from an unauthorised access. The steganographic approaches conceal secret data into a cover file of type audio, video, text and/or image. The actual challenge in steganography is to achieve high robustness and capacity without bargaining on the imperceptibility of the cover file. In this article, an efficient steganography method is proposed for the transfer of secret data in digital images using number theory. For this purpose, the proposed method represents the cover image using the Fibonacci sequence. The representation of an image in the Fibonacci sequence allows increasing the bit planes from 8-bit to 12-bit planes. The experimental results of the proposed method in comparison with other existing steganographic methods exhibit that our method not only achieves high embedding of secret data but also gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR). Furthermore, the robustness of the technique is also evaluated in the presence of salt and pepper noise attack on the cover images.


2021 ◽  
Author(s):  
Mohammad Nazrul Islam

There are three dominant noise mechanisms in an analog optical fiber link. These are shot noise that is proportional to the mean optical power, relative intensity noise (RIN) that is proportional to the square of the instanteaneous optical power. This report describes an adaptive noise cancellation of these dominant noise processes that persist an analog optical fiber link. The performance of an analog optical fiber link is analyzed by taking the effects of these noise processes. Analytical and simulation results show that some improvement in signal to noise ratio (SNR) and this filter is effective to remove noise adaptively from the optical fiber link.


2021 ◽  
Vol 1 (132) ◽  
pp. 136-144
Author(s):  
Volodymyr Khandetskyi ◽  
Dmutro Sivtsov ◽  
Kostjantun Panin

Analysis of new technologies IEEE 802.11ac/ax of wireless networks showed that increasing their noise immunity is an actual task. The article studies the efficiency of fragmented data frames transmission. Comparison of the efficiencies in the case of retransmission of the corrupted original frame and in the case of its fragmentation in a wide range of the physical data transfer rates is carried out.


Sign in / Sign up

Export Citation Format

Share Document