Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149576
Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi
Medicinal plants have a huge significance today as it is the root resource to treat several ailments and medical disorders that do not find a satisfactory cure using allopathy. The manual and physical identification of such plants requires experience and expertise and it can be a gradual and cumbersome task, in addition to resulting in inaccurate decisions. In an attempt to automate this decision making, a data set of leaves of 10 medicinal plant species were prepared and the Gray-level Co-occurence Matrix (GLCM) features were extracted. From our earlier implementations of the several machine learning algorithms, the k-nearest neighbor (KNN) algorithm was identified as best suited for classification using MATLAB 2019a and has been adopted here. Based on the confusion matrices for various k values, the optimum k was selected and the hardware implementation was implemented for the classifier on FPGA in this work. An accuracy of 88.3% was obtained for the classifier from the confusion chart. A custom intellectual property (IP) for the design is created and its verification is done on the ZedBoard for three classes of plants.
药用植物在当今具有巨大的意义,因为它是治疗异体疗法无法治愈的多种疾病和病症的根本资源。对这些植物进行人工和物理识别需要经验和专业知识,而且可能是一项渐进而繁琐的任务,此外还会导致决策不准确。为了实现自动决策,我们准备了 10 种药用植物叶片的数据集,并提取了灰度共轭矩阵(GLCM)特征。从我们之前对几种机器学习算法的实施情况来看,K-近邻(KNN)算法被认为是最适合使用 MATLAB 2019a 进行分类的算法,因此在此被采用。根据不同 k 值的混淆矩阵,我们选择了最佳 k 值,并在 FPGA 上对分类器进行了硬件实现。根据混淆图,分类器的准确率达到 88.3%。为该设计创建了自定义知识产权(IP),并在 ZedBoard 上对三类植物进行了验证。
{"title":"Optimized Supervised ML for Medicinal Plant Detection - An FPGA Implementation","authors":"Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi","doi":"10.24425/ijet.2024.149576","DOIUrl":"https://doi.org/10.24425/ijet.2024.149576","url":null,"abstract":"Medicinal plants have a huge significance today as it is the root resource to treat several ailments and medical disorders that do not find a satisfactory cure using allopathy. The manual and physical identification of such plants requires experience and expertise and it can be a gradual and cumbersome task, in addition to resulting in inaccurate decisions. In an attempt to automate this decision making, a data set of leaves of 10 medicinal plant species were prepared and the Gray-level Co-occurence Matrix (GLCM) features were extracted. From our earlier implementations of the several machine learning algorithms, the k-nearest neighbor (KNN) algorithm was identified as best suited for classification using MATLAB 2019a and has been adopted here. Based on the confusion matrices for various k values, the optimum k was selected and the hardware implementation was implemented for the classifier on FPGA in this work. An accuracy of 88.3% was obtained for the classifier from the confusion chart. A custom intellectual property (IP) for the design is created and its verification is done on the ZedBoard for three classes of plants.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149596
V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura
The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.
与大学信息和教育系统(UIES)的网络安全(网络风险)用户行为有关的数字足迹(DF)分析涉及对系统中各方面活动的研究和评估。具体而言,此类分析包括研究访问大学信息和教育系统的典型模式(模式)、密码使用、网络活动、安全策略的遵守情况、异常行为的识别等。研究表明,用户在 UIES 中的行为是由操作序列表示的,可以使用序列分析方法进行分析。这种分析方法可使 UIES 的信息安全(IS)系统有效处理与用户行为序列模式相关的分类数据。分析表明,对具有网络威胁的用户行为的连续模式进行分析,可使 UIES IS 系统识别可能隐藏在行为链(而不仅仅是单个事件)中的更复杂的威胁。这样就能更有效地识别潜在威胁,防止用户和信息服务系统发生安全事件。
{"title":"Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems","authors":"V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura","doi":"10.24425/ijet.2024.149596","DOIUrl":"https://doi.org/10.24425/ijet.2024.149596","url":null,"abstract":"The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149602
Adam Jagielski
In this study, we introduce a procedural generation technique for Identity Templates applicable to quantum and reversible logic circuits. These templates are recognized for their significant role in enhancing the efficiency of quantum and reversible logic optimization. Our approach enables the exhaustive synthesis of all potential templates up to a specified size. Leveraging the power of SAT-solver technology, we have verified the comprehensiveness of our template collections by confirming the full exploration of the search space. Additionally, we propose an innovative concept of Suboptimality Witnesses, which we anticipate will be instrumental in streamlining the search process in formal methods, akin to SAT-solvers, for the synthesis of reversible logic circuits.
