Pub Date : 2024-06-17DOI: 10.3103/s0735272723050023
Nishant Gaur, Nidhi Gour, Himanshu Sharma
Abstract
This article highlights the potential advantages of the proposed hybrid algorithm for 6G. The algorithm’s adaptability addresses the dynamic spectral characteristics of 6G environments, enabling a seamless transition between different spectral conditions. The hybrid approach holds promise for enhancing spectrum utilization, reducing interference, and optimizing overall communication system performance. As 6G technology evolves, the integration of energy detection and cyclostationary spectrum sensing through the hybrid algorithm offers a glimpse into innovative techniques that can shape the future of wireless communication, unlocking the potential for enhanced connectivity, efficiency, and user experience. Several parameters such as the probability of detection (Pd), probability of false alarm (Pfa), bit error rate (BER), and power spectral density (PSD) are compared and analyzed with the conventional spectrum sensing algorithms. We see that the proposed hybrid algorithms obtain a substantial detection performance at the low signal-to-noise ratio (SNR).
{"title":"Hybrid Spectrum Sensing Enhancement for Cognitive Radio in 6G Radio System","authors":"Nishant Gaur, Nidhi Gour, Himanshu Sharma","doi":"10.3103/s0735272723050023","DOIUrl":"https://doi.org/10.3103/s0735272723050023","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>This article highlights the potential advantages of the proposed hybrid algorithm for 6G. The algorithm’s adaptability addresses the dynamic spectral characteristics of 6G environments, enabling a seamless transition between different spectral conditions. The hybrid approach holds promise for enhancing spectrum utilization, reducing interference, and optimizing overall communication system performance. As 6G technology evolves, the integration of energy detection and cyclostationary spectrum sensing through the hybrid algorithm offers a glimpse into innovative techniques that can shape the future of wireless communication, unlocking the potential for enhanced connectivity, efficiency, and user experience. Several parameters such as the probability of detection (<i>P</i><sub>d</sub>), probability of false alarm (<i>P</i><sub>fa</sub>), bit error rate (BER), and power spectral density (PSD) are compared and analyzed with the conventional spectrum sensing algorithms. We see that the proposed hybrid algorithms obtain a substantial detection performance at the low signal-to-noise ratio (SNR).</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-17DOI: 10.3103/s0735272723050059
Battula Nancharaiah, Kiran Chand Ravi, Ajeet Kumar Srivastava, K. Arunkumar, Shams Tabrez Siddiqui, M. R. Arun
Abstract
Current networks (such as 4G and the forthcoming 5G networks) may not be capable of fully congregating quickly emerging traffic strains due to the proliferation of smart fatal, infrastructures and the explosion of diverse applications with varying necessities. As a result, 6G network research has already seen participation from both the private sector and the academic community. Recently, an innovative paradigm has emerged for the intelligent design and optimization of 6G networks based on the combination of artificial intelligence (AI) and data science (DS). Therefore, this article proposes an AI-enabled architecture for 6G networks, which is alienated into four layers: intelligent sensing, data analytics, intelligent control, and smart application, to realize patterns sighting, smart resource management, automatic network adjustment, and intelligent service provisioning. We go over the uses of DS&AI methods in 6G networks, such as AI-enhanced mobile edge computing, intelligent mobility, and smart-spectrum management, and how to implement these methods to maximize the network’s performance. We also emphasize key areas for future study and clarifications for AI-enabled 6G networks, together with computational efficiency, algorithm resilience, hardware development, and energy management.
