Spelling suggestions: "subject:"farfield"" "subject:"farmfields""
51 |
Identification d’un modèle de mesure au sol du diagramme de rayonnement des antennes installées sur aéronefs / Measurements of on-board antenna radiation patterns on the groundDiakite, Cheick 14 March 2018 (has links)
La détermination du diagramme de rayonnement d’une antenne installée sur un porteur est indispensable pour la validation des systèmes RF auxquels sont associées ces antennes. Lorsque l’antenne est placée sur le porteur, la structure rayonnante est formée par l’antenne et le porteur. Le diagramme doit être déterminé à grande distance de la source dans la zone de champ lointain. Suivant la fréquence de travail et la taille de la source rayonnante, cette distance peut être grande. Elle est par exemple de l’ordre 85m lorsque l’on cherche à caractériser à 88MHz une source rayonnante de dimension maximale 12m. Actuellement, cette distance de champ lointain, est obtenue lors des essais en vol au cours desquels l’aéronef est à 80km de la station sol relevant le diagramme. Cette méthode de caractérisation n’est pas tenable à long terme, en raison de son coût et des temps de mesure. C’est pourquoi Airbus Helicopter veut mettre en œuvre une mesure au sol mais ce dernier perturbe grandement le rayonnement. La méthode de caractérisation retenue permet d’effectuer les mesures au sol dans un espace réduit et permet de s’affranchir de l’influence du sol. La méthode retenue repose sur la caractérisation en champ proche dans une géométrie cylindrique, associée à une technique de correction de diagramme de rayonnement basée sur la décomposition de modes. La mesure champ proche requiert l’acquisition des données de champ proche sur une surface cylindrique, puis un algorithme de transformation développé en environnent MATLAB effectue le passage en champ lointain. Le champ lointain est décomposé en modes cylindriques, puis un filtrage modal est appliqué pour s’affranchir de l’influence du sol. / Aircraft antennas radiation pattern must be measured before radiofrequency systems deployment. When an antenna is on the aircraft, radiating structure is not only antenna element but it’s the set antenna and aircraft. Radiation pattern have to be determined at great distance from the radiating structure. This distance is located in area called far field area depending on the frequency of operation and the maximal size of the aircraft. For example, to measure an antenna on an aircraft of 12 m of long at 88 MHz; the far field area is at 85m.To get this distance, flight measurement is performed. During flight test, radiation pattern is determined by a ground station which is at 80 km of the aircraft. This method is very expensive and takes much time and causes serious delays on aircraft delivery. For these reasons Airbus Helicopters explores new innovative solution, like as radiation pattern measurement on the ground. The last one disturbs the radiation pattern. The proposed method allows to perform measurement in compact volume and cancel out the ground influence. Proposed solution is based on cylindrical near field measurement, and cylindrical modes decomposition. Near field data are scanned on cylinder surface, then an algorithm developed on MATLAB environment do near field to far field transformation. Cylindrical modes decomposition and modal filtering rid of ground reflections. Proposed solution has been validated numerically through comparison with electromagnetic simulator software results. Antenna measurement range in the laboratory has served to validate experimentally the proposed solution on a prototype in scale size.
|
52 |
Caractérisation radioélectrique des satellites de télécommunications du futur / Radioelectric measurements of future telecommunication satellitesBalma, Téegwendé Serge 29 January 2018 (has links)
Les paramètres radioélectriques des satellites sont actuellement mesurés directement, à l’aide d’une base compacte. Cependant, les li-mites de ces bases sont atteintes à cause de l’augmentation des dimensions des satellites, du nombre et de la complexité des antennes qu’ils comportent.Les techniques de champ proche constituent une solution prometteuse sous la forme de base pla-naire. Ces techniques consistent à mesurer le champ rayonné à proximité de la source pour en déduire, par traitement mathématique, le champ à grande distance.Ce travail de thèse porte sur l’adaptation des techniques de champ proche au test des satellites de télécommunications. La caractérisation du rayonnement des antennes par ces techniques estaujourd’hui largement utilisée. Toutefois, un développement théorique doit être complété et des méthodes de mesures proposées pour le test de l’ensemble des paramètres de la charge utile. Des difficultés spécifiques liées à la fonction du satellite (transpondeur) et à l’accès limité aux antennes et à l’électronique du satellite doivent être prise en compte dans la mise en oeuvre de ces méthodes de mesure.Enfin les mesures en champ proche sont affectées par plusieurs causes d’erreurs. L’identification des sources de ces erreurs et l’évaluation de leurs contributions au résultat final constituent une partie importante du travail de thèse. L’étude globale permet de dimensionner un système de mesure complet bénéficiant d’un bon niveau d’optimisation. / Nowadays, the radioelectric charac-teristics of satellites are directly measured by means of a com-pact range basis. However, the limits of these bases are affected by the growth of the satellite dimensions, in addition to the number and the complexity of the integrated an-tennas.On the other hand, near field techniques formed a promising solution under the planar range form. These techniques consist of measuring the radiated field near the source and accordingly deduce the far field by the means of mathemati-cal analysis.The purpose of this thesis is to adapt near field techniques for testing telecommunication satel-lites. In fact, these techniques are widelyused for antenna pattern measurements. However, a theoretical development has to be completed and measurement methods need to be proposed for testing all payload parameters. Unfortunately, specific difficulties related to the satellite function (transponder) and the limited access to antennas and satellite electronics have to be taken into account in the implementation of these measurement methodologies.Finally, the near field measurements are affected by many causes of errors. The identification of the error sources and the evaluation of their contribution to the final results constitute an important part of the thesis work. The global study allows dimensioning a complete measurement system with a good optimization.
