Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,396)

Search Parameters:
Keywords = new radio

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 903 KiB  
Article
Robustness of Deep-Learning-Based RF UAV Detectors
by Hilal Elyousseph and Majid Altamimi
Sensors 2024, 24(22), 7339; https://doi.org/10.3390/s24227339 (registering DOI) - 17 Nov 2024
Viewed by 417
Abstract
The proliferation of low-cost, small radar cross-section UAVs (unmanned aerial vehicles) necessitates innovative solutions for countering them. Since these UAVs typically operate with a radio control link, a promising defense technique involves passive scanning of the radio frequency (RF) spectrum to detect UAV [...] Read more.
The proliferation of low-cost, small radar cross-section UAVs (unmanned aerial vehicles) necessitates innovative solutions for countering them. Since these UAVs typically operate with a radio control link, a promising defense technique involves passive scanning of the radio frequency (RF) spectrum to detect UAV control signals. This approach is enhanced when integrated with machine-learning (ML) and deep-learning (DL) methods. Currently, this field is actively researched, with various studies proposing different ML/DL architectures competing for optimal accuracy. However, there is a notable gap regarding robustness, which refers to a UAV detector’s ability to maintain high accuracy across diverse scenarios, rather than excelling in just one specific test scenario and failing in others. This aspect is critical, as inaccuracies in UAV detection could lead to severe consequences. In this work, we introduce a new dataset specifically designed to test for robustness. Instead of the existing approach of extracting the test data from the same pool as the training data, we allowed for multiple categories of test data based on channel conditions. Utilizing existing UAV detectors, we found that although coefficient classifiers have outperformed CNNs in previous works, our findings indicate that image classifiers exhibit approximately 40% greater robustness than coefficient classifiers under low signal-to-noise ratio (SNR) conditions. Specifically, the CNN classifier demonstrated sustained accuracy in various RF channel conditions not included in the training set, whereas the coefficient classifier exhibited partial or complete failure depending on channel characteristics. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

Figure 1
<p>Market study breakdown of counter-UAV techniques [<a href="#B1-sensors-24-07339" class="html-bibr">1</a>].</p>
Full article ">Figure 2
<p>Block diagram of UAV detection via passive RF scanning and ML/DL techniques.</p>
Full article ">Figure 3
<p>Example training data, showing the UAV control signal isolated between dotted black lines.</p>
Full article ">Figure 4
<p>Hardware and software setup along with UAV controller.</p>
Full article ">Figure 5
<p>Examples from the test dataset. The UAV signal is present at the right edge of the bottom two images, showing three peaks which decay with distance.</p>
Full article ">Figure 6
<p>Robustness scores for low SNR performance.</p>
Full article ">Figure 7
<p>Accuracy Plots for different UAV test categories.</p>
Full article ">
16 pages, 1111 KiB  
Article
Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio
by Markus Walter and Jörg Keller
Future Internet 2024, 16(11), 410; https://doi.org/10.3390/fi16110410 - 6 Nov 2024
Viewed by 415
Abstract
Mobile communication is ubiquitous in everyday life. The fifth generation of mobile networks (5G) introduced 5G New Radio as a radio access technology that meets current bandwidth, quality, and application requirements. Network steganographic channels that hide secret message transfers in an innocent carrier [...] Read more.
Mobile communication is ubiquitous in everyday life. The fifth generation of mobile networks (5G) introduced 5G New Radio as a radio access technology that meets current bandwidth, quality, and application requirements. Network steganographic channels that hide secret message transfers in an innocent carrier communication are a particular threat in mobile communications as these channels are often used for malware, ransomware, and data leakage. We systematically analyze the protocol stack of the 5G–air interface for its susceptibility to network steganography, addressing both storage and timing channels. To ensure large coverage, we apply hiding patterns that collect the essential ideas used to create steganographic channels. Based on the results of this analysis, we design and implement a network covert storage channel, exploiting reserved bits in the header of the Packet Data Convergence Protocol (PDCP). the covert sender and receiver are located in a 5G base station and mobile device, respectively. Furthermore, we sketch a timing channel based on a recent overshadowing attack. We evaluate our steganographic storage channel both in simulation and real-world experiments with respect to steganographic bandwidth, robustness, and stealthiness. Moreover, we discuss countermeasures. Our implementation demonstrates the feasibility of a covert channel in 5G New Radio and the possibility of achieving large steganographic bandwidth for broadband transmissions. We also demonstrate that the detection of the channel by a network analyzer is possible, limiting its scope to application scenarios where operators are unaware or ignorant of this threat. Full article
(This article belongs to the Special Issue 5G Security: Challenges, Opportunities, and the Road Ahead)
Show Figures

Figure 1

Figure 1
<p>Logical channels in 5G New Radio for uplink (red) and downlink (blue) directions based on [<a href="#B3-futureinternet-16-00410" class="html-bibr">3</a>].</p>
Full article ">Figure 2
<p>Header structure of SDAP [<a href="#B11-futureinternet-16-00410" class="html-bibr">11</a>], PDCP [<a href="#B10-futureinternet-16-00410" class="html-bibr">10</a>], and RLC [<a href="#B9-futureinternet-16-00410" class="html-bibr">9</a>].</p>
Full article ">Figure 3
<p>Average covert capacity at different bandwidths of overt traffic.</p>
Full article ">
15 pages, 779 KiB  
Article
BWSAR: A Single-Drone Search-and-Rescue Methodology Leveraging 5G-NR Beam Sweeping Technologies for Victim Localization
by Ming He, Keliang Du, Haoran Huang, Qi Song and Xinyu Liu
Electronics 2024, 13(21), 4317; https://doi.org/10.3390/electronics13214317 - 2 Nov 2024
Viewed by 707
Abstract
Drones integrated with 5G New Radio (NR) base stations have emerged as a promising solution for efficient victim search and localization in emergency zones where cellular networks are disrupted by natural disasters. Traditional approaches relying solely on uplink Sounding Reference Signal (SRS) for [...] Read more.
Drones integrated with 5G New Radio (NR) base stations have emerged as a promising solution for efficient victim search and localization in emergency zones where cellular networks are disrupted by natural disasters. Traditional approaches relying solely on uplink Sounding Reference Signal (SRS) for localization face limitations due to User Equipment (UE) power constraints. To overcome this, our paper introduces BWSAR, a novel three-stage Search-and-Rescue (SAR) methodology leveraging 5G-NR beam sweeping technologies. BWSAR utilizes downlink Synchronization Signal Block (SSB) for coarse-grained direction estimation, guiding the drone towards potential victim locations. Subsequently, finer-grained beam sweeping with Positioning Reference Signal (PRS) is employed within the identified direction, enabling precise three-dimensional UE coordinate estimation. Furthermore, we propose a trajectory optimization algorithm to expedite the drone’s navigation to emergency areas. Simulation results underscore BWSAR’s efficacy in reducing positioning errors and completing SAR missions swiftly, within minutes. Full article
(This article belongs to the Special Issue Parallel, Distributed, Edge Computing in UAV Communication)
Show Figures

