فهرست مقالات dsfdsf xcsdef


  • مقاله

    1 - Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops
    Majlesi Journal of Telecommunication Devices , شماره 30 , سال 8 , بهار 2019
    In this paper, the effects of the delay caused by the frequency change in self-priming locking oscillators are investigated in the phase lock loops. Self-injected locking phenomena in oscillators are used to reduce phase noise and more sustainability. Instead of using a چکیده کامل
    In this paper, the effects of the delay caused by the frequency change in self-priming locking oscillators are investigated in the phase lock loops. Self-injected locking phenomena in oscillators are used to reduce phase noise and more sustainability. Instead of using an external signal in an intruder lock, part of the output signal itself is returned to the oscillator again. In this case, the time required to restore the circuit after the injection of the external frequency is important, especially when this oscillator is used in the shape of a phase lock loop. This delay has the ability to unstable the phase lock loop. In this paper, the stability requirements for phase locking loops with delayed oscillators are fully investigated and the results are validated by simulation. پرونده مقاله

  • مقاله

    2 - Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder
    Majlesi Journal of Telecommunication Devices , شماره 39 , سال 10 , تابستان 2021
    In modern radars, the design is such that radar vulnerability to noise disturbance is significantly reduced. This dramatic decrease is due to the fact that radars are always trying to increase their capability against the heavy clutter they receive from the ground. Rada چکیده کامل
    In modern radars, the design is such that radar vulnerability to noise disturbance is significantly reduced. This dramatic decrease is due to the fact that radars are always trying to increase their capability against the heavy clutter they receive from the ground. Radars use antenna sidelobes to reduce clutter. By reducing the antenna sidelobes, the vulnerability of the radar to the heavy clutches of the sidelobes is reduced, which also reduces the vulnerability to sidelobe disturbance. In this article, we try to examine the reduction of clutter causing the reduction of vulnerability to disorder. پرونده مقاله

  • مقاله

    3 - Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM
    Majlesi Journal of Telecommunication Devices , شماره 33 , سال 9 , زمستان 2020
    The neural network learning vector quantization can be understood as a special case of an artificial neural network, more precisely, a learning-based approach - winner takes all. In this paper, we investigate this algorithm and find that this algorithm is a supervised v چکیده کامل
    The neural network learning vector quantization can be understood as a special case of an artificial neural network, more precisely, a learning-based approach - winner takes all. In this paper, we investigate this algorithm and find that this algorithm is a supervised version of the vector quantization algorithm, which should check which input belongs to the class (to update) and improve it according to the distance and class in question. To give. A common problem with other neural network algorithms is the speed vector learning algorithm, which has twice the speed of synchronous updating, which performs better where we need fast enough. The simulation results show the same problem and it is shown that in MATLAB software the learning vector quantization simulation speed is higher than the self-organized neural network. پرونده مقاله

  • مقاله

    4 - Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals
    Majlesi Journal of Telecommunication Devices , شماره 33 , سال 9 , زمستان 2020
    The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden چکیده کامل
    The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden for others. There are many benchmarks for evaluating insertion and extraction algorithms that, by performing multiple attacks on an algorithm, increase the ability of the method. (Resilience, Transparency and Capacity for Use). Although the LSB method is superior to other encryption techniques, it is highly vulnerable to all kinds of attacks and attacks, including Additive White Gaussian Noise. This article introduces a new idea for Watermarking voice data encryption, based on the LSB method, which follows similar bits with bits instead of pasting information. The message will be in 16-bit samples, given the introduction of the distortion reduction algorithm for the changes we have made to the signal bits for the receiver's awareness, which could be a new way of causing F Of its resistance additive white Gaussian noise and LSB standard will also improve the transparency of the procedure and the method for reducing the capacity has been used. پرونده مقاله

