Subjects -> ELECTRONICS (Total: 207 journals)
Similar Journals
 International Journal of Electronics and TelecommunicationsJournal Prestige (SJR): 0.216 Citation Impact (citeScore): 1Number of Followers: 13     Open Access journal ISSN (Print) 0867-6747 - ISSN (Online) 2300-1933 Published by Polska Akademia Nauk  [10 journals]
• Permutation Coding with Injections for Modified PAM System

• Authors: Opeyemi O Ogunyanda, Thokozani Shongwe, Theo G Swart
Pages: 399 - 404
Abstract: Arriving at a good combination of coding and
modulation schemes that can achieve good error correction
constitutes a challenge in digital communication systems. In this
work, we explore the combination of permutation coding (PC)
and pulse amplitude modulation (PAM) for mitigating channel
errors in the presence of background noise and jitter. Since PAM
is characterised with bi-polar constellations, Euclidean distance is
a good choice for predicting the performance of such coded modulation
setup. In order to address certain challenges facing PCs,
we therefore introduce injections in the coding system, together
with a modified form of PAM system. This modification entails
constraining the PAM constellations to the size of the codeword’s
symbol. The results obtained demonstrate the strength of the
modified coded PAM system over the conventional PC coded
PAM system.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Access Logs – Underestimated Privacy Risks

• Authors: Kamil Kaczyński, Michał Glet
Pages: 405 - 410
Abstract: Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Information Technologies of Estimation the Quality Level of Graduates
Training in Technical University by Means of Artificial Intelligence

• Authors: Anzhelika O. Azarova, Larysa E. Azarova, Sergii V. Pavlov, Iryna S. Kaplun, Nataliia B. Savina, Waldemar Wójcik, Saule Smailova, Aliya Kalizhanova
Pages: 411 - 416
Abstract: The information technologies for assessing the quality of IT-specialties graduates' training of university by means of fuzzy logic and neural networks are developed in the article. It makes possible taking into account a wide set of estimation and output parameters, influence of the external and internal factors and allows to simplify the assessing process by means of modern mathematical apparatuses of artificial intelligence.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Model of integral assessment of innovation implementation in higher
educational establishments

• Authors: Svetlana A. Yaremko, Irina I. Nikolina, Elena М. Kuzmina, Serghiy S. Pugach, Waldemar Wójcik, Nataliya Denissova, Ainur Kozbakova
Pages: 417 - 423
Abstract: The concept of innovative educational environment of higher education establishment is considered and its main components are highlighted. The model of the integrated assessment of implementing innovations in higher education establishment is constructed. The developed model for assessing the level of development of the innovative educational environment of a specific higher education establishment during a certain period has been applied and a graphical analysis of the calculation results has been carried out.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Improved method of searching the associative rules while developing the
software

• Authors: Tamara O. Savchuk, Nataliia V. Pryimak, Nina V. Slyusarenko, Andrzej Smolarz, Saule Smailova, Yedilkhan Amirgaliyev
Pages: 425 - 430
Abstract: As the delivery of the good quality software in time is very important part of the software development process, it's very important task to organize this process very accurately. For this a new method of the searching associative rules where proposed. It is based on the classification of the all tasks on three different groups, depending on their difficulty, and after this, searching associative rules among them, which will help to define the time necessary to perform specific task by specific developer
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• SIDH hybrid schemes with a classical component based on the discrete
logarithm problem over finite field extension

• Authors: Michał Jakub Wroński, Elżbieta Burek, Łukasz Dzierzkowski
Pages: 431 - 441
Abstract: The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over $\Fpn$, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields $\Fp, \Fpd, \Fpc, \Fps$ and $\Fpo$, for primes $p$ used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Using SAT solvers to finding short cycles in cryptographic algorithms

• Authors: Władysław Dudzic, Krzysztof Kanciak
Pages: 443 - 448
Abstract: A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and nonlinear feedback shift registers (NLFSR) and their combination. It is currently known how to construct LFSR to generate a bit sequence with a maximum period, but there is no such knowledge in the case of NLFSR. The latter would be useful in cryptography application (to have a few taps and relatively low algebraic degree). In this article, we propose a simple method based on the generation of algebraic equations to describe iterated cryptographic algorithms and find their solutions using an SAT solver to exclude short cycles in algorithms such as stream ciphers or nonlinear feedback shift register (NLFSR). Thanks to the use of AIG graphs, it is also possible to fully automate our algorithm, and the results of its operation are comparable to the results obtained by manual generation of equations. We present also the results of experiments in which we successfully found short cycles in the NLFSRs used in KSG, Grain-80, Grain-128 and Grain-128a stream ciphers and also in stream ciphers Bivium and Trivium (without constants used in the initialization step).
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Towards an auditable cryptographic access control to high-value sensitive
data

