首页 > 最新文献

2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)最新文献

英文 中文
A cognitive system for future-proof wireless microphones: Concept, implementation and results 面向未来的无线麦克风认知系统:概念、实现和结果
J. Brendel, S. Riess, R. Weigel, G. Fischer
Since several years, `cognitive radio' is given much attention in research and is seen as a future technology in communications. In this paper a cognitive radio system for Program Making and Special Event (PMSE) devices (e.g. wireless microphones) is presented and the results of a field test are discussed. First, we outline the challenges which the PMSE industry has to cope with and how changes in regulatory and the digital dividend in the TV UHF band has impact on the operation reliability of PMSE devices. Afterwards, a system is presented that uses cognitive radio techniques to ensure the high audio quality requirements and interference free operation of PMSE devices under the previously mentioned circumstances. Beside a general overview over the developed system we focus on a distributed spectrum sensing network as part of the cognitive information acquisition to monitor the current spectrum situation. The data is used by the cognitive engine to detect potential interferers and to trigger operation parameter changes (e.g. frequency or transmit power) of the PMSE devices to avoid link quality degradation. We present the built-up sensor nodes for the spectrum measurement and the developed software to control the sensor nodes and to preprocess the measured data. Finally, the results, collected with the field test platform in the fair-ground of Berlin, show convincingly how the developed cognitive system makes PMSE devices future-proof.
近年来,“认知无线电”在研究中备受关注,被视为通信领域的未来技术。本文介绍了一种用于节目制作和特殊事件(PMSE)设备(如无线麦克风)的认知无线电系统,并讨论了现场测试的结果。首先,我们概述了PMSE行业必须应对的挑战,以及电视UHF频段的监管变化和数字红利如何影响PMSE设备的运行可靠性。然后,提出了一种利用认知无线电技术的系统,以保证PMSE器件在上述情况下的高音质要求和无干扰运行。除了对已开发系统的总体概述外,我们还重点介绍了分布式频谱感知网络作为认知信息获取的一部分,以监测当前频谱情况。认知引擎使用这些数据来检测潜在的干扰,并触发PMSE设备的操作参数变化(例如频率或发射功率),以避免链路质量下降。提出了用于光谱测量的传感器节点,并开发了用于控制传感器节点和对测量数据进行预处理的软件。最后,在柏林集市的现场测试平台上收集的结果令人信服地表明,开发的认知系统如何使PMSE设备面向未来。
{"title":"A cognitive system for future-proof wireless microphones: Concept, implementation and results","authors":"J. Brendel, S. Riess, R. Weigel, G. Fischer","doi":"10.1109/TELSKS.2013.6704934","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704934","url":null,"abstract":"Since several years, `cognitive radio' is given much attention in research and is seen as a future technology in communications. In this paper a cognitive radio system for Program Making and Special Event (PMSE) devices (e.g. wireless microphones) is presented and the results of a field test are discussed. First, we outline the challenges which the PMSE industry has to cope with and how changes in regulatory and the digital dividend in the TV UHF band has impact on the operation reliability of PMSE devices. Afterwards, a system is presented that uses cognitive radio techniques to ensure the high audio quality requirements and interference free operation of PMSE devices under the previously mentioned circumstances. Beside a general overview over the developed system we focus on a distributed spectrum sensing network as part of the cognitive information acquisition to monitor the current spectrum situation. The data is used by the cognitive engine to detect potential interferers and to trigger operation parameter changes (e.g. frequency or transmit power) of the PMSE devices to avoid link quality degradation. We present the built-up sensor nodes for the spectrum measurement and the developed software to control the sensor nodes and to preprocess the measured data. Finally, the results, collected with the field test platform in the fair-ground of Berlin, show convincingly how the developed cognitive system makes PMSE devices future-proof.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of SCADA system vulnerabilities to DDoS attacks SCADA系统面对DDoS攻击的漏洞分析
Jasna D. Marković-Petrović, M. Stojanović
Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information-telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.