  • مقاله

    5 - Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data
    Majlesi Journal of Telecommunication Devices , شماره 34 , سال 9 , بهار 2020
    The primary task of systems with real-time signal processing is to identify radars in the operating environment and to classify them based on prior system learning and to perform high-speed, real-time operations, especially where the received signal is an immediate thre چکیده کامل
    The primary task of systems with real-time signal processing is to identify radars in the operating environment and to classify them based on prior system learning and to perform high-speed, real-time operations, especially where the received signal is an immediate threat such as missiles and requires war systems. Electronics should respond as soon as possible as an alarm. The purpose of this study is to use the results of this research to classify the information extracted by radar interception systems, which is achieved after the input signal selection stage and the correct selection of classification algorithms, and the other is accelerated by the learning vector quantization method. In this paper, we have presented a numerical method called a learning vector quantization, a method for data retrieval. In this method, the neural network algorithms are first organized to generate the required coding, and in the next step the digital vector learning algorithms will be created to retrieve the data. In this article, we will also consider each database benchmark. The implications of the usual implementation of universal command and control practices and their use of conventional restraint methods are a clear indication. پرونده مقاله

  • مقاله

    6 - The Use of Electronic Warfare and Information Signaling in Network-based Warfare
    Majlesi Journal of Telecommunication Devices , شماره 34 , سال 9 , بهار 2020
    Network- based warfare is known as the symbolic element of the Age Information War. The network-based approach has been built around information sharing, and this information sharing in the battle is possible through the networking of all elements on the battlefield. A چکیده کامل
    Network- based warfare is known as the symbolic element of the Age Information War. The network-based approach has been built around information sharing, and this information sharing in the battle is possible through the networking of all elements on the battlefield. A coherent networking force improves the quality of information sharing and, as a result, survival and command speed, improves the efficiency of battlefield elements, saves time and resources, and adds value for combat capability. There are various levels, including the lowest level, that is, an infantry soldier, which ultimately results in an amazing increase in the effectiveness of combat operations. Recent developments in microelectronics, mechanics, and ergonomics, as well as the movement and return, the importance and emphasis from tanks and missiles to soldiers, have examined future soldier projects. Electronic science has led to the integration of small individuals with advanced technology equipment and infantry soldiers with advanced communication, command and control (C3) systems, or communications, command, control, computer and information (C4I). All this was to try to see the infantry soldier as a complete unit instead of a small part of the great force. Each country has its own special soldier project. Considering the importance of the subject, identifying the opportunities and threats facing the Iranian warrior is necessary. In this study, we will study the future soldier project in advanced and sensitive countries and focus on communication and Network- based systems. پرونده مقاله

  • مقاله

    7 - Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack
    Majlesi Journal of Telecommunication Devices , شماره 38 , سال 10 , بهار 2021
    With the end of World War II and the rapid advent of war technology, wars have shifted to electronic warfare, and today a nation can win wars that are more powerful in the field of telecommunications and electronic warfare. The purpose of this article is to promote new چکیده کامل
    With the end of World War II and the rapid advent of war technology, wars have shifted to electronic warfare, and today a nation can win wars that are more powerful in the field of telecommunications and electronic warfare. The purpose of this article is to promote new content in the field of electronic warfare and we try to introduce and introduce new techniques of electronic attacks on victim radar systems. With the exception of false targets created by point or sweep jams, most false targets are created with automatic responders or repeaters. An automatic response generator for producing false targets includes a receiver, a variable delay circuit, a signal generator, a power amplifier, and an antenna. Upon receiving a pulse from the threatening radar, the transponder waits for the time corresponding to the target man's distance to the false target, and then sends a similar echo signal to the radar. . As soon as the pulse is received from the threatening radar, the transponder delays it sufficiently to cause the difference in distance to create a false target. Then, a pulse similar to the RF echo pulse of the radar is returned to it. پرونده مقاله

