Measurement method and Built-In Self-Test (BIST) circuit architecture exploiting Compressive Sampling for frequency response characterization of Digital-to-Analog Converters

Categories:
25 Views

Right now we see that depression is one of the most common problems in our society. Most of the time people are committed suicide only cause of depression. And till now there is no proper lab test way for detecting depression. Generally, doctors are detecting depression by asking some knowledgebase questions.On the other hand, there are a good number of people using social media platforms right now, where they are sharing their daily experiences, emotion, and other activity with their friends. Twitter is one of the common social platforms and also popular for data collection.

Categories:
134 Views

2D geometrically shaped constellations that are simultaneously robust to both residual phase noise (RPN) and AWGN (named as xx(x)M-RPN, where xx(x) is the receiver type) for 8 to 256-ary PCAWGN reception. The presented formats are optimised at the indicative bit-wise achievable information rate (AIR)  threshold of 0.9m bit/symbol, where m is the number of bits per constellation point. Additionally, we added AWGN-only constellations (xx(x)M-AWGN) to serve as a reference.

Instructions: 

Each modulation order is placed in a separate folder, in which, every text file has the coordinates for the in-phase and quadrature components of each symbol in the first and the second column, respectively. The bit mapping for each symbol is natural mapping for the line number, i.e., 000 001 010 011 100 etc.

Categories:
30 Views

Exact BER Analysis for Two-user NOMA uUing QAM with Arbitrary Modulation Order

Instructions: 

This code was tested using Matlab 2019.b

Categories:
Category: 
37 Views

There has been extensive modelling of the optical wireless channel, and the optimum modulation scheme for a particular channel is well-understood. However, this modelling has not taken into account the trade-offs that transmitter and receiver selection usually involve. For a particular type of transmitter, the modulation bandwidth and available power are closely related, as are receiver bandwidth, active area and sensitivity. In this paper, we present a design approach that takes this device selection into account.

Categories:
Category: 
33 Views

Morse code is a system of communication using dots and dashes to represent numbers, letters and symbols. For example, the letter 'B' is represented as a dash followed by 3 dots, i.e. "–...". The dataset used in this competition is synthetically generated, and mimics a human writing dots and dashes on a piece of paper. In this sense, it is like a 1-dimensional version of an image represented by numeric pixel values. The challenge is to classify the resulting 1-dimensional input into 1 out of 64 classes which represent various letter, numbers and symbols.

Last Updated On: 
Tue, 07/14/2020 - 21:14

One-way delay (OWD) is the transmission time of the network packet from the first to the last bit from the sender node to the receiver node. The data set presented here was obtained as a result of measurements performed for the paper “Improving the Accuracy of One-Way Delay Measurements”.

One-way delay measurements were performed using three different utilities:

* the utility from the OWAMP protocol;

* first version of our utility, owping1; and

* the new version of our utility, owping2.

Instructions: 

The graph shown in Figure 3 and the values in Table 2 are derived from data from files located in the Fig3andTab2 folder.

The OWAMP_chrony.csv file contains the results of measurements made on the local network: with, the IP packet size being 46 bytes, the measurement utility being OWAMP, and the type of NTP server being chrony. A file with the numerical OWAMP measurement data in microseconds can be seen via Excel.

The OWAMP_ntpd.csv file contains the results of measurements made on the local network: with, the size of the IP packet being 46 bytes, the measurement utility being OWAMP, and the type of NTP server being ntpd.

The owping2_chrony.csv file contains the results of measurements on the local network: with, the packet size being 46 bytes, the measuring utility being owping2, the NTP server type being chrony, and the protocol being UDP.

The owping2_ntpd.csv file contains the results of measurements on the local network: with, the packet IP size being 46 bytes, the measuring utility being owping2, the NTP server type being ntpd, and the protocol being UDP.

 

The graph displayed in Figure 5 and the values from Table 3 are derived from data from files located in the Fig5andTab3 folder.

All these files contain the results of measurements across a local network without a switch; the IP packet size is 46 bytes. The measurements in the files are presented in microseconds. They can be displayed via Excel.

In the owping1_icmp.csv file, the data is derived from owping1 utility measurements of ICMP packets.

In the owping1_udp.csv file, the data is derived from owping1 utility measurements of UDP packets.

In the owping2_icmp.csv file, the data is derived from owping2 utility measurements of ICMP packets.

In the owping2_udp.csv file, the data is derived from owping2 utility measurements of UDP packets.

 

The graph displayed in Figure 6 and the values in Table 4 are derived from data from a file located in the Fig6andTab4 folder.

The owamp_smr-crm_udp.csv file contains the OWD measurements across the global network, in the Samara-Crimea direction, using the OWAMP measurement utility.

Column A – represents the measurements made when the server was located in Crimea.

Column B – represents the measurements made when the server was located in Samara.

 

Table 5 was built using data from files located in the Tab5 folder.

The ping.csv file contains the results of RTT measurements across the global network, in the Samara-Crimea direction, using the RIPE Atlas measuring system.