有几个因素导致了新型控制系统特有的风险升级,包括网络架构、采用具有已知漏洞的标准化技术以及控制系统与其他网络的连接。本文考虑了SCADA (Supervisory Control And Data Acquisition,监控与数据采集)系统的脆弱性,以及保障电力企业信息通信系统基础设施的安全。我们首先提出了水电站SCADA体系结构的概念。仿真模型假设SCADA系统受到分布式拒绝服务(DDoS)攻击。综合仿真表明,在DDoS攻击下SCADA的性能会下降。还讨论了可能的安全解决方案。
{"title":"Analysis of SCADA system vulnerabilities to DDoS attacks","authors":"Jasna D. Marković-Petrović, M. Stojanović","doi":"10.1109/TELSKS.2013.6704448","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704448","url":null,"abstract":"Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information-telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparison of compression performance of 10-bit vs. 8-bit depth, under H.264 Hi422 profile H.264 Hi422配置文件下10位与8位深度压缩性能的比较
Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano
H.264 is one of the first video coding standard incorporating coding formats with a bit-depth of above 8 bits. This paper presents the results of compression comparison tests for the H.264 “High 422” profile, between 10-bit and 8-bit sample depths. The simulations were run on five 720p and 1080i high definition sequences. PSNR and SSIM metrics were used to evaluate the objective quality performance of both bit-depths, and with the aim of enabling a fair comparison, both metrics were computed with 10-bit precision, up-scaling the 8-bit decoded sequences to 10-bits. Some works have been published in this field based on the evaluation of commercial 10-bit H.264 implementations. In this work, we carry out a neutral evaluation of H.264 standard performance using the official H.264 Reference Software. Unlike the expected 10-bit coding gains, the results show unnoticeable differences between both sample depths in terms of objective quality, lower 0.1dB for PSNR and 0.002 for SSIM, with a 5% bit rate saving that can be achieved for the luminance component, especially for the 720p format, and negligible quality improvement for U and V chroma components.
H.264是最早采用8位以上深度编码格式的视频编码标准之一。本文介绍了H.264“高422”轮廓在10位和8位采样深度之间的压缩比较测试结果。模拟在5个720p和1080i高清序列上运行。PSNR和SSIM指标用于评估两个比特深度的客观质量性能,为了实现公平的比较,两个指标都以10位精度计算,将8位解码序列放大到10位。在对商用10位H.264实现进行评估的基础上,该领域已经发表了一些著作。在这项工作中,我们使用官方的H.264参考软件对H.264标准的性能进行了中性的评估。与预期的10位编码增益不同,结果显示两种样本深度在物镜质量方面的差异不明显,PSNR降低0.1dB, SSIM降低0.002,亮度分量(特别是720p格式)可以节省5%的比特率,U和V色度分量的质量改善可以忽略不计。
{"title":"Comparison of compression performance of 10-bit vs. 8-bit depth, under H.264 Hi422 profile","authors":"Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano","doi":"10.1109/TELSKS.2013.6704904","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704904","url":null,"abstract":"H.264 is one of the first video coding standard incorporating coding formats with a bit-depth of above 8 bits. This paper presents the results of compression comparison tests for the H.264 “High 422” profile, between 10-bit and 8-bit sample depths. The simulations were run on five 720p and 1080i high definition sequences. PSNR and SSIM metrics were used to evaluate the objective quality performance of both bit-depths, and with the aim of enabling a fair comparison, both metrics were computed with 10-bit precision, up-scaling the 8-bit decoded sequences to 10-bits. Some works have been published in this field based on the evaluation of commercial 10-bit H.264 implementations. In this work, we carry out a neutral evaluation of H.264 standard performance using the official H.264 Reference Software. Unlike the expected 10-bit coding gains, the results show unnoticeable differences between both sample depths in terms of objective quality, lower 0.1dB for PSNR and 0.002 for SSIM, with a 5% bit rate saving that can be achieved for the luminance component, especially for the 720p format, and negligible quality improvement for U and V chroma components.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132005745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectral correlation characterization of MB-OFDM signals MB-OFDM信号的频谱相关特性
D. Vucic, M. Eric, I. Pokrajac
A new, matrix-based, stochastic method for cyclic spectral analysis of MB-OFDM signals, based on their Markov chain representation, is proposed. Explicit expression for the cyclic spectrum of these signals is derived. Some theoretical and simulation results for the spectral correlation characterization of MB-OFDM signals are presented, as well.