  • مقاله

    8 - Find the Best Answer in the Conflict Scenario of Fighters with Electronic Warfare and a set of Defense Radars without Having Complete Information from Each other
    Majlesi Journal of Telecommunication Devices , شماره 38 , سال 10 , بهار 2021
    Choosing a strategy for electronic conflicts in the field of action and situations similar to the problem scenario is a matter of experience and will not necessarily be the best possible choice. Therefore, the importance of providing a reasonable and measurable decision چکیده کامل
    Choosing a strategy for electronic conflicts in the field of action and situations similar to the problem scenario is a matter of experience and will not necessarily be the best possible choice. Therefore, the importance of providing a reasonable and measurable decision-making method in choosing a strategy in real conditions is quite clear. One of the points that can be deduced from the study of common methods and techniques in electronic warfare is that none of these methods are considered absolute winners and the holder can’t consider himself the undisputed winner of the field. Because there is more or less the opposite of any technique. Using a method or tool in a situation may be very effective, but with a change of method or change of tool by the competitor, it becomes a weakness. Therefore, in this battle, the correct and timely use of each technique, and with full knowledge of the opponent and in accordance with the actions performed by him can be considered a factor of success and all useful tools in this field can be used. One of the most useful tools in the field of strategic decision analysis is game theory. With the help of this mathematical tool, the decision-making process between two or more decision-makers can be examined and the results can be analyzed. It is also possible to observe the effect of various parameters involved in the result of the problem, and to plan the result in the desired direction. In this paper, selecting the best response in different stages of the conflict to solve various such problems is achieved and the main purpose is to present a new approach to adopt a strategy and select the radar and disruptive coping technique in case of incomplete information from each other, using a method It is mathematical and algorithmic, so that we have a better performance in the benefit function of the parties. پرونده مقاله

  • مقاله

    9 - Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP
    Majlesi Journal of Telecommunication Devices , شماره 45 , سال 12 , زمستان 2023
    Information security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that چکیده کامل
    Information security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that aims to hide data so that no data appears to be hidden. The principle of Steganography is to use spaces from the information carrier that do not harm the identity of the carrier. By Steganography information from unauthorized recipients, the information is hidden and hidden inside it without harming the signals. This information may be transmitted around us and wherever any file is sent. It may contain very dangerous content for the security of the space in which we live. Audio signals are very used for steganography because Digital audio signals have higher redundancy and higher data transfer speeds, making them suitable for use as a cover. The LPC10, CELP, and MELP audio standards are widely used in audio and speech processing and are powerful high-quality speech coding methods that provide highly accurate estimates of audio parameters and are widely used in communications. Therefore, since considering that these audio standards are used in commercial and military telecommunication systems, they can be considered a suitable platform for sending the following message of audio content. We try to carefully examine these standards and the audio Steganography done in these standards. پرونده مقاله

  • مقاله

    10 - Comparison of Standards Digital Audio Encoders LPC, CELP, and MELP based on the Quality and Complexity of the Content in the Transmitted
    Majlesi Journal of Telecommunication Devices , شماره 48 , سال 12 , پاییز 2023
    This article compares the quality and complexity of LPC, CELP, and MELP standard audio encoders. These standards are based on linear predictive and are used in sound (speech) processing. These standards are powerful high-quality speech coding methods that provide highly چکیده کامل
    This article compares the quality and complexity of LPC, CELP, and MELP standard audio encoders. These standards are based on linear predictive and are used in sound (speech) processing. These standards are powerful high-quality speech coding methods that provide highly accurate estimates of audio parameters and are widely used in the commercial (mobile) and military (NATO) communications industries. To compare LPC, CELP, and MELP audio encoders in two male and female voice modes and four voice models: quiet, Audio recorded without sound by the microphone, MCE, office, and two noise models 1% and 05% were used. The simulation results show the complexity of MELP is higher than LPC and CELP in terms of both processor and memory requirements. The MELP analyzer requires 72% of its total processing time. This additional memory is, of course, due to the vector quantization tables that MELP uses for the linear spectral frequencies (LSFs) and the Fourier magnitude. Also, according to the quality comparison test using the MOS index, MELP has the highest score, followed by CELP and LPC. پرونده مقاله