Measuring 5G systems is a major challenge for measurement engineers, who need to be aware of all the limitations of the new generation The parameters of the frequency-selective measurement system (spectrum analyzer - ...
详细信息
ISBN:
(数字)9798350386394
ISBN:
(纸本)9798350386400
Measuring 5G systems is a major challenge for measurement engineers, who need to be aware of all the limitations of the new generation The parameters of the frequency-selective measurement system (spectrum analyzer - ROHDE & SCHWARZ FSH8) were investigated in the measurement of 5G NR SSB signals (3.4 – 3.8 GHz). The focus was on the setting parameters which, according to the literature, have an influence on the measurement: RBW, VBW, SWEEP TIME and the duration of the measurement. All measurements were carried out in zero-span mode. In the second part of the measurement, these SSB synchronization signal measurement results were compared with the 5G signal measurement results at the same location using the NARDA SRM-3006 device equipped with a decoder for the 5G NR system (FR1) to determine the optimal method for measuring these signals with a spectrum analyzer (SA).The measurement results show that the resolution bandwidth (RBW) has the largest variation in the measured electric field (EF) strength values of the SSB 5G NR signal of 17.20 dB (MH/RMS) and 17.70 (RMS/AGV10). It is therefore necessary to pay particular attention to the setting of this measurement parameter. In addition, the video resolution (VBW) shows a significantly lower field strength variation of 2.50 dB, but also the same deviation from the reference value of 2.50 dB (RMS/AGV10). Other analyzed parameters have a negligible influence on the measurement of the EF *** post-processing was performed in the work to determine the final (maximum) value of the EF strength at the points of assumed highest exposure, which is used to assess the impact and compliance with the permissible values according to the relevant standards.
The rotation of an electrodynamic wheel (EDW) above a flat conductive, non-magnetic, track induces currents in the track that can create lift and thrust/braking force. This paper presents a new type of dual-EDW that c...
The rotation of an electrodynamic wheel (EDW) above a flat conductive, non-magnetic, track induces currents in the track that can create lift and thrust/braking force. This paper presents a new type of dual-EDW that consists of two EDWs in series that can also create a controllable lateral force. The magnitude and direction of the lateral force can be changed via the relative phase angle shifting of the two rotors. The changes in the lateral force magnitude as well as direction are shown to not affect the lift and thrust force magnitude. The geometric analysis of the design is presented and the practical difficulty of implementing the design is also discussed.
This paper describes the solutions submitted by the UPB team to the AuTexTification shared task, featured as part of IberLEF-2023. Our team participated in the first subtask, identifying text documents produced by lar...
详细信息
Traditional Public Key Infrastructures (PKIs) seem not adequate for some Internet of Things (IoT) environments asking for fast, flexible, and secure solutions. Alternatively, IoT devices could generate asymmetric key ...
Traditional Public Key Infrastructures (PKIs) seem not adequate for some Internet of Things (IoT) environments asking for fast, flexible, and secure solutions. Alternatively, IoT devices could generate asymmetric key pairs on their own, and store the relative public keys or X.509 certificates into a blockchain, e.g., Emercoin. Nevertheless, in some contexts, reliable device identification is still required. We extended an Emercoin-based decentralized PKI solution for IoT scenarios, by integrating the device's identification with a TPM (Trusted Platform Module) 2.0 to a specific trusted node in an IoT network named Device Manager (DM). Through experimental tests performed with a TPM 2.0-equipped Raspberry Pi 4 device, we evaluated the time spent registering the IoT devices into the blockchain, or establishing secure (TLS) channels. Even though the Emercoin-based TLS handshake time is higher than the standard one, the proposed solution remains a viable alternative in scenarios requiring flexibility and device identification.
The measurement of different clinical indicators, such as the myocardial wall's thickness and the ventricle's volume, depends on accurately segmenting the left ventricle in 2D echocardiography. This segmentati...
详细信息
ISBN:
(数字)9798331543037
ISBN:
(纸本)9798331543044
The measurement of different clinical indicators, such as the myocardial wall's thickness and the ventricle's volume, depends on accurately segmenting the left ventricle in 2D echocardiography. This segmentation is essential for making various clinical decisions, such as whether surgery is necessary. However, segmenting the myocardium requires clinical expertise and makes accurate segmenting time-consuming due to the poor quality of echocardiograms. It is essential to develop an automatic myocardial segmentation method. Some deep learning methods, especially the U-net structure, were proposed to support the automatic myocardium segmentation in echocardiography. The model must simultaneously capture the local and global dependency relationships in the ultrasound images for myocardial segmentation in echocardiography. Given the inherent attribute of local operation of convolution operations, this poses significant limitations for U-Net based on the traditional CNN as the basic architecture. For example, when dealing with complex myocardial textures and structures, we need to accurately identify the myocardium's global morphological features and overall structural patterns. Moreover, this locality may lead to deviations and errors when segmenting the boundary regions or the myocardial parts closely related to the surrounding tissues. Our primary focus will be redefining the skip connection using the attention mechanism. More integrated attention mechanisms can further enhance the segmentation effect of myocardial in echocardiography. Therefore, we integrated the cross-attention mechanism when concatenating features in the skip connection. Through conducting rigorous ablation studies on multiple echocardiography segmentation datasets, the performance of the proposed mechanism was proven.