{"title":"Analysis of Data Science and AI-enabled 6G Wireless Communication Networks","authors":"Battula Nancharaiah, Kiran Chand Ravi, Ajeet Kumar Srivastava, K. Arunkumar, Shams Tabrez Siddiqui, M. R. Arun","doi":"10.3103/s0735272723050059","DOIUrl":"https://doi.org/10.3103/s0735272723050059","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Current networks (such as 4G and the forthcoming 5G networks) may not be capable of fully congregating quickly emerging traffic strains due to the proliferation of smart fatal, infrastructures and the explosion of diverse applications with varying necessities. As a result, 6G network research has already seen participation from both the private sector and the academic community. Recently, an innovative paradigm has emerged for the intelligent design and optimization of 6G networks based on the combination of artificial intelligence (AI) and data science (DS). Therefore, this article proposes an AI-enabled architecture for 6G networks, which is alienated into four layers: intelligent sensing, data analytics, intelligent control, and smart application, to realize patterns sighting, smart resource management, automatic network adjustment, and intelligent service provisioning. We go over the uses of DS&AI methods in 6G networks, such as AI-enhanced mobile edge computing, intelligent mobility, and smart-spectrum management, and how to implement these methods to maximize the network’s performance. We also emphasize key areas for future study and clarifications for AI-enabled 6G networks, together with computational efficiency, algorithm resilience, hardware development, and energy management.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-17DOI: 10.3103/s0735272723050047
Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, Aasif Aftab, Mohammad Shahid Kamal, Fazal Imam Shahi
Abstract
Industry 4.0 relies heavily on artificial intelligence (AI) and cloud computing (CC), both of which have been greatly aided by the 5-generation mobile network (5G). However, the arrival of 5G, is seen as a watershed moment that will radically alter the current global trends in wireless communication practices and the lives of the masses. 5G envisions a future where the digital and physical worlds merge. The 6th-generation (6G) wireless communication network will likely unite terrestrial, aerial, and maritime communications into a single, unified system that is both more stable and faster and can accommodate a far larger number of devices with ultra-low latency needs. The purpose of this research is to foresee a scenario in which 6G supersedes 5G as the dominant standard for wireless communication in the years to come. Several advances have been made, but the desired instantaneous global communication and computation with no latency has not arrived yet. In this paper, there are represented the most significant obstacles and difficulties that the transition from 5G to 6G can encounter on the way to realizing these loftier goals. The main purpose of “technology for humanity” is to improve service to the world’s most disadvantaged people, and this paper lays out a plan for 6G that includes the enabling technology infrastructures, obstacles, and research directions that will get us there.
{"title":"Evolution of Wireless Communication Networks from 5G to 6G: Future Perspective","authors":"Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, Aasif Aftab, Mohammad Shahid Kamal, Fazal Imam Shahi","doi":"10.3103/s0735272723050047","DOIUrl":"https://doi.org/10.3103/s0735272723050047","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Industry 4.0 relies heavily on artificial intelligence (AI) and cloud computing (CC), both of which have been greatly aided by the 5-generation mobile network (5G). However, the arrival of 5G, is seen as a watershed moment that will radically alter the current global trends in wireless communication practices and the lives of the masses. 5G envisions a future where the digital and physical worlds merge. The 6th-generation (6G) wireless communication network will likely unite terrestrial, aerial, and maritime communications into a single, unified system that is both more stable and faster and can accommodate a far larger number of devices with ultra-low latency needs. The purpose of this research is to foresee a scenario in which 6G supersedes 5G as the dominant standard for wireless communication in the years to come. Several advances have been made, but the desired instantaneous global communication and computation with no latency has not arrived yet. In this paper, there are represented the most significant obstacles and difficulties that the transition from 5G to 6G can encounter on the way to realizing these loftier goals. The main purpose of “technology for humanity” is to improve service to the world’s most disadvantaged people, and this paper lays out a plan for 6G that includes the enabling technology infrastructures, obstacles, and research directions that will get us there.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.3103/s0735272723040052
A. A. Kobozeva, A. V. Sokolov
Abstract
Effective steganographic methods are an integral part of modern information security systems. At the same time, one of the key requirements for modern steganographic methods, taking into account their needed implementation on mobile and IoT devices, is their low resource consumption maintaining high perception reliability, throughput, and resistance to attacks against the embedded message. The steganographic method with code control of additional information embedding using multi-level code words is presented in this work. A new synthesis approach of multi-level code words with a high selectivity coefficient is developed. It allows us to ensure the specified properties of steganographic messages. Sets of multi-level code words of practically valuable sizes are synthesized and studied. Experimental studies of the effectiveness of the steganographic method with embedding code control based on the presented multi-level code words are conducted. They ensure a high level of its resistance to attacks against the embedded message, by compression, noise superimposing, and blurring, while ensuring sufficient bandwidth and perception reliability in practice.