Figure 1

Figure 1
<p>System model: single UAV for search and rescue.</p>
Full article ">Figure 2
<p>Localization error vs. distance between the UAV and the victim.</p>
Full article ">Figure 3
<p>The UAV trajectory with two different flight strategies.</p>
Full article ">Figure 4
<p>The distance to UE over time with two different flight strategies.</p>
Full article ">Figure 5
<p>The complete flight trajectory of the UAV.</p>
Full article ">Figure 6
<p>Schematic diagram of the actual UAV flight trajectory.</p>
Full article ">Figure 7
<p>The UAV in stage 3 flies around the victim in a circular trajectory.</p>
Full article ">Figure 8
<p>The localization error over time.</p>
Full article ">
25 pages, 15136 KiB  
Article
TRBP2, a Major Component of the RNAi Machinery, Is Subjected to Cell Cycle-Dependent Regulation in Human Cancer Cells of Diverse Tissue Origin
by Eleni I. Theotoki, Panos Kakoulidis, Athanassios D. Velentzas, Konstantinos-Stylianos Nikolakopoulos, Nikolaos V. Angelis, Ourania E. Tsitsilonis, Ema Anastasiadou and Dimitrios J. Stravopodis
Cancers 2024, 16(21), 3701; https://doi.org/10.3390/cancers16213701 - 1 Nov 2024
Viewed by 649
Abstract
Background: Transactivation Response Element RNA-binding Protein (TRBP2) is a double-stranded RNA-binding protein widely known for its critical contribution to RNA interference (RNAi), a conserved mechanism of gene-expression regulation mediated through small non-coding RNA moieties (ncRNAs). Nevertheless, TRBP2 has also proved to be involved [...] Read more.
Background: Transactivation Response Element RNA-binding Protein (TRBP2) is a double-stranded RNA-binding protein widely known for its critical contribution to RNA interference (RNAi), a conserved mechanism of gene-expression regulation mediated through small non-coding RNA moieties (ncRNAs). Nevertheless, TRBP2 has also proved to be involved in other molecular pathways and biological processes, such as cell growth, organism development, spermatogenesis, and stress response. Mutations or aberrant expression of TRBP2 have been previously associated with diverse human pathologies, including Alzheimer’s disease, cardiomyopathy, and cancer, with TRBP2 playing an essential role(s) in proliferation, invasion, and metastasis of tumor cells. Methods: Hence, the present study aims to investigate, via employment of advanced flow cytometry, immunofluorescence, cell transgenesis and bioinformatics technologies, new, still elusive, functions and properties of TRBP2, particularly regarding its cell cycle-specific control during cancer cell division. Results: We have identified a novel, mitosis-dependent regulation of TRBP2 protein expression, as clearly evidenced by the lack of its immunofluorescence-facilitated detection during mitotic phases, in several human cancer cell lines of different tissue origin. Notably, the obtained TRBP2-downregulation patterns seem to derive from molecular mechanisms that act independently of oncogenic activities (e.g., malignancy grade), metastatic capacities (e.g., low versus high), and mutational signatures (e.g., p53−/− or p53ΔΥ126) of cancer cells. Conclusions: Taken together, we herein propose that TRBP2 serves as a novel cell cycle-dependent regulator, likely exerting mitosis-suppression functions, and, thus, its mitosis-specific downregulation can hold strong promise to be exploited for the efficient and successful prognosis, diagnosis, and (radio-/chemo-)therapy of diverse human malignancies, in the clinic. Full article
(This article belongs to the Section Tumor Microenvironment)
Show Figures

