فهرست مطالب

Majlesi Journal of Telecommunication Devices
Volume:9 Issue: 2, Jun 2020

  • تاریخ انتشار: 1399/04/21
  • تعداد عناوین: 6
|
  • Teimour Tajdari Pages 53-57

    IIR and FIR filters are widely used in digital signal processing. The choice of one of these methods depends on the design requirements. In this paper, the two filter design methods are compared in audio equalizer system design. Audio equalization systems are used in electric guitars, pianos, and other electric instruments. It is also an integral part of audio players, audio amplifiers and sound recording systems. The design includes a six-band amplifier that can be used to modify the signal amplitude over the entire audio frequency spectral range. Digital filters were transformed from Chebyshev analog prototypes using Bilinear Transformation Procedures on IIR filters. The Window method was used to design the FIR filter with the same specifications as the IIR filter. The results show that IIR and FIR can be used to design equalizer systems. But one has advantages over the other. Filters can be designed with low order IIR methods, but the FIR requires high order filter designs. On the other hand, in the FIR filter design method, the linearity of the phase response is much better.

    Keywords: IIR filter, FIR filter, audio equalizer, bilinear method, window method
  • Majid Mobini Pages 59-64

    In a critical situation such as a flood, storm, and earthquake, where the communication infrastructures have been seriously destroyed, Device to Device (D2D) communications can be connected without the assistance of any operators. In addition, Equip the existing D2D systems to provide high reliability, robustness, and other specific needs of the emergency services during the disasters seems to be unavoidable. In this paper, an Orthogonal Frequency Division Multiplexing based Differential Chaos Shift Keying system (OFDM-DCSK) based approach is presented to overcome the problems in emergency situations. An OFDM-DCSK receiver needs no channel estimation for data detection. Moreover, the combination of a blind power allocation scheme with a non-coherent receiver is very desirable because these techniques save power, without the need for communication infrastructure like Base Stations (BSs). On the other hand, the proposed system benefits from the additional advantages of DCSK-based systems such as reliability and robustness. We assign power coefficients to sub-carriers to guarantee a given level of outage probability. To this aim, we calculate the outage probability for a power allocated OFDM-DCSK system using instantaneous signal-to-noise ratio expression. The power that guarantees a given level of outage probability can be calculated by a simple numerical algorithm. Simulation results validate the feasibility of the proposed scheme.

    Keywords: Blind power allocation, Emergency communications, OFDM-DCSK, Outage probability
  • Saeed Talati*, MohammadReza Hassani Ahangar Pages 65-69

    The primary task of systems with real-time signal processing is to identify radars in the operating environment and to classify them based on prior system learning and to perform high-speed, real-time operations, especially where the received signal is an immediate threat such as missiles and requires war systems. Electronics should respond as soon as possible as an alarm. The purpose of this study is to use the results of this research to classify the information extracted by radar interception systems, which is achieved after the input signal selection stage and the correct selection of classification algorithms, and the other is accelerated by the learning vector quantization method. In this paper, we have presented a numerical method called a learning vector quantization, a method for data retrieval. In this method, the neural network algorithms are first organized to generate the required coding, and in the next step the digital vector learning algorithms will be created to retrieve the data. In this article, we will also consider each database benchmark. The implications of the usual implementation of universal command and control practices and their use of conventional restraint methods are a clear indication.

    Keywords: LVQ, SOM, PCA, Radar
  • Farbod Setoudeh*, MohammadMatin Dezhdar Pages 71-79

    Many researchers have done a lot on memcapacitor emulator circuits. It is due to the point that memcapacitor as a two-terminal element has not existed yet. These circuits must be developed their use in other applications and scientific fields, consequently many emulators have been designed. The configuration of the proposed memcapacitor structure in this paper is very memorable due to the possibility of fabrication of a completely integrated proposed circuit. In this paper initially, the physical model implementation of memcapacitor has been simulated by Advance Design System (ADS) software, and then a new structure of memcapacitor emulator operating up to 256 Hz with available electronic devices is proposed. Experimental and practical results show the behaviour of memcapacitor as a memory device.

    Keywords: Memcapacitor, Emulator, Electronic Device, Advance Design System
  • Sahar Nassirpour*, Shayesteh Tabatabaei Pages 81-91

    Wireless sensor networks include sensor nodes communicating each other through wireless links for effective data collection and routing. These wireless nodes are of limited processing power, memory, communication range, channel band width, and battery capacity, from among which the most important is limited capacity of batteries which are unchangeable, under many conditions. The limitation encourages designing efficient protocols in terms of energy consumption. Using clustering is one of the methods to optimize energy consumption. On the other hand, a technical challenge in successful expansion of wireless sensor networks and their exploitation is effective usage made of limited channel band width. To overcome the challenge, one of the methods is dividing schedule of channel usage through TDMA method (Time-Division Multiple Access) so that each cluster head node creates a schedule for transmission of data from member nodes of the cluster through TDMA. Accordingly, in the paper, a distributed routing protocol based on clustering through usage of mimetic algorithm and time-sharing approach is proposed; and, it is capable of optimizing energy consumption and throughput rate, as well as reducing delay. The simulation results are indicative of better performance of proposed method, compared to IEEE 802.15.4 Standard.

    Keywords: ireless sensor network, Clustering, Memetic algorithm, Time-division multiple access, IEEE 802.15.4 Standard
  • MohammadReza Hassani Ahangar, Saeed Talati*, Ali Rahmati, Hamid Heidari Pages 93-97

    Network- based warfare is known as the symbolic element of the Age Information War. The network-based approach has been built around information sharing, and this information sharing in the battle is possible through the networking of all elements on the battlefield. A coherent networking force improves the quality of information sharing and, as a result, survival and command speed, improves the efficiency of battlefield elements, saves time and resources, and adds value for combat capability. There are various levels, including the lowest level, that is, an infantry soldier, which ultimately results in an amazing increase in the effectiveness of combat operations. Recent developments in microelectronics, mechanics, and ergonomics, as well as the movement and return, the importance and emphasis from tanks and missiles to soldiers, have examined future soldier projects. Electronic science has led to the integration of small individuals with advanced technology equipment and infantry soldiers with advanced communication, command and control (C3) systems, or communications, command, control, computer and information (C4I). All this was to try to see the infantry soldier as a complete unit instead of a small part of the great force. Each country has its own special soldier project. Considering the importance of the subject, identifying the opportunities and threats facing the Iranian warrior is necessary. In this study, we will study the future soldier project in advanced and sensitive countries and focus on communication and Network- based systems.

    Keywords: Network- based warfare, information warfare, electronic warfare, training, upgrading of electronic collection systems