radio technology
Recently Published Documents


TOTAL DOCUMENTS

303
(FIVE YEARS 76)

H-INDEX

17
(FIVE YEARS 3)

2021 ◽  
Vol 20 ◽  
pp. 68-80
Author(s):  
Dia Mohamad Ali ◽  
Zhraa Zuheir Yahya

Filtered-orthogonal frequency division multiplexing (F-OFDM) is a quasi-orthogonal waveform candidate for the applications of the fifth generation (5G) communication system. In this study, an F-OFDM waveform with unequal sub-band sizes is proposed to improve the spectrum efficiency (SE) of the 5G system. The proposed waveform is modeled with the Blackman window-sinc filter and is developed based on the software-defined radio (SDR) technology for practical implementation. The result shows that the F-OFDM performance of the simulation and hardware implementation is approximately the same. The SE using the proposed F-OFDM waveform is 6% and 5.8% higher than the SE using the conventional OFDM waveform under the simulation in the LabVIEW NXG simulator and under the practical use in the universal software radio peripheral (USRP) platform, respectively.


2021 ◽  
Vol 19 ◽  
pp. 93-104
Author(s):  
Wolfgang Mathis ◽  
Anja Titze

Abstract. In this contribution, we examine the development of radio technology before 1921 and the emergence of the broadcasting concept during the World War I. We consider in detail the experiments in the transmitter stations located in Eberswalde and Königs Wusterhausen and numerous sources in order to assess the importance of their work. We also discuss the question of whether the medium of broadcasting (“Rundfunk”) started in Germany (or even in Europe) 100 years ago in one of these transmitter stations.


2021 ◽  
Vol 2 (3) ◽  
pp. 70-77
Author(s):  
Ji Zhang ◽  
Chenghan Li

UWB (Ultra-Wideband) technology is also called "Ultra-Wideband", also known as pulse radio technology. UWB-based positioning technology has real-time indoor and outdoor accurate tracking capabilities, with high positioning accuracy, which can achieve centimeter-level or even millimeter-level positioning. Based on the provided anchor point ranging information, this paper analyzes normal and abnormal data and establishes an accurate positioning model. For task 1, preprocess the data, export the file, delete invalid data, and fill in missing values. For task 2, it is required to establish models for normal and abnormal data respectively. For task 3, it is consistent with the model obtained in task 2. The only difference is that the coordinates of the four anchor points used for the test data have changed. When the target coordinates are calculated, the anchor point coordinates can be replaced to obtain the model required by task 3. For task 4, use the processed data in task one to establish a mathematical model, and train the model through the integrated learning method to determine whether the collected signal is interference. For task 5, first use the integrated learning model in task four to eliminate the interference data in the data, import the eliminated data into the positioning model of task two for positioning, and add Kalman based on interference recognition to the static estimation algorithm.


2021 ◽  
Author(s):  
Fouzi Boukhalfa ◽  
Mohamed Hadded ◽  
Paul Muhlethaler ◽  
Oyunchimeg Shagdar

2021 ◽  
Vol 2 (3) ◽  
pp. 410-416
Author(s):  
Rumyantsev O. Rumyantsev

The COVID-19 pandemic did not diminish interest in radiotheranostics. However, the demand for visualization of pathological processes using cross-sectional and hybrid imaging (CT, MRI, SPECT, and PET) is increased. Over the past 15 months, the world has seen an exponential increase in investment in new radiopharmaceuticals for radiotheranostics. The list of antibodies and ligands labeled with "medical" radioactive isotopes is expanding as the molecular mechanisms of regulation and implementation of metabolic processes become clearer. The range of diagnostic and therapeutic radioactive isotopes is also expanding, ultimately increasing the range and availability of radiotherapy in nuclear medicine centers worldwide. It is necessary to unite the efforts of physicists, radiopharmacists, chemists, biologists, doctors, and mathematicians to develop radio technology. Usage and improvement of personalized dosimetry for planning radionuclide therapy is also a priority. For example, the International Foundation Oncidium helps with information and exchange of experience, while the international diagnostic study NOBLE increases the availability and reduces the cost of PSMA receptor scintigraphy. An association for the development of theranostics was created to intensify the integration renewal of nuclear medicine.