Figure 1

Figure 1
<p>Variation in TRBP2 protein levels in T24 cells at the cell cycle phases. Histograms showing fluorescence distribution of the FITC-conjugated anti-TRBP antibody in each phase of the cell cycle (<b>A</b>) under control conditions (PI staining), (<b>B</b>) after antibody and PI staining, and (<b>C</b>) after Brefeldin A pre-treatment and antibody and PI staining. Values in the tables show the mean fluorescence intensity (MFI) (mean FITC-A) from one representative experiment out of three performed.</p>
Full article ">Figure 2
<p>TRBP2 expression profiles at the interphase and mitosis of thyroid cells. Immunofluorescence images of NTHY-ori 3-1, TPC-1, and ARO cells, investigating TRBP2 expression and distribution patterns in both interphase and mitotic cells. In cells undergoing mitosis, a lack of TRBP2-protein immunodetection is observed (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 3
<p>Downregulation of TRBP2 protein expression in urothelial bladder cancer cells during mitosis. Immunofluorescence images of RT112, T24, and TCCSUP cells, searching for TRBP2 expression and distribution profiles in both interphase and mitotic cells. In dividing cells, the absence of TRBP2 immunostaining is detected at the mitosis stage (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 4
<p>p53-independent downregulation of TRBP2 protein in colon carcinoma-dividing cells. Immunofluorescence images of HCT116 colon cancer cells, seeking for TRBP2 expression and distribution profiles either in the presence (HCT116-p53<sup>+/+</sup>) or in the absence (HCT116-p53<sup>−/−</sup>) of the wild-type p53 protein form. In both cases, TRBP2 elimination from dividing cells during mitosis is identified (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 5
<p>Metastasis-independent TRBP2 downregulation during melanoma cell division. Immunofluorescence images of pre-metastatic WM115 and metastatic WM266-4 melanoma cells, exploring TRBP2 expression and compartmentalization patterns in both interphase and mitotic cells. Lack of TRBP2 immunodetection profiles in mitotic cells of both cell lines is observed (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 6
<p>Oncogenesis-independent control of TRBP2 expression in hepatic cells undergoing mitosis. Immunofluorescence images of LX-2 and HepG2 cells directly reflect TRBP2 expression and distribution patterns in human hepatic cells. In dividing cells, loss of TRBP2 protein is detected during mitosis (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 7
<p>Cell cycle-dependent regulation of TRBP2-protein expression and compartmentalization in hepatic cells. Immunofluorescence images of LX-2 hepatic cells unveil TRBP2 expression and distribution patterns at different stages of mitosis. The presence (yellow arrows) or the absence (white arrows) of the TRBP2 protein immunodetection can be distinguished at each stage of the cell division process. Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 8
<p>PACT protein expression profiling at the interphase and mitosis of dividing cells. Immunofluorescence images of LX-2, HepG2, and HCT116 cells, investigating PACT expression and distribution in both interphase and mitotic cells. PACT-immunodetection pattern is found diffused in the cytoplasm, whereas it maintains an intense signal during mitosis (yellow arrows) in all the examined cell lines, regardless of the malignant phenotype (LX-2 versus HepG2) or the absence of the wild-type p53 protein (HCT116-p53<sup>+/+</sup> versus HCT116-p53<sup>−/−</sup>). Green color: PACT; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 9
<p>Overexpression of TRBP2 protein in LX-2 hepatic cells cannot rescue its mitosis-specific loss. (<b>A</b>) Histogram presenting the relative expression levels of the <span class="html-italic">TARBP2</span> gene in <span class="html-italic">TARBP2</span> transiently transfected LX-2 cells (pcDNA-TRBP), as compared to control cells (pcDNA3.1(+)). (<b>B</b>) Amplification curves (in duplicates) showing the increase in fluorescence over the qPCR cycles for <span class="html-italic">TARBP2</span> and <span class="html-italic">GAPDH</span> (reference gene) mRNAs in <span class="html-italic">TARBP2</span>-overexpressing and control LX-2 cells. (<b>C</b>) Immunofluorescence images of LX-2 cells transiently overexpressing the TRBP2 protein, searching for TRBP2 expression in both interphase and mitotic cells, 48 h post-transfection. TRBP2 has been lost during mitosis in both overexpressing (pcDNA-TRBP) and control (pcDNA3.1(+)) cells (white arrows). Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm. (<b>D</b>) Box-plot presenting the percentage of mitotic-cell numbers (%) in <span class="html-italic">TARBP2</span>-overexpressing LX-2 cells (pcDNA-TRBP) as compared to control (pcDNA3.1(+)) cells (*: <span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 10
<p>Chemical inhibition of SUMOylation-, NEDDylation-, and Proteasome-dependent types of machinery cannot alter the TRBP2 immunostaining patterns in LX-2 hepatic cells. Immunofluorescence images of LX-2 cells, seeking TRBP2 expression in interphase (<b>left panels</b>) and mitotic (<b>right panels</b>) cells, 24 h after the administration of 1 µM TAK-981 (SUMOylation inhibitor), MLN-4924 (NEDDylation inhibitor), and Bortezomib (Proteasome inhibitor), chemically synthesized compounds. TRBP2-immunodetection profile is lost (white arrows) only in the dividing cells undergoing mitosis, in contrast to the interphase cells. LX-2 cells treated with 1 µM DMSO were used as control. Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm. Inserts indicate aberrant mitoses being derived from each inhibitor’s pathogenic actions.</p>
Full article ">Figure 11
<p>Chemical inhibition of major signaling pathways cannot rescue the TRBP2 protein-specific loss during mitosis in the LX-2 dividing cell. Immunofluorescence images of LX-2 cells, exploring for TRBP2 immunostaining patterns in interphase and mitotic cells, 24 h after the administration of 100 µM U0126 [MEK1/2 (ERK1/2) inhibitor], 50 µM SP600125 (JNK1/2/3 inhibitor), 100 µM SB203580 (p38 MAPK inhibitor) and 25 µM MK-2206 (AKT1/2/3 inhibitor). DMSO was used as a control condition. TRBP2 protein immunodetection pattern is missing (white arrows) only in the dividing cells undergoing mitosis, in contrast to the interphase cells. Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm. Inserts denote aberrant mitosis incidents, indicating the pathogenic efficacy of each chemical inhibitor.</p>
Full article ">Figure 12
<p>Microtubule-network disruption cannot restore the mitosis-specific lack of TRBP2-immunodetection pattern in LX-2 hepatic cells. Immunofluorescence images of LX-2 cells, investigating for TRBP2 expression, after 6 h treatment with the microtubule-polymerization inhibitor Demecolcine (0.4 µg/µL), in interphase (<b>upper panels</b>) and mitotic (<b>lower panels</b>) cells. TRBP2 protein is missing from mitotic cells (white arrows), both in treated (Demecolcine) and control (DMSO) conditions, in contrast to interphase cells. Green color: TRBP2; Red color: α-Tubulin; Blue color: Nucleus (DAPI). Scale bars: 10 µm.</p>
Full article ">Figure 13
<p>Cell compartment-specific TRBP2 interactome in human diseases. Dot plots graphically displaying major binary interactions of TRBP2 protein in different sub-cellular compartments, and especially cytoplasm (<b>upper panels</b>) and nucleus (<b>lower panels</b>), in diverse human diseases, including cancer (e.g., Wilms tumor) (<b>a</b>–<b>h</b>).</p>
Full article ">
13 pages, 2805 KiB  
Article
A New Mutagenesis Tool for Songpu Mirror Carp (Cyprinus carpio L.) for Selective Breeding: Atmospheric-Pressure Room-Temperature Plasma Mutagenesis Technology
by Xiaona Jiang, Chitao Li, Mei Shang, Xuesong Hu, Yanlong Ge and Zhiying Jia
Fishes 2024, 9(11), 448; https://doi.org/10.3390/fishes9110448 - 1 Nov 2024
Viewed by 521
Abstract
As a new, safe, and efficient method, Atmospheric-Pressure Room-Temperature Plasma (ARTP) mutagenesis has been widely applied in the field of microbial breeding and industrial applications, but it is rarely used in fish. In this study, ARTP mutagenesis technology was applied for the first [...] Read more.
As a new, safe, and efficient method, Atmospheric-Pressure Room-Temperature Plasma (ARTP) mutagenesis has been widely applied in the field of microbial breeding and industrial applications, but it is rarely used in fish. In this study, ARTP mutagenesis technology was applied for the first time to a common carp strain, Songpu mirror carp (Cyprinus carpio L.), to increase genetic variation in this species. The appropriate experimental conditions were determined to include a radio frequency output power of 160 W and the processing of fertilized eggs for 360 s. The ARTP treatment group had a lower survival rate than the control group. The CV of morphological characters in the ARTP treatment group was significantly higher than that in the control group, and the CV of body weight was the highest (p < 0.05). In addition, the deformity rate in the ARTP treatment group was significantly higher than in the control group (p < 0.05). Individuals with high weight and no deformities were screened within the selection pressure of 1:15 of ARTP treatment group and fed in the same pool with the control group of the same age. The measurement of serum indices showed that, in the ARTP treatment group, TP, ALP, ALB, T-CHO, LDL levels were significantly higher than those in the control group (p < 0.05). Furthermore, the relative expressions of SOD, growth-related genes GH, IGF-I, protein synthesis-related genes TOR and 4EBP1 were significantly higher in the ARTP treatment group than in the control group (p < 0.05). In summary, Songpu mirror carp subjected to ARTP treatment showed a higher growth potential and antioxidant capacity. Full article
(This article belongs to the Special Issue Genetics and Breeding in Aquaculture)
Show Figures

Figure 1

Figure 1
<p>Hatching rates and fry survival rates for Songpu mirror carp under different conditions. (<b>a</b>) Survival rates of fertilized Songpu mirror carp eggs under different treatment times and output power levels. (<b>b</b>) Hatchability rates of fertilized Songpu mirror carp eggs under different treatment times and output powers. The treatment time was 0 s and the output power was 0 W in the control group, and the other groups constituted the ARTP treatment group. Lowercase letters in the column chart indicate significant differences determined by using the Bonferroni <span class="html-italic">t</span> test in SAS 9.1 (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 2
<p>Box plots of W and phenotypic traits in Songpu mirror carp. Box plots of the W, SL, H, BW and HL of Sonpu mirror carp in three periods in the ARTP treatment and control groups initiated at 5 months after fertilization. The black dots in the figure indicate values greater than 1.5 times the interquartile range.</p>
Full article ">Figure 3
<p>Malformation types in Songpu mirror carp, arranged from large to small according to total length. Types of deformities include lack of fin (<b>A</b>,<b>B</b>,<b>E</b>–<b>G</b>), deformity of mouth and skull (<b>C</b>), lack of operculum (<b>D</b>,<b>H</b>,<b>I</b>), scales on the back (<b>C</b>,<b>J</b>), and high back (<b>F</b>,<b>I</b>–<b>K</b>). Bar indicates 50 mm.</p>
Full article ">Figure 4
<p>Morphological parameter ratios of different stages in Songpu mirror carp. The ratios of morphological parameters of Songpu mirror carp at 5 months and 14 months after fertilization, including W/SL, BH/SL, BW/SL and HL/SL Statistically significant differences were defined at <span class="html-italic">p</span> &lt; 0.05 (** <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 5
<p>Relative expression levels of protein synthesis-related genes in the dorsal muscles (<b>a</b>) and intestine (<b>b</b>) in the ARTP treatment and control groups. Relative mRNA expression of <span class="html-italic">S6K</span> compared to that in the ARTP treatment group. Statistically significant differences were defined at <span class="html-italic">p</span> &lt; 0.05 (* <span class="html-italic">p</span> &lt; 0.05; ** <span class="html-italic">p</span> &lt; 0.01; *** <span class="html-italic">p</span> &lt; 0.001).</p>
Full article ">Figure 6
<p>Relative expression levels of antioxidant-related genes in the liver (<b>a</b>) and growth-related genes in dorsal muscles (<b>b</b>) in the ARTP treatment and control groups, respectively. Relative mRNA expression levels of <span class="html-italic">SOD</span> compared to those in the ARTP treatment group and <span class="html-italic">GH</span> compared to those in the control group. Statistically significant differences were defined at <span class="html-italic">p</span> &lt; 0.05 (* <span class="html-italic">p</span> &lt; 0.05; ** <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">
25 pages, 3319 KiB  
Article
Preliminary Design of a GNSS Interference Mapping CubeSat Mission: JamSail
by Luis Cormier, Tasneem Yousif, Samuel Thompson, Angel Arcia Gil, Nishanth Pushparaj, Paul Blunt and Chantal Cappelletti
Aerospace 2024, 11(11), 901; https://doi.org/10.3390/aerospace11110901 - 31 Oct 2024
Viewed by 442
Abstract
The JamSail mission is an educational CubeSat aiming to design, develop, and demonstrate two new technologies on a small satellite, tentatively scheduled for launch no earlier than 2026. When launched, JamSail will demonstrate the functionality of two new payloads in low Earth orbit. [...] Read more.
The JamSail mission is an educational CubeSat aiming to design, develop, and demonstrate two new technologies on a small satellite, tentatively scheduled for launch no earlier than 2026. When launched, JamSail will demonstrate the functionality of two new payloads in low Earth orbit. First, a flexible, low-cost GNSS interference detection payload capable of characterising and geolocating the sources of radio interference regarding the E1/L1 and E5a/L5 bands will be demonstrated on a global scale. The data produced by this payload can be used to target anti-interference actions in specific regions and aid in the design of future GNSS receivers to better mitigate specific types of interference. If successful, the flexibility of the payload will allow it to be remotely reconfigured in orbit to investigate additional uses of the technology, including a potential demonstration of GNSS reflectometry aboard a CubeSat. Second, a compact refractive solar sail will be deployed that is capable of adjusting the orbit of JamSail in the absence of an on-board propellant. This sail will be used to gradually raise the semi-major axis of JamSail over the span of the mission before being used to perform rapid passive deorbit near the end-of-life juncture. Additionally, self-stabilising optical elements within the sail will be used to demonstrate a novel method of performing attitude control. JamSail is currently in the testing phase, and the payloads will continue to be refined until the end of 2024. This paper discusses the key objectives of the JamSail mission, the design of the payloads, the expected outcomes of the mission, and future opportunities regarding the technologies as a whole. Full article
(This article belongs to the Special Issue Small Satellite Missions)
Show Figures

