Pub Date : 2024-02-12DOI: 10.26636/jtit.2024.1.1377
Aissa Ouardi
This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.
{"title":"Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion","authors":"Aissa Ouardi","doi":"10.26636/jtit.2024.1.1377","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1377","url":null,"abstract":"This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"16 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139783113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.26636/jtit.2024.1.1430
Rachid Fateh, Hicham Oualla, Es-said Azougaghe, A. Darif, A. Boumezzough, Said Safi, M. Pouliquen, M. Frikel
Within the realm of machine learning, kernel methods stand out as a prominent class of algorithms with widespread applications, including but not limited to classification, regression, and identification tasks. Our paper addresses the challenging problem of identifying the finite impulse response (FIR) of single-input single-output nonlinear systems under the influence of perturbations and binary-valued measurements. To overcome this challenge, we exploit two algorithms that leverage the framework of reproducing kernel Hilbert spaces (RKHS) to accurately identify the impulse response of the Proakis C channel. Additionally, we introduce the application of these kernel methods for estimating binary output data of nonlinear systems. We showcase the effectiveness of kernel adaptive filters in identifying nonlinear systems with binary output measurements, as demonstrated through the experimental results presented in this study.
在机器学习领域,核方法是一类突出的算法,应用广泛,包括但不限于分类、回归和识别任务。我们的论文探讨了在扰动和二值测量影响下识别单输入单输出非线性系统的有限脉冲响应(FIR)这一具有挑战性的问题。为了克服这一挑战,我们利用两种算法,利用重现核希尔伯特空间(RKHS)框架来准确识别 Proakis C 信道的脉冲响应。此外,我们还介绍了这些核方法在估计非线性系统二进制输出数据中的应用。通过本研究中的实验结果,我们展示了核自适应滤波器在识别具有二进制输出测量值的非线性系统中的有效性。
{"title":"Machine Learning Based System Identification with Binary Output Data Using Kernel Methods","authors":"Rachid Fateh, Hicham Oualla, Es-said Azougaghe, A. Darif, A. Boumezzough, Said Safi, M. Pouliquen, M. Frikel","doi":"10.26636/jtit.2024.1.1430","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1430","url":null,"abstract":"Within the realm of machine learning, kernel methods stand out as a prominent class of algorithms with widespread applications, including but not limited to classification, regression, and identification tasks. Our paper addresses the challenging problem of identifying the finite impulse response (FIR) of single-input single-output nonlinear systems under the influence of perturbations and binary-valued measurements. To overcome this challenge, we exploit two algorithms that leverage the framework of reproducing kernel Hilbert spaces (RKHS) to accurately identify the impulse response of the Proakis C channel. Additionally, we introduce the application of these kernel methods for estimating binary output data of nonlinear systems. We showcase the effectiveness of kernel adaptive filters in identifying nonlinear systems with binary output measurements, as demonstrated through the experimental results presented in this study.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139842162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.26636/jtit.2024.1.1438
Anindita Khan, J. S. Roy
To improve radio access capability, sky connections relying on satellites or unmanned aerial vehicles (UAV), as well as high-altitude platforms (HAP) will be exploited in 6G wireless communication systems, complementing terrestrial networks. For long-distance communication, a large smart antenna will be used that is characterized by high amounts of power consumed by digital beamformers. This paper focuses on reducing power consumption by relying on a thinned smart antenna (TSA). The performance of TSA is investigated in the sub-6 GHz band. The differential evolution (DE) algorithm is used to optimize excitation weights of the individual dipoles in the antenna array and these excitation weights are then used in TSA for beamforming, with signal processing algorithms deployed. The DE technique is used with the least mean square, recursive least square and sample matrix inversion algorithms. The proposed method offers almost the same directivity, simultaneously ensuring lower side lobes (SLL) and reduced power consumption. For a TSA of 20, 31, and 64 dipoles, the power savings are 20%, 19.4%, and 17.2%, respectively. SLL reductions achieved, in turn, vary from 5.2 dB to 8.1 dB.