The file 1 Client in Crimea.csv contains the results of OWD measurements across the Samara-Crimea section: with IP packet size being 46 bytes, and the measurement utility being owping2. The first column represents the measurements relating to the route from Samara to Crimea, the second represents the measurements relating to the route from Crimea to Samara. The values are in milliseconds. The file can be displayed using Excel.

File 2 Client in Crymea.csv contains the results of OWD measurements across the Crimea-Samara section: with, the IP packet size being 46 bytes, and the measurement utility being owping2. The first column represents the measurements relating to the route from Crimea to Samara, the second represents the measurements relating to the route from Samara to Crimea.

 

The graph displayed in Figure 7 was constructed using data from a file located in the Fig5 folder.

The owping2-owamp.csv file contains the OWD measurements for the Crimea-Samara direction. Column A contains data measured with owping2, Column B contains data measured with OWAMP.

 

The values shown in Table 6 were obtained using data from files located in the Tab6 folder.

OWAMP.csv contains the results of measurements across a global network in the Crimea-Samara direction (client in Crimea), where the IP packet size is 1500 bytes, and the measurement utility is OWAMP.

Column A - OWD from Crimea to Samara.

Column B - OWD from Samara to Crimea.

owping2.csv contains the results of measurements across a global network in the Crimean-Samara direction (client in Crimea), where the IP packet size is 1500 bytes, the measurement utility is owping2, and the protocol is UDP.

Column A - OWD from Crimea to Samara.

Column B - OWD from Samara to Crimea.

 

In addition to the data for the present paper, this set includes several additional files located in the Add folder.

The Rostov-Samara.csv file contains the results of OWD measurements from Rostov in the Don to Samara direction. Column A contains data for the Rostov-Samara direction, measured with owping2. Column B contains data for the return direction, Samara-Rostov.

The Rostov-Moscow.csv file contains the results of OWD measurements at Rostov in the Don to Moscow direction. Column A contains data for the Rostov-Moscow direction, measured with owping2. Column B contains data for the return direction, Moscow-Rostov.

The Rostov-Crimea.csv file contains the results of OWD measurements at Rostov in the Don-Crimea direction. Column A contains data for the Rostov-Crimea direction, measured with owping2. Column B contains data for the return direction Crimea-Rostov.

Categories:
Category: 
128 Views

The following data set is modelled after the implementers’ test data in 3GPP TS 33.501 “Security architecture and procedures for 5G System” with the same terminology. The data set corresponds to SUCI (Subscription Concealed Identifier) computation in the 5G UE (User Equipment) for IMSI (International Mobile Subscriber Identity) based SUPI (Subscription Permanent Identifier) and ECIES Profile A.

Instructions: 

The following data set is modelled after the implementers’ test data in 3GPP TS 33.501 “Security architecture and procedures for 5G System” with the same terminology. The data set corresponds to SUCI (Subscription Concealed Identifier) computation in the 5G UE (User Equipment) for IMSI (International Mobile Subscriber Identity) based SUPI (Subscription Permanent Identifier) and ECIES Profile A, the IMSI consists of MCC|MNC: '274012'. 

In the 5G system, the globally unique 5G subscription permanent identifier is called SUPI as defined in 3GPP TS 23.501. For privacy reasons, the SUPI from the 5G devices should not be transferred in clear text, and is instead concealed inside the privacy preserving SUCI. Consequently, the SUPI is privacy protected over-the-air of the 5G radio network by using the SUCI. For SUCIs containing IMSI based SUPI, the UE in essence conceals the MSIN (Mobile Subscriber Identification Number) part of the IMSI. On the 5G operator-side, the SIDF (Subscription Identifier De-concealing Function) of the UDM (Unified Data Management) is responsible for de-concealment of the SUCI and resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. 

The SUCI protection scheme used in this data set is ECIES Profile A. The size of the scheme-output is a total of 256-bit public key, 64-bit MAC & 40-bit encrypted MSIN. The SUCI scheme-input MSIN is coded as hexadecimal digits using packed BCD coding where the order of digits within an octet is same as the order of MSIN. As the MSINs are odd number of digits, bits 5 to 8 of final octet is coded as ‘1111’.  

# Example Python code to load data into Spark DataFrame

df = spark.read.format("csv").option("inferSchema","true").option("header","true").option("sep",",").load(“5g_suci_using_ecies_profile_a_100k.gz”)

Categories:
292 Views

Secure cryptographic protocols are indispensable for modern communication systems. It is realized through an encryption process in cryptography. In quantum cryptography, Quantum Key Distribution (QKD) is a widely popular quantum communication scheme that enables two parties to establish a shared secret key that can be used to encrypt and decrypt messages.

Categories:
27 Views

The data and code used in our manuscript "All-Integrated 3D-Printed Horn Antenna and Orthomode Transducer Designed through Modified Grey Wolf Optimizer".

Categories:
Category: 
58 Views

Pages