Figure 1

Figure 1
<p>Graphical overview of the JamSail concept of operations.</p>
Full article ">Figure 2
<p>The JamSail GNSS payload block diagram.</p>
Full article ">Figure 3
<p>Simulation and test methodology overview.</p>
Full article ">Figure 4
<p>Different average lengths regarding a simulated CW jamming signal: (<b>a</b>) 0 average FFTs; (<b>b</b>) 64 average FFTs; (<b>c</b>) 128 average FFTs; (<b>d</b>) 256 average FFTs.</p>
Full article ">Figure 4 Cont.
<p>Different average lengths regarding a simulated CW jamming signal: (<b>a</b>) 0 average FFTs; (<b>b</b>) 64 average FFTs; (<b>c</b>) 128 average FFTs; (<b>d</b>) 256 average FFTs.</p>
Full article ">Figure 5
<p>The change in slant range over the zenithal pass.</p>
Full article ">Figure 6
<p>The received power levels of various signals over the perfect zenithal pass with reference to the noise floor.</p>
Full article ">Figure 7
<p>The 20 s scenario of CW interference above the transmitter: (<b>a</b>) 3D FFT results spectrum with 12.5 MHz sample frequency; (<b>b</b>) The waterfall diagram of the 20 s CW simulation.</p>
Full article ">Figure 8
<p>The discrete Doppler shift over the 20 s simulations and the truth data for the Doppler shift as a reference.</p>
Full article ">Figure 9
<p>The modelled continuous-frequency Doppler shift compared to the truth data Doppler shift.</p>
Full article ">Figure 10
<p>The error in Hz between the modelled continuous-frequency Doppler shift and the truth data Doppler shift.</p>
Full article ">Figure 11
<p>The modelled Doppler rate compared to the truth data for the Doppler rate.</p>
Full article ">Figure 12
<p>The error between the modelled and true Doppler rates.</p>
Full article ">Figure 13
<p>Render of deployed sail payload (no satellite bus).</p>
Full article ">Figure 14
<p>Transmissive and reflective forces <math display="inline"><semantics> <mi mathvariant="bold">F</mi> </semantics></math> and torques <math display="inline"><semantics> <mi>τ</mi> </semantics></math> with respect to centre of gravity <math display="inline"><semantics> <msub> <mi mathvariant="normal">C</mi> <mi mathvariant="normal">g</mi> </msub> </semantics></math> in a Sun-pointing attitude, where self-stabilising elements are inactive (idealised).</p>
Full article ">Figure 15
<p>Miura-ori flasher design in deployed (<b>a</b>) and stowed (<b>b</b>) configuration.</p>
Full article ">Figure 16
<p>Stowed sail payload annotated without flat springs, compression springs, or motor assembly.</p>
Full article ">Figure 17
<p>Sail payload diagonal section, moving assembly annotated (<b>a</b>) stowed; (<b>b</b>) deployed.</p>
Full article ">Figure 18
<p>Tri-band ground station at the University of Nottingham during installation.</p>
Full article ">
16 pages, 4393 KiB  
Article
A Field-Programmable Gate Array-Based Quasi-Cyclic Low-Density Parity-Check Decoder with High Throughput and Excellent Decoding Performance for 5G New-Radio Standards
by Bilal Mejmaa, Ismail Akharraz and Abdelaziz Ahaitouf
Technologies 2024, 12(11), 215; https://doi.org/10.3390/technologies12110215 - 31 Oct 2024
Viewed by 781
Abstract
This work presents a novel fully parallel decoder architecture designed for high-throughput decoding of Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes within the context of 5G New-Radio (NR) communication. The design uses the layered Min-Sum (MS) algorithm and focuses on increasing throughput to meet the [...] Read more.
This work presents a novel fully parallel decoder architecture designed for high-throughput decoding of Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes within the context of 5G New-Radio (NR) communication. The design uses the layered Min-Sum (MS) algorithm and focuses on increasing throughput to meet the strict needs of enhanced Mobile BroadBand (eMBB) applications. We incorporated a Sub-Optimal Low-Latency (SOLL) technique to enhance the critical check node processing stage inherent to the MS algorithm. This technique efficiently computes the two minimum values, rendering the architecture well-suited for specific Ultra-Reliable Low-Latency Communication (URLLC) scenarios. We design the decoder to be reconfigurable, enabling efficient operation across all expansion factors. We rigorously validate the decoder’s effectiveness through meticulous bit-error-rate (BER) performance evaluations using Hardware Description Language (HDL) co-simulation. This co-simulation utilizes a well-established suite of tools encompassing MATLAB/Simulink for system modeling and Vivado, a prominent FPGA design suite, for hardware representation. With 380,737 Look-Up Tables (LUTs) and 32,898 registers, the decoder’s implementation on a Virtex-7 XC7VX980T FPGA platform by AMD/Xilinx shows good hardware utilization. The architecture attains a robust operating frequency of 304.5 MHz and a normalized throughput of 49.5 Gbps, marking a 36% enhancement compared to the state-of-the-art. This advancement propels decoding capabilities to meet the demands of high-speed data processing. Full article
Show Figures