• Authors: Krzysztof Kanciak, Konrad Wrona
Pages: 449 - 458
Abstract: We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world.
In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject's privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Simple verification of completeness of two addition formulas on twisted
Edwards curves

• Authors: Robert Dryło, Tomasz Kijko
Pages: 459 - 464
Abstract: Daniel Bernstein and Tanja Lange  proved that
two given addition formulas on twisted Edwards elliptic curves
ax^2 + y^2 = 1 + dxy are complete (i.e. the sum of any two points
on a curve can be computed using one of these formulas). In
this paper we give other simple verification of completeness
of these formulas using for example Groebner bases and an ¨
algorithm implemented in Magma, which is based on the fact that
completeness means that some systems of polynomial equations
have no solutions. This method may be also applied to verify
completeness  of additions formulas on other models of elliptic
curves.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Optimal strategies for computation of degree $\ell^n$ isogenies for SIDH

• Authors: Michał Jakub Wroński, Andrzej Bolesław Chojnacki
Pages: 465 - 472
Abstract: This article presents methods and algorithms for the computation of isogenies of degree $\ell^n$. Some of these methods are obtained using recurrence equations and generating functions. A standard multiplication based algorithm for computation of isogeny of degree $\ell^n$ has time complexity equal to $O(n^2 M \left(n \log{n} \right) )$, where $M(N)$ denotes the cost of integers of size $N$ multiplication. The memory complexity of this algorithm is equal to $O\left( n \log{\left( n \log{(n)} \right)} \right)$. In this article are presented algorithms for:\begin{itemize}\item determination of optimal strategy for computation of degree $\ell^n$ isogeny,\item determination of cost of optimal strategy of computation of $\ell^n$ isogeny using solutions of recurrence equations,\item determination of cost of optimal strategy of computation of $\ell^n$ isogeny using recurrence equations,\end{itemize}where optimality in this context means that, for the given parameters, no other strategy exists that requires fewer operations for faster computation of isogeny. Also this article presents a method using generating functions for obtaining the solutions of sequences $\left( u_m \right)$ and $\left( c_m \right)$ where $c_m$ denotes the cost of computations of isogeny of degree $\ell^{u_m}$ computations for given costs $p,q$ of $\ell$-isogeny computation and $\ell$-isogeny evaluation. These solutions are also used in the construction of the algorithms presented in this article.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Improving security of existentially unforgeable signature schemes

• Authors: Mariusz Jurkiewicz
Pages: 473 - 480
Abstract: In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable signature scheme based on pairings, which satisfies all assumptions of the first part and is able to be subjected to transformation.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Impact of IT equipment location in buildings on electromagnetic safety

• Authors: Leszek Nowosielski
Pages: 481 - 486
Abstract: The attenuation of the signal introduced by the propagation path between the source of the compromising emanation (the location of secured IT equipment) and the location of the antenna of the potential infiltrating system has a direct influence on the electromagnetic safety of IT equipment. The article presents original analytical relationships necessary to estimate the attenuation values introduced by the propagation path of the potential compromising emanation signal, which correspond to the most probable locations of IT equipment in relation to the location of the potential infiltrating system. The article analyzes identified by the author various location scenarios for IT equipment, which is a potential source of compromising emanation, with a potential infiltrating system positioned inside or outside the building, in which said IT equipment is located. The aforementioned scenarios are characterized by the lowest attenuation of the propagation path of potential compromising emanation generated by the secured IT equipment and provide for location masking of the potential infiltrating system. Example design of protective solutions for IT equipment elaborated by article author in the form of a shielding enclosure is presented in the article too.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Modelling the one channel systems of a delivery of goods provided by
unmanned aerial vehicles