在本研究中,我们介绍了一种适用于量子和可逆逻辑电路的身份模板程序生成技术。这些模板因其在提高量子和可逆逻辑优化效率方面的重要作用而得到认可。我们的方法可以穷举合成指定大小的所有潜在模板。利用 SAT 求解器技术的强大功能,我们通过对搜索空间的充分探索,验证了模板集合的全面性。此外,我们还提出了 "次优性见证 "这一创新概念,预计它将有助于简化可逆逻辑电路合成的形式方法(类似于 SAT 求解器)的搜索过程。
{"title":"Complete synthesis of identity templates for quantum and reversible logic MCT circuits using SAT-solvers and proposal of suboptimality witness notion","authors":"Adam Jagielski","doi":"10.24425/ijet.2024.149602","DOIUrl":"https://doi.org/10.24425/ijet.2024.149602","url":null,"abstract":"In this study, we introduce a procedural generation technique for Identity Templates applicable to quantum and reversible logic circuits. These templates are recognized for their significant role in enhancing the efficiency of quantum and reversible logic optimization. Our approach enables the exhaustive synthesis of all potential templates up to a specified size. Leveraging the power of SAT-solver technology, we have verified the comprehensiveness of our template collections by confirming the full exploration of the search space. Additionally, we propose an innovative concept of Suboptimality Witnesses, which we anticipate will be instrumental in streamlining the search process in formal methods, akin to SAT-solvers, for the synthesis of reversible logic circuits.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149595
Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy
In this work, artificial intelligence methods are designed and adopted for evaluating various risk levels of thyroid hormone and blood pressure in humans. Fuzzy Logic (FL) method is firstly exploited to provide the risk levels. Additionally, a machine learning was proposed using the Adaptive Neuron- Fuzzy Inference System (ANFIS) to learn and assess the risk levels by fusing a multiple-layer Neural Network (NN) with the FL. The data are collected for standard risk levels from real medical centers. The results lead to well ANFIS design based on the FL, which can generate such interesting outcomes for predicting risk levels for thyroid hormone and blood pressure. Both proposed methods of the FL and ANFIS can be exploited for medical applications.
{"title":"Estimating risk levels for blood pressure and thyroid hormone using artificial intelligence methods","authors":"Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy","doi":"10.24425/ijet.2024.149595","DOIUrl":"https://doi.org/10.24425/ijet.2024.149595","url":null,"abstract":"In this work, artificial intelligence methods are designed and adopted for evaluating various risk levels of thyroid hormone and blood pressure in humans. Fuzzy Logic (FL) method is firstly exploited to provide the risk levels. Additionally, a machine learning was proposed using the Adaptive Neuron- Fuzzy Inference System (ANFIS) to learn and assess the risk levels by fusing a multiple-layer Neural Network (NN) with the FL. The data are collected for standard risk levels from real medical centers. The results lead to well ANFIS design based on the FL, which can generate such interesting outcomes for predicting risk levels for thyroid hormone and blood pressure. Both proposed methods of the FL and ANFIS can be exploited for medical applications.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149599
Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov
It is shown that focusing systems built on the basis of a system of radio receivers spaced apart in space and simulating the operation of a lens can be used to ensure the protection of information during data transmission in the direct radio visibility zone. The synthesis of the lens equivalent in this case is carried out by using a system of phase shifters that change the phase of the oscillations arriving at each of the receivers, so that the receiving system is tuned to a radio wave source located at a specific point in space. In this case, information protection is provided according to the “friend or foe” principle, and any commands coming from other areas of space, except for the point where the authorized operator is located, are ignored. The advantage of this approach is the ability to partially or completely abandon the use of cryptographic methods. It is shown that the proposed approach is of considerable interest for ensuring the stable operation of groups of unmanned aerial vehicles from the point of view of the possibility of intercepting control using electronic warfare methods.