Figure 1

Figure 1
<p>5G-NR block diagram of the communication system.</p>
Full article ">Figure 2
<p>Blocks structure of 5G-NR base graph BG1.</p>
Full article ">Figure 3
<p>Comprehensive architecture of the proposed 5G-NR LDPC decoder. The blue lines represent the control data, while the black lines denote the data flow.</p>
Full article ">Figure 4
<p>Redesign of the SOLL approximation in Simulink for 5G-NR scenarios. The green color denotes MMB blocks, while the yellow color signifies MB blocks.</p>
Full article ">Figure 5
<p>HDL Design DLL generated by Simulink for co-simulation process.</p>
Full article ">Figure 6
<p>SNR performance of the proposed decoder and its comparison with the state-of-the-art based on the rate of 2/3 [<a href="#B14-technologies-12-00215" class="html-bibr">14</a>,<a href="#B15-technologies-12-00215" class="html-bibr">15</a>] (<b>a</b>) and the rate of 1/3 [<a href="#B13-technologies-12-00215" class="html-bibr">13</a>] (<b>b</b>) of BG1.</p>
Full article ">Figure 7
<p>The impact of three different synthesis strategies on frequency, WNS, LUTs, and power consumption evaluated through hardware implementation on the XC7VX980T board.</p>
Full article ">Figure 8
<p>Graphical visualization with cyan color of resource utilization (Flow_AreaOptimized_high) by the proposed decoder.</p>
Full article ">Figure 9
<p>Resource utilization report (Flow_AreaOptimized_high) of the proposed decoder.</p>
Full article ">Figure 10
<p>Timing report of the implemented design in nanoseconds, with blue color indicating an acceptable worst slack.</p>
Full article ">Figure 11
<p>Timing consumed by each block of the decoder (<b>a</b>) and resources utilized by each block of the decoder (<b>b</b>).</p>
Full article ">
20 pages, 3567 KiB  
Article
Modeling Emergency Traffic Using a Continuous-Time Markov Chain
by Ahmad Hani El Fawal, Ali Mansour, Hussein El Ghor, Nuha A. Ismail and Sally Shamaa
J. Sens. Actuator Netw. 2024, 13(6), 71; https://doi.org/10.3390/jsan13060071 - 30 Oct 2024
Viewed by 601
Abstract
This paper aims to propose a novel call for help traffic (SOS) and study its impact over Machine-to-Machine (M2M) and Human-to-Human (H2H) traffic in Internet of Things environments, specifically during disaster events. During such events (e.g., the spread COVID-19), SOS traffic, with its [...] Read more.
This paper aims to propose a novel call for help traffic (SOS) and study its impact over Machine-to-Machine (M2M) and Human-to-Human (H2H) traffic in Internet of Things environments, specifically during disaster events. During such events (e.g., the spread COVID-19), SOS traffic, with its predicted exponential increase, will significantly influence all mobile networks. SOS traffic tends to cause many congestion overload problems that significantly affect the performance of M2M and H2H traffic. In our project, we developed a new Continuous-Time Markov Chain (CTMC) model to analyze and measure radio access performance in terms of massive SOS traffic that influences M2M and H2H traffic. Afterwards, we validate the proposed CTMC model through extensive Monte Carlo simulations. By analyzing the traffic during an emergency case, we can spot a huge impact over the three traffic types of M2M, H2H and SOS traffic. To solve the congestion problems while keeping the SOS traffic without any influence, we propose to grant the SOS traffic the highest priority over the M2M and H2H traffic. However, by implementing this solution in different proposed scenarios, the system becomes able to serve all SOS requests, while only 20% of M2M and H2H traffic could be served in the worst-case scenario. Consequently, we can alleviate the expected shortage of SOS requests during critical events, which might save many humans and rescue them from being isolated. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

Figure 1
<p>SOS traffic in M2M domains.</p>
Full article ">Figure 2
<p>The CTMC model for C = 3, where “C” is the number of resource blocks available in the network, “S (i,j)” are the states in each phase, “i” represents the number of ongoing M2M services, and “j” represents the number of ongoing H2H services.</p>
Full article ">Figure 3
<p>The transitioning example from S (0,0) in the “Empty Phase” to the different states in the “Occupied Phase”; “S (i,j)” represents the different states, where “i” is the number of ongoing M2M services and “j” is the number of ongoing H2H services.</p>
Full article ">Figure 4
<p>The transitioning example from S (1,0) in the “Occupied Phase” to the different states in the “Empty Phase” and the “Full Phase”; “S (i,j)” represents different states where “i” is the number of ongoing M2M services and “j” is the number of ongoing H2H services.</p>
Full article ">Figure 5
<p>The transitioning example from S (1,2) in the “Full Phase” to the different states in the “Occupied Phase”; “S (i,j)” represents different states where “i” is the number of ongoing M2M services and “j” is the number of ongoing H2H services.</p>
Full article ">Figure 6
<p>Normal-cycle scenario results, where: S (0,0) represent the initial state, S (0,1) represents one H2H request only, S (0,2) is the state with two H2H requests, and S (0,3) represents three H2H requests, while S (1,0) represents one M2M request only, S (2,0) is the state with two M2M requests, and S (3,0) represents three M2M requests. Moreover, S (1,1) is the state that contains one M2M request and one H2H request, S (1,2) represents the arrival of one M2M request and two H2H requests, and S (2,1) represents the arrival of two M2M requests and one H2H reque.</p>
Full article ">Figure 7
<p>The dense-area scenario results, where S (0,0) represents the initial state, S (0,1) represents one H2H request only, S (0,2) is the state with two H2H requests, and S (0,3) represents three H2H requests, while S (1,0) represents one M2M request only, S (2,0) is the state with two M2M requests, and S (3,0) represents three M2M requests. Moreover, S (1,1) is the state that contains one M2M request and one H2H request, S (1,2) represents the arrival of one M2M request and two H2H requests, and S (2,1) represents the arrival of two M2M requests and one H2H request.</p>
Full article ">Figure 8
<p>The worst-case scenario results, where S (0,0) represents the initial state, S (0,1) represents one H2H request only, S (0,2) is the state with two H2H requests, and S (0,3) represents three H2H requests, while S (1,0) represents one M2M request only, S (2,0) is the state with two M2M requests, and S (3,0) represents three M2M requests. Moreover, S (1,1) is the state that contains one M2M request and one H2H request, S (1,2) represents the arrival of one M2M request and two H2H requests, and S (2,1) represents the arrival of two M2M requests and one H2H request.</p>
Full article ">Figure 9
<p>The impact of the M2M and SOS traffic on the H2H traffic in the different scenarios.</p>
Full article ">Figure 10
<p>Impact of H2H and SOS traffic on M2M traffic in different scenarios.</p>
Full article ">
11 pages, 6783 KiB  
Article
23.5–27.5 GHz Band Doherty Power Amplifier Integrated Circuit Using 28 nm Bulk CMOS Process Based on Dynamic Power Dividing Network
by Young Chan Choi, Soohyun Bin, Keum Cheol Hwang, Kang-Yoon Lee and Youngoo Yang
Electronics 2024, 13(21), 4190; https://doi.org/10.3390/electronics13214190 - 25 Oct 2024
Viewed by 506
Abstract
This paper presents a Doherty power amplifier (DPA) integrated circuit (IC) designed to have enhanced gain, efficiency, and AM-AM characteristics through a dynamic power dividing technique, which can control the power dividing ratio according to the input power. Since this multi-purpose dynamic power [...] Read more.
This paper presents a Doherty power amplifier (DPA) integrated circuit (IC) designed to have enhanced gain, efficiency, and AM-AM characteristics through a dynamic power dividing technique, which can control the power dividing ratio according to the input power. Since this multi-purpose dynamic power dividing network also provides the phase offset and impedance matching at the interstage network needed for appropriate DPA operation, the active IC area could be reduced. To verify the proposed technique and its analysis, the DPA was implemented with a 28 nm bulk CMOS process for the fifth-generation (5G) new radio (NR) millimeter-wave frequency band of 23.5–27.5 GHz. The measured results showed a gain of 20.3–21.9 dB, saturated output power of 14.0–15.2 dBm, power added efficiency (PAE) of 22.8–26.7% at the peak power, and PAE of 14.6–17.6% at the 6 dB output power back-off (OBO). Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