• Authors: Roman N. Kvyetnyy, Yaroslav Kulyk, Bohdan Knysh, Yuryy Ivanov, Andrzej Smolarz, Orken Mamyrbaev, Aimurat Burlibayev
Pages: 487 - 492
Abstract: In this article is revealed the systems of a good delivery witch implement unmanned aerial vehicles during providing the service. the one channel systems of a goods delivery are a goal of this research work. the close analysing of their functional features, the classification, the types and parameters of different systems from this band are presented. in addition, the modelling of the different types of the one channel systems of goods delivery are has done.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Optimization Model of Adaptive Decision Taking Support System for
Distributed Systems Cyber Security Facilities Placement

• Authors: Aliya Kalizhanova, Sultan Akhmetov, Valery Lakhno, Waldemar Wojcik, Gulnaz Nabiyeva
Pages: 493 - 498
Abstract: Abstract— An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cybersecurity facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection and cybersecurity systems in different versions. It is possible to consider, how separate elements, influence at DCN protection factors and their combinations. Offered model, in distinction from existing, has allowed implementing both the principles of information protection equivalency to a concrete threat and a system complex approach to forming a highly effective protection system for DCN. Hereby we have presented the outcomes of computational experiments on selecting the rational program algorithm of implementing the developed optimization model. It has been offered to use genetic algorithm modification (GAM). Based on the offered model, there has been implemented the module for adaptive DTSS. DTSS module might be applied upon designing protected DCN, based on preset architecture and available sets of information protection and cybersecurity systems in the network.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Security assessment methodology for isolated systems of a certain class

• Authors: Daniel Wiechecki
Pages: 499 - 505
Abstract: This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Further Discussion on Modeling of Measuring Process via Sampling of
Signals

• Authors: Andrzej Marek Borys
Pages: 507 - 513
Abstract: In this paper, we continue a topic of modeling measuring processes by perceiving them as a kind of signal sampling. And, in this respect, note that an ideal model was developed in a previous work. Whereas here, we present its nonideal version. This extended model takes into account an effect, which is called averaging of a measured signal. And, we show here that it is similar to smearing of signal samples arising in nonideal signal sampling. Furthermore, we demonstrate in this paper that signal averaging and signal smearing mean principally the same, under the conditions given. So, they can be modeled in the same way. A thorough analysis of errors related to the signal averaging in a measuring process is given and illustrated with equivalent schemes of the relationships derived. Furthermore, the results obtained are compared with the corresponding ones that were achieved analyzing amplitude quantization effects of sampled signals used in digital techniques. Also, we show here that modeling of errors related to signal averaging through the so-called quantization noise, assumed to be a uniform distributed random signal, is rather a bad choice. In this paper, an upper bound for the above error is derived. Moreover, conditions for occurrence of hidden aliasing effects in a measured signal are given.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• A simple nonlinear companding transform for nonlinear compensation of
direct-detection optical OFDM systems

• Authors: Thu Trang Ngo, Duc Nhan Nguyen
Pages: 515 - 520
Abstract: In direct-detection OFDM systems, the nonlinear effects caused by optical modulation and fiber transmission can degrade the system performance severely. In this study, we propose a new nonlinear companding transform to improve the performance of direct detection optical OFDM transmission systems. The demonstration is realized by Monte-Carlo simulation of the intensity modulation and direct-detection DCO-OFDM optical transmission system at 40 Gbps over a 80 km of standard single mode fiber link. The influence of the companding parameters on the performance of system in different nonlinear transmission conditions has been investigated via simulation.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Θ(1) Time Algorithm for Master Selection in Ad-hoc Wireless Networks

• Authors: Mohammed El Khattabi, Jelloul Elmesbahi, Mohammed Khaldoun, Ahmed Errami, Omar Bouattane
Pages: 521 - 527
Abstract: This paper details a hardware implementation of a distributed Θ(1) time algorithm allows to select dynamically the master device in ad-hoc or cluster-based networks in a constant time regardless the number of devices in the same cluster. The algorithm allows each device to automatically detect its own status; master or slave; based on identifier without adding extra overheads or exchanging packets that slow down the network. We propose a baseband design that implements algorithm functions and we detail the hardware implementation using Matlab/Simulink and Ettus B210 USRP. Tests held in laboratory prove that algorithm works as expected.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Power Scaling and Antenna Selection Techniques for Hybrid Beamforming in
mmWave Massive MIMO Systems