{"title":"Steganographic Method with Code Control of Information Embedding Based on Multi-level Code Words","authors":"A. A. Kobozeva, A. V. Sokolov","doi":"10.3103/s0735272723040052","DOIUrl":"https://doi.org/10.3103/s0735272723040052","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Effective steganographic methods are an integral part of modern information security systems. At the same time, one of the key requirements for modern steganographic methods, taking into account their needed implementation on mobile and IoT devices, is their low resource consumption maintaining high perception reliability, throughput, and resistance to attacks against the embedded message. The steganographic method with code control of additional information embedding using multi-level code words is presented in this work. A new synthesis approach of multi-level code words with a high selectivity coefficient is developed. It allows us to ensure the specified properties of steganographic messages. Sets of multi-level code words of practically valuable sizes are synthesized and studied. Experimental studies of the effectiveness of the steganographic method with embedding code control based on the presented multi-level code words are conducted. They ensure a high level of its resistance to attacks against the embedded message, by compression, noise superimposing, and blurring, while ensuring sufficient bandwidth and perception reliability in practice.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.3103/s0735272722110036
Fedor Dubrovka, Andrew Bulashenko
Abstract
The paper presents the results of developing an analytical method for constructive synthesis of waveguide polarizers and phase shifters based on three non-dissipative inhomogeneous elements. The analytical synthesis of such devices was carried out based on solving the problem of electromagnetic wave propagation in a waveguide segment with three non-dissipative inhomogeneities by the method of multiple reflections in the single-wave approximation. The proposed approach allowed us to obtain a clear physical substantiation of the mathematical formulation of conditions for the analytical synthesis of polarizers and phase shifters based on three non-dissipative inhomogeneities in a waveguide. As a result, simple formulas have been obtained that determine the parameters of phase-shifting elements and the electrical distance between them, at which there are no reflections and the desired phase shift is provided. The constructive synthesis of a polarizer is based on the conditions of equality of the required and real admittances of the reactive elements in the waveguide and their derivatives at the central frequency of the operating frequency range. As a result, the optimal geometric dimensions of the device structure were determined. As a result, the optimal geometric dimensions of the device structure are determined. It is shown that a polarizer based on three pins in a square waveguide can provide an operating frequency bandwidth of 10% with electromagnetic energy reflection of less than 1% and a differential phase shift of Δφ = 90° ± 1°, and an operating frequency bandwidth of up to 18% with an admissible reflection of 10% of energy and a differential phase shift of Δφ = 90° ± 2°. The theoretical results are confirmed by high-precision electrodynamic simulation and by experiments on the manufactured prototype of the original controlled X-band polarizer with the maximally flat phase-frequency characteristic based on three symmetrical metal pins inserted into a circular waveguide. The developed analytical method for the constructive synthesis of waveguide polarizers based on three inhomogeneities is intended both for independent use and for obtaining initial values of dimensions of the polarizing device to radically accelerate the search for a global extremum in the process of multiparameter optimization in the high-precision constructive synthesis of such a device at the electrodynamic level, taking into account higher types of waves and the interaction between inhomogeneities on higher types of waves.
{"title":"Multiple Reflection Method in Problem of Constructive Synthesis of Polarizers and Phase Shifters Based on Three Non-dissipative Inhomogeneities in Waveguide","authors":"Fedor Dubrovka, Andrew Bulashenko","doi":"10.3103/s0735272722110036","DOIUrl":"https://doi.org/10.3103/s0735272722110036","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The paper presents the results of developing an analytical method for constructive synthesis of waveguide polarizers and phase shifters based on three non-dissipative inhomogeneous elements. The analytical synthesis of such devices was carried out based on solving the problem of electromagnetic wave propagation in a waveguide segment with three non-dissipative inhomogeneities by the method of multiple reflections in the single-wave approximation. The proposed approach allowed us to obtain a clear physical substantiation of the mathematical formulation of conditions for the analytical synthesis of polarizers and phase shifters based on three non-dissipative inhomogeneities in a waveguide. As a result, simple formulas have been obtained that determine the parameters of phase-shifting elements and the electrical distance between them, at which there are no reflections and the desired phase shift is provided. The constructive synthesis of a polarizer is based on the conditions of equality of the required and real admittances of the reactive elements in the waveguide and their derivatives at the central frequency of the operating frequency range. As a result, the optimal geometric dimensions of the device structure were determined. As a result, the optimal geometric dimensions of the device structure are determined. It is shown that a polarizer based on three pins in a square waveguide can provide an operating frequency bandwidth of 10% with electromagnetic energy reflection of less than 1% and a differential phase shift of Δφ = 90° ± 1°, and an operating frequency bandwidth of up to 18% with an admissible reflection of 10% of energy and a differential phase shift of Δφ = 90° ± 2°. The theoretical results are confirmed by high-precision electrodynamic simulation and by experiments on the manufactured prototype of the original controlled X-band polarizer with the maximally flat phase-frequency characteristic based on three symmetrical metal pins inserted into a circular waveguide. The developed analytical method for the constructive synthesis of waveguide polarizers based on three inhomogeneities is intended both for independent use and for obtaining initial values of dimensions of the polarizing device to radically accelerate the search for a global extremum in the process of multiparameter optimization in the high-precision constructive synthesis of such a device at the electrodynamic level, taking into account higher types of waves and the interaction between inhomogeneities on higher types of waves.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.3103/s0735272723060018
Yuriy Shapovalov, Dariya Bachyk, Ksenia Detsyk, Roman Romaniuk, Ivan Shapovalov
Abstract
The paper proposes the method of reduced matrix D-trees, which is an improved version of the method of matrix d-trees. This method is a further development of the application of one of the subcircuit methods, the so-called d-tree method, to the symbolic analysis of linear circuits with constant parameters The method of reduced matrix D-trees, like the d-tree method, provides a significant reduction in the required computer time for modeling circuits, which has a mathematical meaning, consisting in the bringing out of similar terms in the formed complex symbolic expressions. Since there are, in fact, many symbolic terms in such expressions, this reduction in time is due to such factoring. The method is illustrated using a model of a long line consisting of a cascade connection of a large number of elementary links. The results of the computer simulation are also presented.