{"title":"Design of Low Power Thinned Smart Antenna for 6G Sky Connection","authors":"Anindita Khan, J. S. Roy","doi":"10.26636/jtit.2024.1.1438","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1438","url":null,"abstract":"To improve radio access capability, sky connections relying on satellites or unmanned aerial vehicles (UAV), as well as high-altitude platforms (HAP) will be exploited in 6G wireless communication systems, complementing terrestrial networks. For long-distance communication, a large smart antenna will be used that is characterized by high amounts of power consumed by digital beamformers. This paper focuses on reducing power consumption by relying on a thinned smart antenna (TSA). The performance of TSA is investigated in the sub-6 GHz band. The differential evolution (DE) algorithm is used to optimize excitation weights of the individual dipoles in the antenna array and these excitation weights are then used in TSA for beamforming, with signal processing algorithms deployed. The DE technique is used with the least mean square, recursive least square and sample matrix inversion algorithms. The proposed method offers almost the same directivity, simultaneously ensuring lower side lobes (SLL) and reduced power consumption. For a TSA of 20, 31, and 64 dipoles, the power savings are 20%, 19.4%, and 17.2%, respectively. SLL reductions achieved, in turn, vary from 5.2 dB to 8.1 dB.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"119 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139785224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wideband meta-material absorber with square and circular split rings that is based on a frequency selective surface of conductive ink is proposed. With over 90% absorptivity, the structure demonstrates broad absorption for the C, X, KU and K bands, as well as polarization independent characteristics for both TE and TM, at angles of up to 45°. Research has been performed to better understand the absorption phenomenon by looking into real and imaginary permittivity, permeability, normalized impedance, and surface current density. The meta-material absorber (MA) discussed in this study finds use in defense-related applications, such as radar surveillance, stealth technology, terrestrial and satellite communications.
本文提出了一种基于导电油墨频率选择表面的宽带元材料吸收器,它具有方形和圆形分裂环。该结构的吸收率超过 90%,对 C、X、KU 和 K 波段具有广泛的吸收,并且在高达 45° 的角度下对 TE 和 TM 均具有偏振无关特性。为了更好地理解吸收现象,我们对实导率和虚导率、磁导率、归一化阻抗和表面电流密度进行了研究。本研究讨论的元材料吸收器(MA)可用于雷达监控、隐形技术、地面和卫星通信等国防相关领域。
{"title":"Polarization Independent Ultra-wideband Meta-material Absorber Using Conductive Ink Resonator","authors":"Bharti Kumari, Abhinav Kumar, Prashant Kumar, Mintu Singh","doi":"10.26636/jtit.2024.1.1392","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1392","url":null,"abstract":"A wideband meta-material absorber with square and circular split rings that is based on a frequency selective surface of conductive ink is proposed. With over 90% absorptivity, the structure demonstrates broad absorption for the C, X, KU and K bands, as well as polarization independent characteristics for both TE and TM, at angles of up to 45°. Research has been performed to better understand the absorption phenomenon by looking into real and imaginary permittivity, permeability, normalized impedance, and surface current density. The meta-material absorber (MA) discussed in this study finds use in defense-related applications, such as radar surveillance, stealth technology, terrestrial and satellite communications.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"139 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139842946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.26636/jtit.2024.1.1377
Aissa Ouardi
This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.