• Authors: Abdul Haq Nalband, Mrinal Sarvagya, Mohammed Riyaz Ahmed
Pages: 529 - 535
Abstract: With the advent of massive MIMO and mmWave, Antenna selection is the new frontier in hybrid beamforming employed in 5G base stations. Tele-operators are reworking on the components while upgrading to 5G where the antenna is a last-mile device. The burden on the physical layer not only demands smart and adaptive antennas but also an intelligent antenna selection mechanism to reduce power consumption and improve system capacity while degrading the hardware cost and complexity. This work focuses on reducing the power consumption and finding the optimal number of RF chains for a given millimeter wave massive MIMO system. At first, we investigate the power scaling method for both perfect Channel State Information (CSI) and imperfect CSI where the power is reduced by 1/number of antennas and 1/square root (number of antennas) respectively. We further propose to reduce the power consumption by emphasizing on the subdued resolution of Analog-to-Digital Converters (ADCs) with quantization awareness. The proposed algorithm selects the optimal number of antenna elements based on the resolution of ADCs without compromising on the quality of reception. The performance of the proposed algorithm shows significant improvement when compared with conventional and random antenna selection methods.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Properties of a wireless mesh network constructed with the use of IQRF
modules in the indoor environment

• Authors: Sławomir Pluta, Patryk Roszkowski
Pages: 537 - 544
Abstract: The subject of the article is the design and practical implementation of the wireless mesh network. IQRF radio modules were used for the network design. The IQRF® technique has enabled the construction of a mesh network with the possibility of reconfiguration. The theoretical part contains a description of the IQRF® hardware solutions used. The practical scope includes the design part, where the configuration of the radio modules was carried out and the parameters of the radio network were set to allow its implementation in various topologies. Then, a wireless network consisting of 10 IQRF modules was launched in the P3 building of the Opole University of Technology. At this stage, configured radio modules were placed in selected rooms on all five floors of the building in order to carry out tests of the radio network constructed in this way. The tests included measuring the packet transmission delay time as well as the received signal strength. Research was carried out for several network topologies.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Fixed-latency system for high-speed serial transmission between FPGA
devices with Forward Error Correction

• Authors: Michał Kruszewski, Wojciech Marek Zabołotny
Pages: 545 - 553
Abstract: This paper presents the design of a compact pro-
tocol for fixed-latency, high-speed, reliable, serial transmission
between simple field-programmable gate arrays (FPGA) devices.
Implementation of the project aims to delineate word boundaries,
provide randomness to the electromagnetic interference (EMI)
generated by the electrical transitions, allow for clock recov-
ery and maintain direct current (DC) balance. An orthogonal
concatenated coding scheme is used for correcting transmission
errors using modified Bose–Chaudhuri–Hocquenghem (BCH)
code capable of correcting all single bit errors and most of
the double-adjacent errors. As a result all burst errors of a
length up to 31 bits, and some of the longer group errors,
are corrected within 256 bits long packet. The efficiency of the
proposed solution equals 46.48%, as 119 out of 256 bits are
fully available to the user. The design has been implemented
and tested on Xilinx Kintex UltraScale+ KCU116 Evaluation Kit
with a data rate of 28.2 Gbps. Sample latency analysis has also
been performed so that user could easily carry out calculations
for different transmission speed. The main advancement of the
work is the use of modified BCH(15, 11) code that leads to high
error correction capabilities for burst errors and user friendly
packet length.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Application of the averaged model of the diode-transistor switch for
modelling characteristics of a boost converter with an IGBT

• Authors: Paweł Górecki
Pages: 555 - 560
Abstract: DC-DC converters are popular switch-mode electronic circuits used in power supply systems of many electronic devices. Designing such converters requires reliable computation methods and models of components contained in these converters, allowing for accurate and fast computations of their characteristics. In the paper, a new averaged model of a diode-transistor switch containing an IGBTis proposed. The form of the developed model is presented. Its accuracy is verified by comparing the computed characteristics of the boost converter with the characteristics computed in SPICE using a transient analysis and literature models of a diode and an IGBT. The obtained results of computations proved the usefulness of the proposed model.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Determination of the Optimal Threshold Value and Number of Keypoints in
Scale Invariant Feature Transform-based Copy-Move Forgery Detection