摘要 本文提出了简化矩阵 D 树方法,它是矩阵 D 树方法的改进版。这种方法是对子电路方法之一,即所谓的 d 树方法在恒定参数线性电路符号分析中应用的进一步发展。缩减矩阵 D 树方法与 d 树方法一样,大大减少了电路建模所需的计算机时间,这具有数学意义,即在形成的复杂符号表达式中找出相似项。由于此类表达式中实际上存在许多符号项,因此时间的减少正是由于这种因式分解。我们用一个由大量基本链路级联组成的长线模型来说明这种方法。同时还介绍了计算机模拟的结果。
{"title":"Analysis of Complex Linear Periodically Time-Varying Circuits by Method of Reduced Matrix D-Trees","authors":"Yuriy Shapovalov, Dariya Bachyk, Ksenia Detsyk, Roman Romaniuk, Ivan Shapovalov","doi":"10.3103/s0735272723060018","DOIUrl":"https://doi.org/10.3103/s0735272723060018","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The paper proposes the method of reduced matrix D-trees, which is an improved version of the method of matrix d-trees. This method is a further development of the application of one of the subcircuit methods, the so-called d-tree method, to the symbolic analysis of linear circuits with constant parameters The method of reduced matrix D-trees, like the d-tree method, provides a significant reduction in the required computer time for modeling circuits, which has a mathematical meaning, consisting in the bringing out of similar terms in the formed complex symbolic expressions. Since there are, in fact, many symbolic terms in such expressions, this reduction in time is due to such factoring. The method is illustrated using a model of a long line consisting of a cascade connection of a large number of elementary links. The results of the computer simulation are also presented.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.3103/s0735272723040039
Arun Kumar, Nishant Gaur
Abstract
Future wireless communication systems can accommodate huge connections and improve spectrum efficiency by using the approach based on non-orthogonal multiple access (NOMA). High peak-to-average power ratio (PAPR) levels can, however, negatively affect NOMA, resulting in decreased system performance and more complicated power amplifiers. This study suggests PAPR reduction in NOMA by utilizing companding methods for 512, 256, and 64 sub-carriers to address this problem. The high peak power of NOMA signals may be effectively compressed by using nonlinear companding techniques, such as μ-law and A-law companding, which reduces distortion and improves overall system dependability. Simulations are used to assess the effectiveness of the suggested companding methods, and the findings show a significant reduction in PAPR assuring an increased bit error rate (BER) effectiveness and transmission resilience in NOMA-based communication systems. The suggested method is contrasted with the conventional A-law (C-A-Law) and μ-law (C-μ-law).