{"title":"Low Complexity Stopping Rule for Turbo Decoding: the Max-log Criterion","authors":"Aissa Ouardi","doi":"10.26636/jtit.2024.1.1377","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1377","url":null,"abstract":"This paper presents a new stopping criterion for turbo decoding. It is based on the selection of the maximum log-alphas calculated by the log-MAP algorithm. The sum of these maximum alphas is compared with a threshold value. Then, a decision on the end of decoding is taken. Simulation results show that the max-log criterion offers the same performance as the sum-alpha and sum-log criteria, while maintaining the same complexity level. The max-log criterion uses only the max operator to select maximum alphas and a summation. Therefore, the proposed criterion is faster and offers lower complexity.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"181 27","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139843263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-18DOI: 10.26636/jtit.2024.1.1350
Fatimah Salman, B. Sabbar
In this article, the elimination of ambiguity of a joined coprime array has been examined, with a focus on such of its properties as large aperture size and complete degree of freedom (DOF). The existing methods suffer from a high degree of computation complexity due to the loss constant characteristic and high peak searching. Therefore, in this paper, a DOA estimation method for a jointed coprime array, characterized by a low degree of computational complexity, is proposed. The variance of the diagonal eigenvalues of the estimated covariance matrix is designed to enhance the accuracy of the covariance matrix of the joined coprime array. Then, the Capon beamforming methods is employed for peak searching. The simulation shows that the proposed method accomplishes accurate estimation with shorter computation times and fewer operations compared to other DOA estimation methods.
本文研究了如何消除连接共轭阵列的模糊性,重点关注其大孔径尺寸和完整自由度(DOF)等特性。由于损耗常数特性和高峰值搜索,现有方法存在计算复杂度高的问题。因此,本文提出了一种计算复杂度较低的联合共轭阵列 DOA 估计方法。设计了估计协方差矩阵对角特征值的方差,以提高联合共轭阵列协方差矩阵的精度。然后,采用 Capon 波束成形方法进行峰值搜索。仿真结果表明,与其他 DOA 估计方法相比,所提出的方法能以更短的计算时间和更少的操作完成精确估计。
{"title":"Low-Complexity DOA Estimation Method Based on Joined Coprime Array","authors":"Fatimah Salman, B. Sabbar","doi":"10.26636/jtit.2024.1.1350","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1350","url":null,"abstract":"In this article, the elimination of ambiguity of a joined coprime array has been examined, with a focus on such of its properties as large aperture size and complete degree of freedom (DOF). The existing methods suffer from a high degree of computation complexity due to the loss constant characteristic and high peak searching. Therefore, in this paper, a DOA estimation method for a jointed coprime array, characterized by a low degree of computational complexity, is proposed. The variance of the diagonal eigenvalues of the estimated covariance matrix is designed to enhance the accuracy of the covariance matrix of the joined coprime array. Then, the Capon beamforming methods is employed for peak searching. The simulation shows that the proposed method accomplishes accurate estimation with shorter computation times and fewer operations compared to other DOA estimation methods.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"121 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-18DOI: 10.26636/jtit.2024.1.1389
A. Chmielowiec, Leszek Klich, Weronika Woś
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.
文章提出了一种为星形拓扑无线传感器网络设计的新型节能协议。该协议使用 ECC 实现,尽管它可以很容易地适用于任何代数结构,而离散对数问题在计算上具有挑战性。除了形式上的描述,作者还提供了通过使用 Scyther 软件对模型进行验证,对协议的安全性能进行调查的结果。该出版物还包括对协议能耗的分析,分析是通过使用 ARM 微控制器硬件平台进行的。
{"title":"Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks","authors":"A. Chmielowiec, Leszek Klich, Weronika Woś","doi":"10.26636/jtit.2024.1.1389","DOIUrl":"https://doi.org/10.26636/jtit.2024.1.1389","url":null,"abstract":"The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"112 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-29DOI: 10.26636/jtit.2023.4.1481
Paweł Białoń
The tracking of moving objects with the use of GPS/GNSS or other techniques is relied upon in numerous applications, from health monitoring and physical activity support, to social investigations to detection of fraud in transportation. While monitoring movement, a common subtask consists in determining the object's moving periods, and its immobility periods. In this paper, we isolate the mathematical problem of automatic detection of a stop of tracking objects under the stream processing regime (ideal data processing algorithm regime) in which one is allowed to use only a constant amount of memory, while the stream of GNSS positions of the tracked object increases in size. We propose an approximation scheme of the stop detection problem based on the fuzziness in the approximation of noise level related to the position reported by GNSS. We provide a solving algorithm that determines some upper bounds for the problem's complexity. We also provide an experimental illustration of the problem at hand.