提出了一种基于矩阵的MB-OFDM信号随机循环频谱分析方法。导出了这些信号的循环谱的显式表达式。给出了MB-OFDM信号频谱相关特性的一些理论和仿真结果。
{"title":"Spectral correlation characterization of MB-OFDM signals","authors":"D. Vucic, M. Eric, I. Pokrajac","doi":"10.1109/TELSKS.2013.6704424","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704424","url":null,"abstract":"A new, matrix-based, stochastic method for cyclic spectral analysis of MB-OFDM signals, based on their Markov chain representation, is proposed. Explicit expression for the cyclic spectrum of these signals is derived. Some theoretical and simulation results for the spectral correlation characterization of MB-OFDM signals are presented, as well.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving protection of PHP source code using cryptology models 使用密码学模型改进PHP源代码的保护
A. Jevremović, Nenad Ristić, M. Veinovic
Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology.
如今,在保护PHP脚本免受不必要的使用、复制和修改方面出现了越来越多的问题。现有的源代码级解决方案主要是作为混淆器,是免费的,并且没有提供任何严格的保护。对操作码进行编码的解决方案更安全,但它们是商业化的,并且需要封闭源代码的专有PHP解释器扩展。此外,编码的操作码与解释器的未来版本不兼容,这意味着需要从作者那里重新购买编码器。最后,如果扩展源代码被泄露,那么由该解决方案编码的所有脚本也会被泄露。本文提出了一种免费开源的PHP脚本保护解决方案。建议方案提供的保护级别等于商业解决方案的保护级别。当脚本保护被视为密码学中的安全通信通道时,模型基于使用标准密码学模型分析现有解决方案的优缺点得出的结论。
{"title":"Improving protection of PHP source code using cryptology models","authors":"A. Jevremović, Nenad Ristić, M. Veinovic","doi":"10.1109/TELSKS.2013.6704410","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704410","url":null,"abstract":"Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Case study: DNS service protection methods 案例分析:DNS服务保护方法
Ljubomir Ivanis, S. Adamovic, A. Jevremović
This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.
本文介绍了DNS服务与客户端之间通信的安全问题。它描述了在通信方面提供更高安全性的新技术的使用,以及它们在特定情况下的应用。本文基于CPU有限公司在实施安全解决方案期间获得的经验,特别是与保护DNS服务免受滥用有关的部分。本文将描述一些已经实现的实际解决方案。
{"title":"Case study: DNS service protection methods","authors":"Ljubomir Ivanis, S. Adamovic, A. Jevremović","doi":"10.1109/TELSKS.2013.6704446","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704446","url":null,"abstract":"This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aligned software and process models with both the eTOM framework and the ITIL processes 将软件和过程模型与eTOM框架和ITIL过程对齐
Aleksandra Denda, D. Drajic
The main objective of this consolidation work is to define and implement TO - BE Incident Management process between three different company that operate in three different countries which incorporate both eTOM and ITIL frameworks taking in eTOM process definitions within the context of the wider ITIL processes. It will enable process automation for network and service assurance for multi-vendor, multi-technology resource infrastructures. Implementation of the new common regional Service management system together with the redesign and implementation of new service management processes are expected to enable the effective and efficient delivery of services and support of changing business needs.
这项整合工作的主要目标是在三个不同国家运营的三家不同公司之间定义和实施to - BE事件管理流程,这些公司将eTOM和ITIL框架结合起来,在更广泛的ITIL流程的背景下采用eTOM流程定义。它将使多供应商、多技术资源基础设施的网络和服务保障过程自动化成为可能。预计新的共同区域事务管理系统的实施,加上重新设计和实施新的事务管理程序,将能够有效和高效率地提供服务,并支持不断变化的业务需要。
{"title":"Aligned software and process models with both the eTOM framework and the ITIL processes","authors":"Aleksandra Denda, D. Drajic","doi":"10.1109/TELSKS.2013.6704461","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704461","url":null,"abstract":"The main objective of this consolidation work is to define and implement TO - BE Incident Management process between three different company that operate in three different countries which incorporate both eTOM and ITIL frameworks taking in eTOM process definitions within the context of the wider ITIL processes. It will enable process automation for network and service assurance for multi-vendor, multi-technology resource infrastructures. Implementation of the new common regional Service management system together with the redesign and implementation of new service management processes are expected to enable the effective and efficient delivery of services and support of changing business needs.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA Implementation of Joint Spatio-Temporal Spectrum Sensing Algorithm Based on Direct Localization Method 基于直接定位法的联合时空频谱感知算法的FPGA实现
S. Brkić, M. Eric
In this paper a practical implementation of joint spatio-temporal spectrum sensing method based on direct localization is presented. The chosen algorithm was implemented in FPGA (Field-Programmable Gate Array) technology which can provide necessary computation power for executing complex sensing operation and achieves sensing duration measured in microseconds.