{"title":"Peak to Average Power Ratio Reduction Using Companding Algorithm for NOMA Waveform","authors":"Arun Kumar, Nishant Gaur","doi":"10.3103/s0735272723040039","DOIUrl":"https://doi.org/10.3103/s0735272723040039","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Future wireless communication systems can accommodate huge connections and improve spectrum efficiency by using the approach based on non-orthogonal multiple access (NOMA). High peak-to-average power ratio (PAPR) levels can, however, negatively affect NOMA, resulting in decreased system performance and more complicated power amplifiers. This study suggests PAPR reduction in NOMA by utilizing companding methods for 512, 256, and 64 sub-carriers to address this problem. The high peak power of NOMA signals may be effectively compressed by using nonlinear companding techniques, such as μ-law and A-law companding, which reduces distortion and improves overall system dependability. Simulations are used to assess the effectiveness of the suggested companding methods, and the findings show a significant reduction in PAPR assuring an increased bit error rate (BER) effectiveness and transmission resilience in NOMA-based communication systems. The suggested method is contrasted with the conventional A-law (C-A-Law) and μ-law (C-μ-law).</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.3103/s0735272723060055
Ivan Vikulin, Oleksandr Nazarenko, Lidiya Vikulina, Pavlo Markolenko
Abstract
An experimental study of the effect of radiation emissions (neutrons, gamma radiation) on the sensitivity of industrial bipolar n-p-n magnetotransistors has been carried out. It has been shown that neutron irradiation leads to defects in the structure, which reduces the effective lifetime of the injected charge carriers and decreases the magnetosensitivity. Gamma radiation with increasing intensity first destroys the surface structural defects and increases the lifetime of carriers and magnetoresponsiveness, and then penetrates deeper forming defects and reducing magnetoresponsiveness. This makes it possible to use gamma radiation with an intensity of up to 107 R as a technological method of increasing magnetosensitivity.
摘要 就辐射(中子、伽马辐射)对工业双极 n-p-n 磁晶体管灵敏度的影响进行了实验研究。研究表明,中子辐照会导致结构缺陷,从而缩短注入电荷载流子的有效寿命,降低磁灵敏度。强度不断增加的伽马射线首先会破坏表面结构缺陷,延长载流子的有效寿命并提高磁感应强度,然后会穿透到更深处,形成缺陷并降低磁感应强度。因此,可以使用强度高达 107 R 的伽马射线作为提高磁感应强度的技术方法。
{"title":"Effect of Penetrating Radiation on Sensitivity of Magnetotransistors","authors":"Ivan Vikulin, Oleksandr Nazarenko, Lidiya Vikulina, Pavlo Markolenko","doi":"10.3103/s0735272723060055","DOIUrl":"https://doi.org/10.3103/s0735272723060055","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>An experimental study of the effect of radiation emissions (neutrons, gamma radiation) on the sensitivity of industrial bipolar <i>n-p-n</i> magnetotransistors has been carried out. It has been shown that neutron irradiation leads to defects in the structure, which reduces the effective lifetime of the injected charge carriers and decreases the magnetosensitivity. Gamma radiation with increasing intensity first destroys the surface structural defects and increases the lifetime of carriers and magnetoresponsiveness, and then penetrates deeper forming defects and reducing magnetoresponsiveness. This makes it possible to use gamma radiation with an intensity of up to 10<sup>7</sup> R as a technological method of increasing magnetosensitivity.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"164 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-16DOI: 10.3103/s0735272723050011
Mahendra Shridhar Naik, Desai Karanam Sreekantha, Kanduri V. S. S. S. S. Sairam
Abstract
Lightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we consider hardware-based block ciphers (BC). The BCs are thoroughly described using the substitution permutation network (SPN) and Feistel network (FN) structures. A detailed summary of each SPN and FN-based BC is provided. Furthermore, the paper compares and thoroughly analyses the performance analysis of modern SPN and FN-based BCs. For each block cipher, performance measures such as chip area (slices), frequency, latency, throughput, and hardware efficiency are reviewed. The paper also recommends appropriate ciphers for the greatest and lowest performance indicators. Among BCs, the PRINCE cipher has minimal latency and great throughput. The research also reveals that the LED and PRESENT ciphers are more compact than other ciphers. The open research challenges are also presented with a forward-looking perspective.