• Authors: R Rizal Isnanto, Ajub Ajulian Zahra, Imam Santoso, Muhammad Salman Lubis
Pages: 561 - 569
Abstract: The copy-move forgery detection (CMFD) begins with the preprocessing until the image is ready to process. Then, the image features are extracted using a feature-transform-based extraction called the scale-invariant feature transform (SIFT). The last step is features matching using Generalized 2 Nearest-Neighbor (G2NN) method with threshold values variation. The problem is what is the optimal threshold value and number of keypoints so that copy-move detection has the highest accuracy. The optimal threshold value and number of keypoints had determined so that the detection has the highest accuracy. The research was carried out on images without noise and with Gaussian noise.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Efficient H.264 intra Frame CODEC with Best prediction matrix mode
algorithm

• Authors: Sara Hamdy, Abdelhalim Zekry, Wael A. Mohamed
Pages: 571 - 582
Abstract: The continuous growth of smart communities and everincreasing
demand of sending or storing videos, have led to
consumption of huge amount of data. The video compression
techniques are solving this emerging challenge. However, H.264
standard can be considered most notable, and it has proven to meet
problematic requirements. The authors present (BPMM) as a novel
efficient Intra prediction scheme. We can say that the creation of our
proposed technique was in a phased manner; it's emerged as a
proposal and achieved impressive results in the performance
parameters as compression ratios, bit rates, and PSNR. Then in the
second stage, we solved the challenges of overcoming the obstacle of
encoding bits overhead. In this research, we try to address the final
phase of the (BPMM) codec and to introduce our approach in a global
manner through realization of decoding mechanism. For evaluation of
our scheme, we utilized VHDL as a platform. Final results have
proven our success to pass bottleneck of this phase, since the decoded
videos have the same PSNR that our encoder tells us, while
our BPMM algorithm will be adopted as reference design of H.264 in
the ITU.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Development of Speaker Voice Identification Using Main Tone Boundary
Statistics for Applying To Robot-Verbal Systems

• Authors: Yedilkhan Amirgaliyev, Timur Musabayev, Didar Yedilkhan, Waldemar Wojcik, Zhazira Amirgaliyeva
Pages: 583 - 588
Abstract: Abstract—Hereby there is given the speaker identification basic system. There is discussed application and usage of the voice interfaces, in particular, speaker voice identification upon robot and human being communication. There is given description of the information system for speaker automatic identification according to the voice to apply to robotic-verbal systems. There is carried out review of algorithms and computer-aided learning libraries and selected the most appropriate, according to the necessary criteria, ALGLIB. There is conducted the research of identification model operation performance assessment at different set of the fundamental voice tone. As the criterion of accuracy there has been used the percentage of improperly classified cases of a speaker identification.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

• Filtering Property of Signal Sampling in General and Under-Sampling as a
Specific Operation of Filtering Connected with Signal Shaping at the Same
Time

• Authors: Andrzej Marek Borys
Pages: 589 - 594
Abstract: In this paper, we show that signal sampling operation can be considered as a kind of all-pass filtering in the time domain, when the Nyquist frequency is larger or equal to the maximal frequency in the spectrum of a signal sampled. We demonstrate that this seemingly obvious observation has wide-ranging implications. They are discussed here in detail. Furthermore, we discuss also signal shaping effects that occur in the case of signal under-sampling. That is, when the Nyquist frequency is smaller than the maximal frequency in the spectrum of a signal sampled. Further, we explain the mechanism of a specific signal distortion that arises under these circumstances. We call it the signal shaping, not the signal aliasing, because of many reasons discussed throughout this paper. Mainly however because of the fact that the operation behind it, called also the signal shaping here, is not a filtering in a usual sense. And, it is shown that this kind of shaping depends upon the sampling phase. Furthermore, formulated in other words, this operation can be viewed as a one which shapes the signal and performs the low-pass filtering of it at the same time. Also, an interesting relation connecting the Fourier transform of a signal filtered with the use of an ideal low-pass filter having the cut frequency lying in the region of under-sampling with the Fourier transforms of its two under-sampled versions is derived. This relation is presented in the time domain, too.
PubDate: 2020-09-07
Issue No: Vol. 66, No. 3 (2020)

JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762