{"title":"Application of focusing systems to the protection of information during data transmission in the zone of direct radio visibility","authors":"Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov","doi":"10.24425/ijet.2024.149599","DOIUrl":"https://doi.org/10.24425/ijet.2024.149599","url":null,"abstract":"It is shown that focusing systems built on the basis of a system of radio receivers spaced apart in space and simulating the operation of a lens can be used to ensure the protection of information during data transmission in the direct radio visibility zone. The synthesis of the lens equivalent in this case is carried out by using a system of phase shifters that change the phase of the oscillations arriving at each of the receivers, so that the receiving system is tuned to a radio wave source located at a specific point in space. In this case, information protection is provided according to the “friend or foe” principle, and any commands coming from other areas of space, except for the point where the authorized operator is located, are ignored. The advantage of this approach is the ability to partially or completely abandon the use of cryptographic methods. It is shown that the proposed approach is of considerable interest for ensuring the stable operation of groups of unmanned aerial vehicles from the point of view of the possibility of intercepting control using electronic warfare methods.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149590
Jacek Wójcik, M. Piasecka, Marzena Mięsikowska
The aim of this article is to present modern methods for analysing the performance of certified measuring instruments. The design of a system for analysing the performance of certified measuring instruments is presented. In the first part, the traditional process of certification of measuring instruments and methods of market surveillance are described. The other part proposes an electronic solution to support the certification process by supervising the correct operation of measuring instruments.
{"title":"Design of a system to analyse the performance of certified measuring instruments","authors":"Jacek Wójcik, M. Piasecka, Marzena Mięsikowska","doi":"10.24425/ijet.2024.149590","DOIUrl":"https://doi.org/10.24425/ijet.2024.149590","url":null,"abstract":"The aim of this article is to present modern methods for analysing the performance of certified measuring instruments. The design of a system for analysing the performance of certified measuring instruments is presented. In the first part, the traditional process of certification of measuring instruments and methods of market surveillance are described. The other part proposes an electronic solution to support the certification process by supervising the correct operation of measuring instruments.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141805854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149608
M. W. Romaniuk, J. Łukasiewicz-Wieleba
The article analyzes the opinions of academic teachers on the use of information technologies (ICT) in higher education teaching. Key conclusions from the study indicate the need to ensure a stable Internet connection and access to functional computer equipment and projectors in each classroom. Teachers emphasize the importance of financing the software and its systematic updating. The university's technical support is also important, including quick response to problems and the availability of the technical department. The respondents point out the need to increase the number of training courses on new tools and AI, which will allow for better adaptation to the needs of students. They also point to the need to equip classrooms with equipment for hybrid classes and support students by providing them with laptops and specialized software.
{"title":"Information technologies in higher education teaching in the opinions of academic teachers","authors":"M. W. Romaniuk, J. Łukasiewicz-Wieleba","doi":"10.24425/ijet.2024.149608","DOIUrl":"https://doi.org/10.24425/ijet.2024.149608","url":null,"abstract":"The article analyzes the opinions of academic teachers on the use of information technologies (ICT) in higher education teaching. Key conclusions from the study indicate the need to ensure a stable Internet connection and access to functional computer equipment and projectors in each classroom. Teachers emphasize the importance of financing the software and its systematic updating. The university's technical support is also important, including quick response to problems and the availability of the technical department. The respondents point out the need to increase the number of training courses on new tools and AI, which will allow for better adaptation to the needs of students. They also point to the need to equip classrooms with equipment for hybrid classes and support students by providing them with laptops and specialized software.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149586
P. Dziechciński
Knowledge of interfering noise is necessary for the correct design of a public address system. Noise sound levels can be obtained, for example, from BS 5389-1. It is more difficult to acquire knowledge of the interfering noise spectra, and the spectrum is also important for calculating speech intelligibility. As shown in the paper, for crowd noise, it is possible to determine the spectrum by pairing the level of noise to the speech spectrum for appropriate vocal effort. The error in determining the speech transmission index for public address systems for such selected noise spectra, relative to values for measurement-acquired noise spectra, is acceptable.
