42 research outputs found

    Detection of 2x2 MIMO signals

    Get PDF
    In this paper, we investigate synchronization and equalization of 2 x 2 MIMO signals. We make a step further than that is described in our patent. In the patent, 3 PLLs and a four-channel adaptive filter was needed. Here we decrease the number of PLLs to two and use an adaptive filter of only four channels. In addition to that, we shortly introduce the filter method and the FFT method as well, for synchronization. False detection cancellation is also mentioned. The so-called 1-bit technique has been compared to our method. After briefly introducing the ideas, detailed Matlab or AWR analyses follow. Input data are real measurements, so the analyses serve also as experimental verifications. We take a glimpse on higher order MIMO and higher order modulations as well

    MongoDB Database as Storage for GPON Frames

    Get PDF
    This work is focused on creating an open-source software-based solution for monitoring traffic transmitted through gigabit passive optical network. In this case, the data are captured by the field-programmable gate array (FPGA) card and reassembled using parsing software from a passive optical network built on the International Telecommunication Unit telecommunication section (ITU-T) G.984 gigabit-capable passive optical network GPON recommendation. Then, the captured frames are converted by suitable software into GPON frames, which will be further processed for analysis. Due to the high transfer rate of GPON recommendations, the work describes the issue of writing to the Mongo database system. In order to achieve the best possible results and minimal loss of transmitted frames, a series of tests were performed. The proposed test scenarios are based on different database writing approaches and are implemented in the Python and C# programming languages. Based on our results, it has been shown that the high processing speed is too high for Python processing. Critical operations must be implemented in the C# programming language. Due to rapid application development, Python can only be used for noncritical time-consuming data processing operations

    Robust Watermarking Using FFT and Cordic QR Techniques

    Get PDF
    Digital media sharing and access in today’s world of the internet is very frequent for every user. The management of digital rights may come into threat easily as the accessibility of data through the internet become wide. Sharing digital information under security procedures can be easily compromised due to the various vulnerabilities floating over the internet. Existing research has been tied to protecting internet channels to ensure the safety of digital data. Researchers have investigated various encryption techniques to prevent digital rights management but certain challenges including external potential attacks cannot be avoided that may give unauthorized access to digital media. The proposed model endorsed the concept of watermarking in digital data to uplift media security and ensure digital rights management. The system provides an efficient procedure to conduct over-watermarking in digital audio signals and confirm the avoidance of ownership of the host data. The proposed technique uses a watermark picture as a signature that has been initially encrypted with Arnold's cat map and cyclic encoding before being embedded. The upper triangular R-matrix component of the energy band was then created by using the Fast Fourier transform and Cordic QR procedures to the host audio stream. Using PN random sequences, the encrypted watermarking image has been embedded in the host audio component of the R-matrix. The same procedure has been applied to extract the watermark image from the watermarked audio. The proposed model evaluates the quality of the watermarked audio and extracted watermark image. The average PSNR of the watermarked audio is found to be 37.01 dB. It has also been seen that the average PSNR, Normal cross-correlation, BER, SSMI (structure similarity index matric) value for the extracted watermark image is found to be 96.30 dB, 0.9042 units, 0.1033 units, and 0.9836 units respectively. Further, the model has been tested using various attacks to check its robustness. After applying attacks such as noising, filtering, cropping, and resampling on the watermarked audio, the watermark image has been extricated and its quality has been checked under the standard parameters. It has been found that the quality of the recovered watermark image satisfying enough to justify the digital ownership of the host audio. Hence, the proposed watermarking model attains a perfect balance between imperceptibility, payload, and robustness

    Recent Advances in Acquiring Channel State Information in Cellular MIMO Systems

    Get PDF
    In cellular multi-user multiple input multiple output (MU-MIMO) systems the quality of the available channel state information (CSI) has a large impact on the system performance. Specifically, reliable CSI at the transmitter is required to determine the appropriate modulation and coding scheme, transmit power and the precoder vector, while CSI at the receiver is needed to decode the received data symbols. Therefore, cellular MUMIMO systems employ predefined pilot sequences and configure associated time, frequency, code and power resources to facilitate the acquisition of high quality CSI for data transmission and reception. Although the trade-off between the resources used user data transmission has been known for long, the near-optimal configuration of the vailable system resources for pilot and data transmission is a topic of current research efforts. Indeed, since the fifth generation of cellular systems utilizes heterogeneous networks in which base stations are equipped with a large number of transmit and receive antennas, the appropriate configuration of pilot-data resources becomes a critical design aspect. In this article, we review recent advances in system design approaches that are designed for the acquisition of CSI and discuss some of the recent results that help to dimension the pilot and data resources specifically in cellular MU-MIMO systems

    Gamma/neutron classification with SiPM CLYC detectors using frequency-domain analysis for embedded real-time applications

    Get PDF
    A method for gamma/neutron event classification based on frequency-domain analysis for mixed radiation environments is proposed. In contrast to the traditional charge comparison method for pulse-shape discrimination, which requires baseline removal and pulse alignment, our method does not need any preprocessing of the digitized data, apart from removing saturated traces in sporadic pile-up scenarios. It also features the identification of neutron events in the detector’s full energy range with a single device, from thermal neutrons to fast neutrons, including low-energy pulses, and still provides a superior figure-of-merit for classification. The proposed frequency-domain analysis consists of computing the fast Fourier transform of a triggered trace and integrating it through a simplified version of the transform magnitude components that distinguish the neutron features from those of the gamma photons. Owing to this simplification, the proposed method may be easily ported to a real-time embedded deployment based on Field-Programmable Gate Arrays or Digital Signal Processors. We target an off-the-shelf detector based on a small CLYC (Cs2LiYCl6:Ce) crystal coupled to a silicon photomultiplier with an integrated bias and preamplifier, aiming at lightweight embedded mixed radiation monitors and dosimeter applications