{"title":"A Problem of Detecting Stops While Tracking Moving Objects Under the Stream Processing Regime","authors":"Paweł Białoń","doi":"10.26636/jtit.2023.4.1481","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1481","url":null,"abstract":"The tracking of moving objects with the use of GPS/GNSS or other techniques is relied upon in numerous applications, from health monitoring and physical activity support, to social investigations to detection of fraud in transportation. While monitoring movement, a common subtask consists in determining the object's moving periods, and its immobility periods. In this paper, we isolate the mathematical problem of automatic detection of a stop of tracking objects under the stream processing regime (ideal data processing algorithm regime) in which one is allowed to use only a constant amount of memory, while the stream of GNSS positions of the tracked object increases in size. We propose an approximation scheme of the stop detection problem based on the fuzziness in the approximation of noise level related to the position reported by GNSS. We provide a solving algorithm that determines some upper bounds for the problem's complexity. We also provide an experimental illustration of the problem at hand.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139147308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-27DOI: 10.26636/jtit.2023.4.1402
Marcin Kowalczyk, Michal Marzecki, Jerzy Siuzdak
In this paper, we investigate how data transmissions may be affected by various types of optical interference introduced into the fiber on purpose, via a clip-on coupler. The research proved that transmissions may be jammed completely using inexpensive equipment readily available on the market, provided that the attacker has physical access to the fiber optic cable. The most dangerous attacks rely on a typical, slowly modulated communication laser with a rectangular waveform. This study urges further research aimed at counteracting such attacks.
{"title":"The Threat of Optical Transmission Jamming","authors":"Marcin Kowalczyk, Michal Marzecki, Jerzy Siuzdak","doi":"10.26636/jtit.2023.4.1402","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1402","url":null,"abstract":"In this paper, we investigate how data transmissions may be affected by various types of optical interference introduced into the fiber on purpose, via a clip-on coupler. The research proved that transmissions may be jammed completely using inexpensive equipment readily available on the market, provided that the attacker has physical access to the fiber optic cable. The most dangerous attacks rely on a typical, slowly modulated communication laser with a rectangular waveform. This study urges further research aimed at counteracting such attacks.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"107 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139154182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-27DOI: 10.26636/jtit.2023.4.1486
Włodzimierz Lewandowski, Michał Marszalec
Approximately once a year, since 1972, a leap second is introduced into UTC, the world's atomic time scale for civil time, to keep it in phase with the rotation of the Earth. Leap seconds ensure that, on average, the Sun continues to be overhead on the Greenwich meridian at noon to within about 1 s. The question of leap second is being debated since 2000 in different working groups of various international organizations, especially in the ITU-R WP 7A, is whether there still a need for the leap second, with its many technical inconveniences. In these groups overwhelmingly prevails an opinion that it would be better simply to let atomic time run freely and accept that the world's civil time scale will slowly diverge from the rotation of the Earth. The National Institute of Telecommunications in recent years became one of the leaders of this process. This article gives brief history of the current practice of UTC and outlines various solutions.
{"title":"A Brief History of UTC Leap Second","authors":"Włodzimierz Lewandowski, Michał Marszalec","doi":"10.26636/jtit.2023.4.1486","DOIUrl":"https://doi.org/10.26636/jtit.2023.4.1486","url":null,"abstract":"Approximately once a year, since 1972, a leap second is introduced into UTC, the world's atomic time scale for civil time, to keep it in phase with the rotation of the Earth. Leap seconds ensure that, on average, the Sun continues to be overhead on the Greenwich meridian at noon to within about 1 s. The question of leap second is being debated since 2000 in different working groups of various international organizations, especially in the ITU-R WP 7A, is whether there still a need for the leap second, with its many technical inconveniences. In these groups overwhelmingly prevails an opinion that it would be better simply to let atomic time run freely and accept that the world's civil time scale will slowly diverge from the rotation of the Earth. The National Institute of Telecommunications in recent years became one of the leaders of this process. This article gives brief history of the current practice of UTC and outlines various solutions.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"19 S26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139154456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}