{"title":"Crowd noise spectra for the calculation of the speech transmission index for public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149586","DOIUrl":"https://doi.org/10.24425/ijet.2024.149586","url":null,"abstract":"Knowledge of interfering noise is necessary for the correct design of a public address system. Noise sound levels can be obtained, for example, from BS 5389-1. It is more difficult to acquire knowledge of the interfering noise spectra, and the spectrum is also important for calculating speech intelligibility. As shown in the paper, for crowd noise, it is possible to determine the spectrum by pairing the level of noise to the speech spectrum for appropriate vocal effort. The error in determining the speech transmission index for public address systems for such selected noise spectra, relative to values for measurement-acquired noise spectra, is acceptable.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149591
Łukasz Dróżdż, Jerzy Roj
The article presents a method for analyzing the own errors of the discrete wavelet transform algorithms, which are introduced by these algorithms into the output quantities. The presented considerations include determining the origin of the error signals in question and determining their parameters. Both errors resulting from imperfections in the transmittance of the algorithm and those resulting from its implementation in the actual measurement chain were considered.
{"title":"Origin and properties of own error signals of the discrete wavelet transform algorithms","authors":"Łukasz Dróżdż, Jerzy Roj","doi":"10.24425/ijet.2024.149591","DOIUrl":"https://doi.org/10.24425/ijet.2024.149591","url":null,"abstract":"The article presents a method for analyzing the own errors of the discrete wavelet transform algorithms, which are introduced by these algorithms into the output quantities. The presented considerations include determining the origin of the error signals in question and determining their parameters. Both errors resulting from imperfections in the transmittance of the algorithm and those resulting from its implementation in the actual measurement chain were considered.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.24425/ijet.2024.149578
P. Dziechciński
To precision calculate the speech transmission index (STI), it is necessary to know the level and spectrum of the interfering noise. Simplified design methods used in public address systems are limited to obtaining an appropriate signal-to-noise ratio based on A weighted sound levels. For this reason, among others, guidelines for designers usually contain information on typical interfering noise levels and do not provide information on the noise spectrum. As shown in the paper, the effect of the noise spectrum on STI can be very high, and when such spectrum cannot be obtained by measurement or computation, standardised spectra appropriate for a given type of noise can be used for STI calculations.
要精确计算语音传输指数 (STI),就必须知道干扰噪声的电平和频谱。公共广播系统中使用的简化设计方法仅限于根据 A 加权声级获得适当的信噪比。因此,除其他原因外,设计人员指南通常只包含典型干扰噪声电平的信息,而不提供噪声频谱的信息。如本文所示,噪声频谱对 STI 的影响可能非常大,当无法通过测量或计算获得此类频谱时,可使用适合特定类型噪声的标准化频谱来计算 STI。
{"title":"Noise spectra for calculation the speech transmission index in public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149578","DOIUrl":"https://doi.org/10.24425/ijet.2024.149578","url":null,"abstract":"To precision calculate the speech transmission index (STI), it is necessary to know the level and spectrum of the interfering noise. Simplified design methods used in public address systems are limited to obtaining an appropriate signal-to-noise ratio based on A weighted sound levels. For this reason, among others, guidelines for designers usually contain information on typical interfering noise levels and do not provide information on the noise spectrum. As shown in the paper, the effect of the noise spectrum on STI can be very high, and when such spectrum cannot be obtained by measurement or computation, standardised spectra appropriate for a given type of noise can be used for STI calculations.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}