    Synthetic Generation of Realistic Signal Strength Data to Enable 5G Rogue Base Station Investigation in Vehicular Platooning

    Get PDF
    Rogue Base Stations (RBS), also known as 5G Subscription Concealed Identifier (SUCI) catchers, were initially developed to maliciously intercept subscribers’ identities. Since then, further advances have been made, not only in RBSs, but also in communication network security. The identification and prevention of RBSs in Fifth Generation (5G) networks are among the main security challenges for users and network infrastructure. The security architecture group in 3GPP clarified that the radio configuration information received from user equipment could contain fingerprints of the RBS. This information is periodically included in the measurement report generated by the user equipment to report location information and Received Signal Strength (RSS) measurements for the strongest base stations. The motivation in this work, then is to generate 5G measurement reports to provide a large and realistic dataset of radio information and RSS measurements for an autonomous vehicle driving along various sections of a road. These simulated measurement reports can then be used to develop and test new methods for identifying an RBS and taking mitigating actions. The proposed approach can generate 20 min of synthetic drive test data in 15 s, which is 80 times faster than real time

    A Secure IoT-Enabled Machine Learning Framework for Brain Tumor Classification and Prediction Using MR Image Data

    Get PDF
    Brain tumor identification and classification have improved due to the quick development of medical imaging and machine learning technology. This paper presents two approaches to secure image transmission in the Internet of Things (IoT): a comprehensive approach for brain tumor prediction and classification using a strong IoT infrastructure with cutting-edge machine learning models and a security approach with the implementation of the AES-ECC hybrid model in the MQTT communication protocol for image data encryption and decryption. We make use of a heterogeneous dataset that we sourced from the Kaggle Dataset platform, which includes four different types of MRI scans of brain tumors from 2870 patients. Our proposed methodology starts with the safe acquisition and transfer of MRI images through an IoT protocol infrastructure to a cloud-based platform. CNN, DenseNet, ResNet and G-Net are some of the sophisticated machine learning models that are used to interpret and analyse these pictures. The computer is trained to identify photos of brain tumors into the appropriate groups using all above four models. According to the data, our suggested CNN model performs better than the others, obtaining an amazing 89% accuracy rate. Nonetheless, we want to achieve even greater improvement in forecast precision by utilising ensemble boosting methodologies. Boosting the CNN model with Ada-Boost, Gradient Boost, XG Boost and Cat Boost algorithms aims to maximize prediction performance. We find that the CNN algorithm combined with XG Boost outperforms all other ensemble methods with an amazing accuracy rate of 97%. This encouraging result highlights how combining cutting-edge machine learning algorithms with IoT infrastructure can lead to better brain tumor classification and prognosis. The creation of more precise and effective diagnostic instruments for the identification of brain tumors is one of our study's many implications, one that will ultimately improve patient outcomes and the healthcare industry

    GPON PLOAMd Message Analysis Using Supervised Neural Networks

    Get PDF
    This paper discusses the possibility of analyzing the orchestration protocol used in gigabit-capable passive optical networks (GPONs). Considering the fact that a GPON is defined by the International Telecommunication Union Telecommunication sector (ITU-T) as a set of recommendations, implementation across device vendors might exhibit few differences, which complicates analysis of such protocols. Therefore, machine learning techniques are used (e.g., neural networks) to evaluate differences in GPONs among various device vendors. As a result, this paper compares three neural network models based on different types of recurrent cells and discusses their suitability for such analysis

    Toward a unified TreeTalker data curation process

    Get PDF
    The Internet of Things (IoT) development is revolutionizing environmental monitoring and research in macroecology. This technology allows for the deployment of sizeable diffuse sensing networks capable of continuous monitoring. Because of this property, the data collected from IoT networks can provide a testbed for scientific hypotheses across large spatial and temporal scales. Nevertheless, data curation is a necessary step to make large and heterogeneous datasets exploitable for synthesis analyses. This process includes data retrieval, quality assurance, standardized formatting, storage, and documentation. TreeTalkers are an excellent example of IoT applied to ecology. These are smart devices for synchronously measuring trees’ physiological and environmental parameters. A set of devices can be organized in a mesh and permit data collection from a single tree to plot or transect scale. The deployment of such devices over large-scale networks needs a standardized approach for data curation. For this reason, we developed a unified processing workflow according to the user manual. In this paper, we first introduce the concept of a unified TreeTalker data curation process. The idea was formalized into an R-package, and it is freely available as open software. Secondly, we present the different functions available in “ttalkR”, and, lastly, we illustrate the application with a demonstration dataset. With such a unified processing approach, we propose a necessary data curation step to establish a new environmental cyberinfrastructure and allow for synthesis activities across environmental monitoring networks. Our data curation concept is the first step for supporting the TreeTalker data life cycle by improving accessibility and thus creating unprecedented opportunities for TreeTalker-based macroecological analyse

    Design criteria for Indoor Positioning Systems in hospitals using technological, organizational and individual perspectives

    Get PDF
    This dissertation considers three different studies that handle Indoor Positioning Systems (IPS) in hospitals. Study 1 uses the Reasoned Action Approach by questioning hospital visitors and employees about their intention to use IPS in hospitals. Study 2 reviews IPS in hospitals. Study 3 is based on the results of the first two studies. It handles expert interviews that were conducted with different hospitals and IPS developers to evaluate the determined propositions. Then, the insights were used to conduct and evaluate experiments by testing an ultrasound-based IPS for hospitals
    corecore