A single study has addressed actuator failure reconstruction for the One-sided Lipschitz (OSL) family of nonlinear systems. The predicted fault vector in that work does not provide any insight into the underlying prob...
详细信息
To investigate the actual health status and mechanical properties of structural materials, both direct and/or indirect investigation procedures can be used. The acoustic emission (AE) method is a non-destructive indir...
详细信息
ISBN:
(数字)9798350385014
ISBN:
(纸本)9798350385021
To investigate the actual health status and mechanical properties of structural materials, both direct and/or indirect investigation procedures can be used. The acoustic emission (AE) method is a non-destructive indirect structural health monitoring method based on the analysis of the elastic wave propagation inside the material under study induced during cracks and micro-cracks coalescence, opening, and formation process. To capture reliable ultrasonic elastic waveform data, piezoelectric sensors are typically employed which are directly and firmly fixed and attached to the specimen under study. For identifying the region of crack formation, thus the position of structural damage in its early stage, at least four sensors must be employed simultaneously. Furthermore, the identification of the onset time is crucial to accomplishing this task. In this study, the authors proposed a deep-learning-based solution based on a U-net architecture for identifying onset time with a method attempting to overcome the existing limitations of traditional threshold-based methods. The onset time precision obtained with this artificial intelligence-based (AI) paradigm is discussed on an acknowledged dataset available in the literature based on Pencil Lead Break (PLB) data, commonly used as a benchmark in the AE field. Finally, the method is tested on some real AE signals acquired during laboratory testing of reinforced concrete specimens. The results demonstrated the actual potential of the proposed AI-based method in future real-time monitoring real- world applications.
The Transport Layer Security (TLS) protocol is subject to intensive research resulting in a long list of TLS attacks discovered in the last decade. To test the resistance of a TLS server to attacks, several tools or s...
详细信息
The Transport Layer Security (TLS) protocol is subject to intensive research resulting in a long list of TLS attacks discovered in the last decade. To test the resistance of a TLS server to attacks, several tools or services can be used nowadays, such as the famous Qualys SSL Server Test. Nevertheless, although a security administrator updates the TLS software and configuration, internal attacks or malicious code could change that TLS-installed code or its setting at any time to make it prone to attacks. Thus, either the TLS server configuration is checked continuously, or other techniques are needed to indicate that a running TLS server is potentially vulnerable to attacks. We propose TLS-Monitor, a TLS attack-aware network monitoring tool that inspects the traffic for a target system looking for known TLS vulnerabilities that may lead to attacks. Examples are the self-signed certificate(s) allowing to set up a man-in-the-middle attack or the TLS heartbeat extension for the Heartbleed attack. If a vulnerability is found, the proposed tool checks if the threat applies by launching specific TLS attacks. Ultimately it raises alarms and creates a report. The TLS-Monitor tool employs network monitoring tools, like Suricata and Zeek, and TLS attack tools, like TLS-Attacker or Metasploit. We successfully tested TLS-Monitor in a testbed environment for some selected attacks, including Heartbleed, MITM, and Bleichenbacher. We foresee to extend the tool in the future to support other TLS attacks.
The problems associated with the operation of overhead power lines and ways of improving control over their condition with the help of UAVs are considered. A structural diagram of the system of technical diagnostics o...
详细信息
Traffic congestion is among the worst causes of pollution, and the time spent in traffic can cost the world tens of billions of dollars every year. Solutions to mitigate this problem are at hand thanks to the advent o...
Traffic congestion is among the worst causes of pollution, and the time spent in traffic can cost the world tens of billions of dollars every year. Solutions to mitigate this problem are at hand thanks to the advent of advanced control techniques and artificial intelligence (AI). Traditional traffic light control strategies based on fixed timing of the green, yellow and red phases are simple to implement, but at the same time very inefficient, in particular for busy intersections. This paper discusses both a model predictive control (MPC) approach and a model-free deep reinforcement learning (DRL) algorithm for controlling the traffic lights at a single intersection, with the aim of improving the traffic flow. Firstly, a detailed linear mathematical model of an intersection is formulated and successively tested in a MPC framework; secondly, a DRL algorithm is proposed and verified by comparing it with the currently implemented baseline controller. Finally, the results for the three approaches, MPC, DRL and the baseline controller, are validated through the SUMO (Simulation of Urban Mobility) microscopic traffic simulator.
暂无评论