Figure 1
<p>Proposed dynamic power dividing network: (<b>a</b>) Schematic; (<b>b</b>) Layout.</p>
Full article ">Figure 2
<p>Three cases of the dynamic power dividing network compared to the conventional power divider: (<b>a</b>) Power dividing ratio; (<b>b</b>) Overall PAE; (<b>c</b>) AM-AM characteristics.</p>
Full article ">Figure 3
<p>Large signal performance comparison with and without the dynamic power dividing network.</p>
Full article ">Figure 4
<p>Design parameters of the interstage transformer: (<b>a</b>) Self inductance of the driver primary turn, carrier path secondary turn, and peaking path secondary turn; (<b>b</b>) Coupling coefficients.</p>
Full article ">Figure 5
<p>The proposed DPA load network: (<b>a</b>) Lumped model equivalent circuit; (<b>b</b>) Simulated impedances at the power combining node for 24–32 GHz.</p>
Full article ">Figure 6
<p>Practical implementation of the DPA load network: (<b>a</b>) Transformer equivalent circuit conversion; (<b>b</b>) Simulated impedances at the transistor current source planes for 24–32 GHz.</p>
Full article ">Figure 7
<p>Full schematics of the DPAs with the following: (<b>a</b>) The proposed dynamic power dividing network; (<b>b</b>) A conventional dual-driven DPA using a hybrid coupler.</p>
Full article ">Figure 8
<p>Micro-photograph of the implemented DPA IC.</p>
Full article ">Figure 9
<p>Simulated and measured S-parameters of the proposed DPA.</p>
Full article ">Figure 10
<p>Measurement results using a CW signal at 23.5–27.5 GHz: (<b>a</b>) Power gain; (<b>b</b>) PAE.</p>
Full article ">
32 pages, 2926 KiB  
Article
Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif
by Ilsun You, Jiyoon Kim, I Wayan Adi Juliawan Pawana and Yongho Ko
Appl. Sci. 2024, 14(21), 9726; https://doi.org/10.3390/app14219726 - 24 Oct 2024
Viewed by 743
Abstract
The rapid evolution of mobile and optical communication technologies is driving the transition from 5G to 6G networks. This transition inevitably brings about changes in authentication scenarios, as new security demands emerge that go beyond the capabilities of existing frameworks. Therefore, it is [...] Read more.
The rapid evolution of mobile and optical communication technologies is driving the transition from 5G to 6G networks. This transition inevitably brings about changes in authentication scenarios, as new security demands emerge that go beyond the capabilities of existing frameworks. Therefore, it is necessary to address these evolving requirements and the associated key challenges: ensuring Perfect Forward Secrecy (PFS) to protect communications even if long-term keys are compromised and integrating Post-Quantum Cryptography (PQC) techniques to defend against the threats posed by quantum computing. These are essential for both radio and optical communications, which are foundational elements of future 6G infrastructures. The DMRN Protocol, introduced in 2022, represents a major advancement by offering both PFS and PQC while maintaining compatibility with existing 3rd Generation Partnership Project (3GPP) standards. Given the looming quantum-era challenges, it is imperative to analyze the protocol’s security architecture through formal verification. Accordingly, we formally analyze the DMRN Protocol using SVO logic and ProVerif to assess its effectiveness in mitigating attack vectors, such as malicious or compromised serving networks (SNs) and home network (HN) masquerading. Our research found that the DMRN Protocol has vulnerabilities in key areas such as mutual authentication and key exchange. In light of these findings, our study provides critical insights into the design of secure and quantum-safe authentication protocols for the transition to 6G networks. Furthermore, by identifying the vulnerabilities in and discussing countermeasures to address the DMRN Protocol, this study lays the groundwork for the future standardization of secure 6G Authentication and Key Agreement protocols. Full article
(This article belongs to the Special Issue Intelligent Optical Signal Processing in Optical Fiber Communication)
Show Figures

Figure 1

Figure 1
<p>The 5G authentication protocols.</p>
Full article ">Figure 2
<p>DMRN Protocol.</p>
Full article ">Figure 3
<p>Formal verification categorization.</p>
Full article ">Figure 4
<p>Inference step of SVO logic.</p>
Full article ">Figure 5
<p>ProVerif structure.</p>
Full article ">Figure 6
<p>DMRN ProVerif architecture.</p>
Full article ">Figure 7
<p>DMRN flowchart diagram.</p>
Full article ">Figure A1
<p>(S1) Verification result of ProVerif of DMRN Protocol.</p>
Full article ">Figure A2
<p>(S2) Verification result of ProVerif.</p>
Full article ">Figure A3
<p>(S3) Verification result of ProVerif.</p>
Full article ">Figure A4
<p>(S4) Verification result of ProVerif of DMRN Protocol.</p>
Full article ">Figure A5
<p>(S1) attack process.</p>
Full article ">Figure A6
<p>(S2) attack process.</p>
Full article ">Figure A7
<p>(S3) attack process.</p>
Full article ">
16 pages, 3844 KiB  
Article
Impact of DBD Plasma Jet Treatment on the Enamel Surface of Primary Teeth
by Michał Kwiatkowski, Joanna Pawłat, Agnieszka Starek-Wójcicka, Marta Krajewska, Piotr Terebun, Dawid Zarzeczny, Monika Machoy, Agnieszka Mazur-Lesz, Narumol Matsuyama, Tomoyuki Murakami, Nobuya Hayashi and Elżbieta Grządka
Materials 2024, 17(21), 5173; https://doi.org/10.3390/ma17215173 - 24 Oct 2024
Viewed by 600
Abstract
The impact of cold atmospheric plasma (CAP) treatment on the enamel of twelve primary teeth (incisors, canines, and molars) collected from six children was examined in order to evaluate the possibility of using the CAP technique in dental applications. A radio-frequency dielectric barrier [...] Read more.
The impact of cold atmospheric plasma (CAP) treatment on the enamel of twelve primary teeth (incisors, canines, and molars) collected from six children was examined in order to evaluate the possibility of using the CAP technique in dental applications. A radio-frequency dielectric barrier discharge (DBD) plasma jet operating at a voltage of 3.25 kV using a mixture of helium and oxygen as the working gas was used for the generation of plasma as part of the electro-technological method for the treatment of biological material. The plasma exposure time for the primary teeth was 5, 10, and 20 min. The properties of tooth enamel (color, contact angles, surface roughness, surface topography, elemental composition) were examined before (control) and after the plasma treatment. As shown by the results, the plasma treatment time is a key parameter that can induce desired features, such as whitening or improved wettability. However, with prolonged plasma treatment (20 min), the enamel surface may be permanently damaged. The cold-plasma-treated samples were characterized by a higher value of the brightness L* parameter and thus a lighter color, compared to the CAP-untreated teeth. It was also evidenced that the plasma treatment increased the hydrophilicity of tooth surfaces, and the contact angles effectively decreased with the time of the CAP treatment. The tooth surface also became much more heterogeneous and rough with much greater amplitudes in heights. The surface of the primary teeth after the CAP treatment lost its homogeneity, as evidenced by the SEM micrographs. The analysis of the elemental composition revealed only minor changes after the plasma process, which may suggest that the observed morphological changes in the enamel surface are mainly physical and are not a consequence of chemical reactions between the enamel and the reactive components of the cold plasma. Plasma treatment of teeth opens up new possibilities of using this method as an alternative to whitening or pre-treatment before other dental procedures. Full article
Show Figures