摘要 轻量级密码学(LWC)对于确保资源有限的设备之间的数据安全至关重要。本文考虑了基于硬件的块密码(BC)。本文使用置换置换网络(SPN)和费斯特网络(FN)结构对这些块密码进行了详尽的描述。本文提供了每种基于 SPN 和 FN 的 BC 的详细摘要。此外,本文还比较并全面分析了基于 SPN 和 FN 的现代 BC 的性能分析。对每种块密码的芯片面积(片)、频率、延迟、吞吐量和硬件效率等性能指标进行了审查。论文还推荐了性能指标最高和最低的适当密码。在 BC 中,PRINCE 密码具有最小的延迟和最大的吞吐量。研究还发现,LED 和 PRESENT 密码比其他密码更紧凑。研究还以前瞻性的视角提出了有待解决的研究难题。
{"title":"Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review)","authors":"Mahendra Shridhar Naik, Desai Karanam Sreekantha, Kanduri V. S. S. S. S. Sairam","doi":"10.3103/s0735272723050011","DOIUrl":"https://doi.org/10.3103/s0735272723050011","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Lightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we consider hardware-based block ciphers (BC). The BCs are thoroughly described using the substitution permutation network (SPN) and Feistel network (FN) structures. A detailed summary of each SPN and FN-based BC is provided. Furthermore, the paper compares and thoroughly analyses the performance analysis of modern SPN and FN-based BCs. For each block cipher, performance measures such as chip area (slices), frequency, latency, throughput, and hardware efficiency are reviewed. The paper also recommends appropriate ciphers for the greatest and lowest performance indicators. Among BCs, the PRINCE cipher has minimal latency and great throughput. The research also reveals that the LED and PRESENT ciphers are more compact than other ciphers. The open research challenges are also presented with a forward-looking perspective.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140591731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The introduction of IoT technologies, such as those used in remote health monitoring applications, has revolutionized conventional medical care. Furthermore, the approach utilized to obtain insights from the scrutiny of lifestyle elements and activities is crucial to the success of tailored healthcare and disease prevention services. Intelligent data retrieval and classification algorithms allow for the investigation of disease and the prediction of aberrant health states. The convolutional neural network (CNN) strategy is utilized to forecast such anomaly because it can successfully recognize the knowledge significant to disease anticipation from amorphous medical heath records. Conversely, if a fully coupled network-topology is used, CNN guzzles a huge memory. Furthermore, the complexity analysis of the model may rise as the number of layers grows. Therefore, we present a CNN target recognition and anticipation strategy based on the Pearson correlation coefficient (PCC) and standard pattern activities to address these shortcomings of the CNN model. It is built in this framework and used for classification purposes. In the initial hidden layer, the most crucial health-related factors are chosen, and in the next, a correlation-coefficient examination is performed to categorize the health factors into positively and negatively correlated groups. Mining the occurrence of regular patterns among the categorized health parameters also reveals the behavior of regular patterns. The model output is broken down into obesity, hypertension, and diabetes-related factors with known correlations. To lessen the impact of the CNN-typical knowledge discovery paradigm, we use two separate datasets. The experimental results reveal that the proposed model outperforms three other machine learning techniques while requiring less computational effort.
{"title":"Deep Learning Framework for Analysis of Health Factors in Internet-of-Medical Things","authors":"Syed Hauider Abbas, Ramakrishna Kolikipogu, Vuyyuru Lakshma Reddy, Jnaneshwar Pai Maroor, Deepak Kumar, Mangal Singh","doi":"10.3103/s0735272723030056","DOIUrl":"https://doi.org/10.3103/s0735272723030056","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The introduction of IoT technologies, such as those used in remote health monitoring applications, has revolutionized conventional medical care. Furthermore, the approach utilized to obtain insights from the scrutiny of lifestyle elements and activities is crucial to the success of tailored healthcare and disease prevention services. Intelligent data retrieval and classification algorithms allow for the investigation of disease and the prediction of aberrant health states. The convolutional neural network (CNN) strategy is utilized to forecast such anomaly because it can successfully recognize the knowledge significant to disease anticipation from amorphous medical heath records. Conversely, if a fully coupled network-topology is used, CNN guzzles a huge memory. Furthermore, the complexity analysis of the model may rise as the number of layers grows. Therefore, we present a CNN target recognition and anticipation strategy based on the Pearson correlation coefficient (PCC) and standard pattern activities to address these shortcomings of the CNN model. It is built in this framework and used for classification purposes. In the initial hidden layer, the most crucial health-related factors are chosen, and in the next, a correlation-coefficient examination is performed to categorize the health factors into positively and negatively correlated groups. Mining the occurrence of regular patterns among the categorized health parameters also reveals the behavior of regular patterns. The model output is broken down into obesity, hypertension, and diabetes-related factors with known correlations. To lessen the impact of the CNN-typical knowledge discovery paradigm, we use two separate datasets. The experimental results reveal that the proposed model outperforms three other machine learning techniques while requiring less computational effort.</p>","PeriodicalId":52470,"journal":{"name":"Radioelectronics and Communications Systems","volume":"203 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140592053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}