提出了一种基于直接定位的联合时空频谱感知方法。所选择的算法在FPGA (Field-Programmable Gate Array,现场可编程门阵列)技术中实现,可以为执行复杂的传感操作提供必要的计算能力,并实现以微秒为单位测量的传感持续时间。
{"title":"FPGA Implementation of Joint Spatio-Temporal Spectrum Sensing Algorithm Based on Direct Localization Method","authors":"S. Brkić, M. Eric","doi":"10.1109/TELSKS.2013.6704937","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704937","url":null,"abstract":"In this paper a practical implementation of joint spatio-temporal spectrum sensing method based on direct localization is presented. The chosen algorithm was implemented in FPGA (Field-Programmable Gate Array) technology which can provide necessary computation power for executing complex sensing operation and achieves sensing duration measured in microseconds.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF MEMS based systems for space communications 基于射频MEMS的空间通信系统
L. Vietzorreck, Taeyoung Kim
In this paper novel concepts for space communication systems are introduced. A switch matrix system for satellite applications based on RF MEMS switches is described. For space applications RF MEMS switches have several advantages compared to their mechanical or solid-state counterparts. They are small, compact and lightweight with a high linearity up to high frequencies. The simulated performance of the 12×12 switch matrix is below -12dB IL (Insertion Loss) up to C band and better than -15dB RL (Return Loss) up to Ku band. Moreover, it has a good isolation better than -50dB. Technology, performance and limitations of the proposed system are discussed.
本文介绍了空间通信系统的新概念。介绍了一种基于射频MEMS开关的卫星应用开关矩阵系统。对于空间应用,与机械或固态开关相比,RF MEMS开关具有几个优势。它们体积小,结构紧凑,重量轻,线性度高,可达高频。12×12开关矩阵在C波段的模拟性能低于-12dB IL(插入损耗),在Ku波段的模拟性能优于-15dB RL(回波损耗)。此外,它具有良好的隔离优于-50dB。讨论了该系统的技术、性能和局限性。
{"title":"RF MEMS based systems for space communications","authors":"L. Vietzorreck, Taeyoung Kim","doi":"10.1109/TELSKS.2013.6704399","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704399","url":null,"abstract":"In this paper novel concepts for space communication systems are introduced. A switch matrix system for satellite applications based on RF MEMS switches is described. For space applications RF MEMS switches have several advantages compared to their mechanical or solid-state counterparts. They are small, compact and lightweight with a high linearity up to high frequencies. The simulated performance of the 12×12 switch matrix is below -12dB IL (Insertion Loss) up to C band and better than -15dB RL (Return Loss) up to Ku band. Moreover, it has a good isolation better than -50dB. Technology, performance and limitations of the proposed system are discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to assess criticality of elements in the process of information infrastructure protection 信息基础设施保护过程中要素关键度评估方法
Goran Murić, D. Macura, N. Gospic, D. Bogojevic
In this paper the new approach to assessment an importance/criticality of elements within the critical information infrastructure is presented. The proposed method is based on the identification of critical routes within the network, and the recognition of the most important nodes without using centrality measures and simulation techniques. The elements and their dependencies within the information infrastructure are transformed into a relational topological graph. The elements are presented as the nodes, and the relations between them as the edges of the graph.
本文提出了一种评估关键信息基础设施中要素重要性/临界性的新方法。该方法基于对网络中关键路由的识别,以及对最重要节点的识别,而不使用中心性度量和仿真技术。信息基础设施中的元素及其依赖关系被转换为关系拓扑图。元素被表示为节点,它们之间的关系被表示为图的边。
{"title":"An approach to assess criticality of elements in the process of information infrastructure protection","authors":"Goran Murić, D. Macura, N. Gospic, D. Bogojevic","doi":"10.1109/TELSKS.2013.6704909","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704909","url":null,"abstract":"In this paper the new approach to assessment an importance/criticality of elements within the critical information infrastructure is presented. The proposed method is based on the identification of critical routes within the network, and the recognition of the most important nodes without using centrality measures and simulation techniques. The elements and their dependencies within the information infrastructure are transformed into a relational topological graph. The elements are presented as the nodes, and the relations between them as the edges of the graph.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1