Figure 1

Figure 1
<p>Scheme of a plasma reactor with dielectric barrier discharge. (<b>A</b>) Configuration of two electrodes; (<b>B</b>) Voltage characteristics of the power supply.</p>
Full article ">Figure 2
<p>Photos of drops before and after plasma treatment.</p>
Full article ">Figure 3
<p>WCA of individual samples before and after CAP for selected treatment times.</p>
Full article ">Figure 4
<p>The most representative micrographs of surfaces of teeth before and after the plasma treatment.</p>
Full article ">Figure 5
<p>The most representative images of tooth surfaces before and after the CAP treatment (the colors represent the topography of the surface: the higher the peaks, the more red; the deeper the valleys, the more navy blue).</p>
Full article ">
23 pages, 3739 KiB  
Article
The Shared Experience Actor–Critic (SEAC) Approach for Allocating Radio Resources and Mitigating Resource Collisions in 5G-NR-V2X Mode 2 Under Aperiodic Traffic Conditions
by Sawera Aslam, Daud Khan and KyungHi Chang
Sensors 2024, 24(20), 6769; https://doi.org/10.3390/s24206769 - 21 Oct 2024
Viewed by 641
Abstract
5G New Radio (NR)-V2X, standardized by 3GPP Release 16, includes a distributed resource allocation Mode, known as Mode 2, that allows vehicles to autonomously select transmission resources using either sensing-based semi-persistent scheduling (SB-SPS) or dynamic scheduling (DS). In unmanaged 5G-NR-V2X scenarios, SB-SPS loses [...] Read more.
5G New Radio (NR)-V2X, standardized by 3GPP Release 16, includes a distributed resource allocation Mode, known as Mode 2, that allows vehicles to autonomously select transmission resources using either sensing-based semi-persistent scheduling (SB-SPS) or dynamic scheduling (DS). In unmanaged 5G-NR-V2X scenarios, SB-SPS loses effectiveness with aperiodic and variable data. DS, while better for aperiodic traffic, faces challenges due to random selection, particularly in high traffic density scenarios, leading to increased collisions. To address these limitations, this study models the Cellular V2X network as a decentralized multi-agent networked Markov decision process (MDP), where each vehicle agent uses the Shared Experience Actor–Critic (SEAC) technique to optimize performance. The superiority of SEAC over SB-SPS and DS is demonstrated through simulations, showing that the SEAC with an N-step approach achieves an average improvement of approximately 18–20% in enhancing reliability, reducing collisions, and improving resource utilization under high vehicular density scenarios with aperiodic traffic patterns. Full article
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Resource selection procedure in 5G-NR-V2X Mode 2.</p>
Full article ">Figure 2
<p>Impact of varying traffic types in 5G-NR-V2X Mode 2.</p>
Full article ">Figure 3
<p>Framework for resource allocation strategies in 5G-NR-V2X Mode 2.</p>
Full article ">Figure 4
<p>Network structure and flow of the SEAC algorithm.</p>
Full article ">Figure 5
<p>Probability of resource collision (PRC) relative to the channel busy ratio (CBR).</p>
Full article ">Figure 6
<p>Probability of reception (PoR) vs. the number of vehicles per mile/lane.</p>
Full article ">Figure 7
<p>Radio resource utilization (RRU) across varying vehicular densities.</p>
Full article ">Figure 8
<p>A2C model training and testing datasets. (<b>a</b>) A2C Model Performance on Training Dataset. (<b>b</b>) A2C Model Performance on Testing Dataset.</p>
Full article ">Figure 9
<p>A2C model loss analysis. (<b>a</b>) Actor vs. critic loss. (<b>b</b>) Reward performance.</p>
Full article ">
16 pages, 12318 KiB  
Article
Digital Traffic Lights: UAS Collision Avoidance Strategy for Advanced Air Mobility Services
by Zachary McCorkendale, Logan McCorkendale, Mathias Feriew Kidane and Kamesh Namuduri
Drones 2024, 8(10), 590; https://doi.org/10.3390/drones8100590 - 17 Oct 2024
Viewed by 674
Abstract
With the advancing development of Advanced Air Mobility (AAM), there is a collaborative effort to increase safety in the airspace. AAM is an advancing field of aviation that aims to contribute to the safe transportation of goods and people using aerial vehicles. When [...] Read more.
With the advancing development of Advanced Air Mobility (AAM), there is a collaborative effort to increase safety in the airspace. AAM is an advancing field of aviation that aims to contribute to the safe transportation of goods and people using aerial vehicles. When aerial vehicles are operating in high-density locations such as urban areas, it can become crucial to incorporate collision avoidance systems. Currently, there are available pilot advisory systems such as Traffic Collision and Avoidance Systems (TCAS) providing assistance to manned aircraft, although there are currently no collision avoidance systems for autonomous flights. Standards Organizations such as the Institute of Electrical and Electronics Engineers (IEEE), Radio Technical Commission for Aeronautics (RTCA), and General Aviation Manufacturers Association (GAMA) are working to develop cooperative autonomous flights using UAS-to-UAS Communication in structured and unstructured airspaces. This paper presents a new approach for collision avoidance strategies within structured airspace known as “digital traffic lights”. The digital traffic lights are deployed over an area of land, controlling all UAVs that enter a potential collision zone and providing specific directions to mitigate a collision in the airspace. This strategy is proven through the results demonstrated through simulation in a Cesium Environment. With the deployment of the system, collision avoidance can be achieved for autonomous flights in all airspaces. Full article
Show Figures

Figure 1

Figure 1
<p>The air cell intersection for digital traffic lights.</p>
Full article ">Figure 2
<p>Air cell diagram.</p>
Full article ">Figure 3
<p>Data exchange for digital traffic management in the airspace.</p>
Full article ">Figure 4
<p>Block diagram scheme for the system.</p>
Full article ">Figure 5
<p>Octagon plot with corner ID.</p>
Full article ">Figure 6
<p>Cell center points plot.</p>
Full article ">Figure 7
<p>The generated intersection.</p>
Full article ">Figure 8
<p>The air cell intersection—overhead view.</p>
Full article ">Figure 9
<p>The air cell intersection—ground level view.</p>
Full article ">Figure 10
<p>The air cell intersection—close-up view.</p>
Full article ">
24 pages, 2431 KiB  
Article
Identifying Tampered Radio-Frequency Transmissions in LoRa Networks Using Machine Learning
by Nurettin Selcuk Senol, Amar Rasheed, Mohamed Baza and Maazen Alsabaan
Sensors 2024, 24(20), 6611; https://doi.org/10.3390/s24206611 - 14 Oct 2024
Viewed by 669
Abstract
Long-range networks, renowned for their long-range, low-power communication capabilities, form the backbone of many Internet of Things systems, enabling efficient and reliable data transmission. However, detecting tampered frequency signals poses a considerable challenge due to the vulnerability of LoRa devices to radio-frequency interference [...] Read more.
Long-range networks, renowned for their long-range, low-power communication capabilities, form the backbone of many Internet of Things systems, enabling efficient and reliable data transmission. However, detecting tampered frequency signals poses a considerable challenge due to the vulnerability of LoRa devices to radio-frequency interference and signal manipulation, which can undermine both data integrity and security. This paper presents an innovative method for identifying tampered radio frequency transmissions by employing five sophisticated anomaly detection algorithms—Local Outlier Factor, Isolation Forest, Variational Autoencoder, traditional Autoencoder, and Principal Component Analysis within the framework of a LoRa-based Internet of Things network structure. The novelty of this work lies in applying image-based tampered frequency techniques with these algorithms, offering a new perspective on securing LoRa transmissions. We generated a dataset of over 26,000 images derived from real-world experiments with both normal and manipulated frequency signals by splitting video recordings of LoRa transmissions into frames to thoroughly assess the performance of each algorithm. Our results demonstrate that Local Outlier Factor achieved the highest accuracy of 97.78%, followed by Variational Autoencoder, traditional Autoencoder and Principal Component Analysis at 97.27%, and Isolation Forest at 84.49%. These findings highlight the effectiveness of these methods in detecting tampered frequencies, underscoring their potential for enhancing the reliability and security of LoRa networks. Full article
(This article belongs to the Special Issue AI-Driven Cybersecurity in IoT-Based Systems)
Show Figures