2021 ◽  
pp. 1-10
Author(s):  
S. Surekha ◽  
Md. Zia Ur Rahman

In medical telemetry networks, cognitive radio technology is mostly used to avoid licensed spectrum underutilization and by providing access to unlicensed spectrum users without causing interference to primary users, this concept is widely used in development of smart hospitals and smart cities. In medical telemetry networks frequency spectrum concept is used for providing treatment to patients who are far away from hospitals. In cognitive radios, spectrum sensing concept is used in which energy detection method is mostly used because it is simple to implement. While measuring health care environments using cognitive radios probability detection, false alarm probability and threshold parameters are calculated. In this paper for identifying spectrum holes in spectrum sensing using energy detection, distributed diffusion non-negative least mean square algorithm is proposed. It gives better results compared to energy detection concept alone in terms of probability detection converged earlier. If number of nodes are increasing probability detection is decreased from one and move towards left and its SNR is around 1.5-2 dB with proposed method. Hence simulation results give better results in terms of sensing ability while measuring patient condition.


Author(s):  
Ling Li ◽  
Tien-Szu Pan ◽  
Xiao-Xue Sun ◽  
Shu-Chuan Chu ◽  
Jeng-Shyang Pan

AbstractSpectrum has now become a scarce resource due to the continuous development of wireless communication technology. Cognitive radio technology is considered to be a new method to solve the shortage of spectrum resources. The spectrum allocation model of cognitive radio can effectively avoid the waste of spectrum resources. A novel binary version of slime mould algorithm is proposed for the spectrum allocation model to solve the spectrum allocation scheme. In addition, adding unselected factors strategy can make the approach find a better solution. Compared with other algorithms, the novel binary slime mould algorithm and the strategy of adding unselected factors proposed in this paper have a good performance in spectrum allocation. The resulting spectrum allocation scheme can achieve efficient use of network resources.


2021 ◽  
Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.


Respati ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. 116
Author(s):  
Hidayatul Ichwan, Mardi Hardjianto

INTISASI Teknologi tanpa kabel yang lebih dikenal dengan Wi-Fi. Wi-Fi (Wirelles Fidelity) adalah koneksi tanpa kabel yang menghubungkan jaringan komputer, seperti ponsel yang menggunakan teknologi radio sehingga pengguna dapat melakukan transfer data dengan cepat dan aman. Kebutuhan akan Wi-Fi terlihat dengan jelas, baik di rumah, di kantor-kantor, di kampus, maupun pusat-pusat bisnis. Trafik pengguna Wi-Fi semakin tinggi, namun pemasangan Access Point belum tepat banyak access point yang terpasang yang pemasangannya tidak menentukan jarak antar access point. Menyebabkan penumpukan sinyal dengan access point lain dan area yang tidak tercover oleh access point atau area blankspot. Banyaknya pemasangan access point yang tidak tepat menjadi permasalahan yaitu koneksi Wi-Fi yang tidak stabil dan banyaknya tempat yang tidak terjangkau oleh sinyal Wi-Fi atau blankspot. Salah satu metode yang dipakai dalam penentuan pemasangan access point saat ini adalah menggunakan metode Simulated Annealing dan Trilateration. Penelitian ini akan membahas optimasi pemasangan access point dengan menggunakan metode trilateration  yang digunakan untuk mengukur jarak antar access point dan Simulated Aneling digunakan untuk mengukur kekuatan sinyal Wi-Fi. Dari hasil pemasangan Access point dengan menggunakan metode trialteration dan simulated annealing dapat mengurangi area blankspot dan mengurangi penumpukan sinyal dengan access point lain. Kata Kunci : access point, Simulated Annealing, Trilateration, Sinyal, Area.  ABSTRACT Wireless technology, better known as Wi-Fi. Wi-Fi (Wirelles Fidelity) is a wireless connection that connects computer networks, such as mobile phones that use radio technology so that users can transfer data quickly and safely. The need for Wi-Fi is clearly visible, both at home, in offices, on campus, and business centers. Wi-Fi user traffic is getting higher, but the installation of Access Points is not right yet, many installed access points do not determine the distance between access points. Causes signal buildup with other access points and areas not covered by the access point or blankspot area. The number of improper access point installations is a problem, namely unstable Wi-Fi connections and many places that are not covered by Wi-Fi or blankspot signals. One of the methods used in determining the installation of an access point is to use the Simulated Annealing and Trilateration method. This study will discuss the optimization of the installation of access points using the trilateration method used to measure the distance between access points and Simulated Aneling is used to measure the strength of Wi-Fi signals. From the results of installing Access Points using the method of trialteration and simulated annealing can reduce the blankspot area and reduce the buildup of signals with other access points. Keywords: access point, Trilateration, Anneling Simulation, Signal, Area.


Sign in / Sign up

Export Citation Format

Share Document