Figure 1

Figure 1
<p>The number of active connections for both Internet of Things and non-IoT devices worldwide from 2010 to 2025 is measured in billions [<a href="#B3-sensors-24-06611" class="html-bibr">3</a>].</p>
Full article ">Figure 2
<p>Experimental setup for data collection using HackRF for frequency manipulation. The system consists of two MKRWAN 1310 devices for wireless signal transmission and reception, interfaced with computers for monitoring and control [<a href="#B23-sensors-24-06611" class="html-bibr">23</a>].</p>
Full article ">Figure 3
<p>HackRf have been utilized for manipulation of the system in <a href="#sensors-24-06611-f002" class="html-fig">Figure 2</a>. A software-defined radio (SDR) device, the HackRF, can send and receive radio signals in the 1 MHz to 6 GHz frequency range.</p>
Full article ">Figure 4
<p>Flowchart depicting the methodology for image-based anomaly detection using multiple machine learning models.</p>
Full article ">Figure 5
<p>Anomaly scores distribution for isolation forest.</p>
Full article ">Figure 6
<p>Block diagram of a jamming signal generation flowgraph in GNU Radio.</p>
Full article ">Figure 7
<p>Interface of the jamming signal generator.</p>
Full article ">Figure 8
<p>Anomaly scores distribution for LOF.</p>
Full article ">Figure 9
<p>Confusion matrices showing the performance of five anomaly detection algorithms—(<b>a</b>) Autoencoder, (<b>b</b>) Isolation Forest, (<b>c</b>) Variational Autoencoder, (<b>d</b>) LOF, and (<b>e</b>) Principal Component Analysis (PCA)—in classifying normal and anomalous data. Darker shades represent correct classifications (true positives and true negatives), while lighter shades show misclassifications (false positives and false negatives).</p>
Full article ">Figure 10
<p>ROC curves for traditional (<b>a</b>) autoencoder, (<b>b</b>) isolation forest and (<b>c</b>) variational autoencoder.</p>
Full article ">Figure 11
<p>ROC curves for (<b>a</b>) LOF and (<b>b</b>) Principal Component Analysis (PCA).</p>
Full article ">
22 pages, 5856 KiB  
Article
Assessment of FY-3E GNOS II Radio Occultation Data Using an Improved Three-Cornered Hat Method
by Jiahui Liang, Congliang Liu, Xi Wang, Xiangguang Meng, Yueqiang Sun, Mi Liao, Xiuqing Hu, Wenqiang Lu, Jinsong Wang, Peng Zhang, Guanglin Yang, Na Xu, Weihua Bai, Qifei Du, Peng Hu, Guangyuan Tan, Xianyi Wang, Junming Xia, Feixiong Huang, Cong Yin, Yuerong Cai and Peixian Liadd Show full author list remove Hide full author list
Remote Sens. 2024, 16(20), 3808; https://doi.org/10.3390/rs16203808 - 13 Oct 2024
Viewed by 910
Abstract
The spatial–temporal sampling errors arising from the differences in geographical locations and measurement times between co-located Global Navigation Satellite System (GNSS) radio occultation (RO) and radiosonde (RS) data represent systematic errors in the three-cornered hat (3CH) method. In this study, we propose a [...] Read more.
The spatial–temporal sampling errors arising from the differences in geographical locations and measurement times between co-located Global Navigation Satellite System (GNSS) radio occultation (RO) and radiosonde (RS) data represent systematic errors in the three-cornered hat (3CH) method. In this study, we propose a novel spatial–temporal sampling correction method to mitigate the sampling errors associated with both RO–RS and RS–model pairs. We analyze the 3CH processing chain with this new correction method in comparison to traditional approaches, utilizing Fengyun-3E (FY-3E) GNSS Occultation Sounder II (GNOS II) RO data, atmospheric models, and RS datasets from the Hailar and Xisha stations. Overall, the results demonstrate that the improved 3CH method performs better in terms of spatial–temporal sampling errors and the variances of atmospheric parameters, including refractivity, temperature, and specific humidity. Subsequently, we assess the error variances of the FY-3E GNOS II RO, RS and model atmospheric parameters in China, in particular the northern China and southern China regions, based on large ensemble datasets using the improved 3CH data processing chain. The results indicate that the FY-3E GNOS II BeiDou navigation satellite system (BDS) RO and Global Positioning System (GPS) RO show good consistency, with the average error variances of refractivity, temperature, and specific humidity being less than 1.12%2, 0.13%2, and 700%2, respectively. A comparison of the datasets from northern and southern China reveals that the error variances for refractivity are smaller in northern China, while temperature and specific humidity exhibit smaller error variances in southern China, which is attributable to the differing climatic conditions. Full article
(This article belongs to the Special Issue International GNSS Service Validation, Application and Calibration)
Show Figures

Figure 1

Figure 1
<p>The spatial distribution of radiosonde stations. Diamond symbols represent radiosonde stations, and the color of the symbols indicates the number of occultations co-located with each station. The two square symbols represent the northernmost Hailar station (49.25°N, 119.70°E) and the southernmost Xisha station (16.83°N, 112.33°E), respectively, and the solid blue line is the north–south dividing line.</p>
Full article ">Figure 2
<p>The number of FY-3E GNOS II BDS and GPS occultations co-located with each radiosonde station: blue bars indicate BDS data, and green bars represent GPS data. The dataset spans from 1 September 2022 to 31 August 2023.</p>
Full article ">Figure 3
<p>Statistical comparison of refractivity, temperature, and specific humidity profiles of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 located at the Xisha and Hailar radiosonde stations. The ensemble of data span from 1 September 2022 to 31 August 2023 and the statistics include the mean (solid line) and the standard deviation (“std”; dashed line), respectively.</p>
Full article ">Figure 4
<p>Refractivity error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Hailar station for different sampling correction schemes.</p>
Full article ">Figure 5
<p>Refractivity error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Xisha station for different sampling correction schemes.</p>
Full article ">Figure 6
<p>Temperature error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Hailar station for different sampling correction schemes.</p>
Full article ">Figure 7
<p>Temperature error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Xisha station for different sampling correction schemes.</p>
Full article ">Figure 8
<p>Specific humidity error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Hailar station for different sampling correction schemes.</p>
Full article ">Figure 9
<p>Specific humidity error variances (percentage square) of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets at the Xisha station for different sampling correction schemes.</p>
Full article ">Figure 10
<p>Estimated error variances of refractivity, temperature, and specific humidity of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets in China (percentage squared).</p>
Full article ">Figure 11
<p>Estimated error variances of refractivity, temperature, and specific humidity of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets in southern China (percentage squared).</p>
Full article ">Figure 12
<p>Estimated error variances of refractivity, temperature, and specific humidity of (<b>a</b>–<b>c</b>) RO, (<b>d</b>–<b>f</b>) RS, and (<b>g</b>–<b>i</b>) ERA5 datasets in northern China (percentage squared).</p>
Full article ">
Back to TopTop