|
53 |
Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter TuningLiu, Keyi January 2021 (has links)
Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. Unlike attacks based on near field EM emissions or power consumption, the attack based on far field EM emissions is able to extract the secret key from the victim device of several meters distance. However, existing deep-learning attacks based far field EM commonly use a random or grid search method to optimize neural networks’ hyperparameters. Recently, an automated way for deep learning hyperparameter tuning based on Auto- Keras library, called AutoSCA framework, was applied to near-field EM attacks. In this work, we investigate if AutoSCA could help far field EM side-channel attacks. In our experiments, the target is a Bluetooth-5 supported Nordic Semiconductor nRF52832 development kit implementation of Advanced Encryption Standard (AES). Our experiments show that, by using a deep-learning model generated by the AutoSCA framework, we need 485 traces on average to recover a subkey from traces captured at 15 meters distance from the victim device without repeating each encryption. For the same conditions, the state-of-the-art method uses 510 traces. Furthermore, our model contains only 667,433 trainable parameters in total, implying that it requires roughly 9 times less training resources compared to the larger models in the previous work. / Angrepp på sidokanaler har blivit ett realistiskt hot mot implementeringen av kryptografiska algoritmer.Genom att analysera det oavsiktliga läckaget kan angriparen hitta hemligheten bakom målet.Nyligen har en ny typ av sidokanalläckage upptäckts, kallad fjärrfälts EM-utsläpp.Till skillnad från attacker baserade på nära fält EM- utsläpp eller energiförbrukning, kan attacken baserad på yttre fält EM-utsläpp extrahera den hemliga nyckeln från den skadade anordningen på flera meter avstånd.Men befintliga djupinlärningsattacker baserade på långt fält EM använder ofta en slumpmässig sökmetod för att optimera nervnätens hyperparametrar. Nyligen tillämpades ett automatiserat sätt för djupinlärning av hyperparametern baserad på Auto-Keras- bibliotek, AutoSCA- ramverket, vid EM-angrepp nära fältet.I det här arbetet undersöker vi om AutoSCA kan hjälpa till med EM-angrepp.I våra experiment är målet en Bluetooth-5-stödd nordisk semidirigent nR52832- utvecklingsutrustning för avancerad krypteringsstandard (AES).Våra experiment visar att genom att använda en djupinlärningsmodell skapad av AutoSCA-ramverket, behöver vi 485-spår i genomsnitt för att hämta en subnyckel från spår tagna på 15- meters avstånd från offrets apparat utan att upprepa varje kryptering.Under samma förhållanden använder den senaste metoden 510-spår.Dessutom innehåller vår modell bara 667,433-parametrar som totalt kan användas för utbildning, vilket innebär att det krävs ungefär nio gånger mindre utbildningsresurser jämfört med de större modellerna i det tidigare arbetet.
|
54 |
Impacts of Station Dependent Error Sources on the Implementation of the National Height Modernization ProgramCrawford, Justin Luvene January 2013 (has links)
No description available.
|
55 |
Novel Closed-Loop Matching Network Topology for Reconfigurable Antenna ApplicationsSmith, Nathanael J. 21 May 2014 (has links)
No description available.
|
56 |
Analysis and Computation for the Inverse Scattering Problem with Conductive Boundary ConditionsRafael Ceja Ayala (18340938) 11 April 2024 (has links)
<p dir="ltr">In this thesis, we consider the inverse problem of reconstructing the shape, position, and size of an unknown scattering object. We will talk about different methods used for nondestructive testing in scattering theory. We will consider qualitative reconstruction methods to understand and determine important information about the support of unknown scattering objects. We will also discuss the material properties of the system and connect them to certain crucial aspects of the region of interest, as well as develop useful techniques to determine physical information using inverse scattering theory. </p><p><br></p><p dir="ltr">In the first part of the analysis, we consider the transmission eigenvalue (TE) problem associated with the scattering of a plane wave for an isotropic scatterer. In particular, we examine the transmission eigenvalue problem with two conductivity boundary parameters. In previous studies, this eigenvalue problem was analyzed with one conductive boundary parameter, whereas we will consider the case of two parameters. We will prove the existence and discreteness of the transmission eigenvalues. In addition, we will study the dependence of the TE's on the physical parameters and connect the first transmission eigenvalue to the physical parameters of the problem by a monotone-type argument. Lastly, we will consider the limiting procedure as the second boundary parameter vanishes at the boundary of the scattering region and provide numerical examples to validate the theory presented in Chapter 2. </p><p><br></p><p dir="ltr">The connection between transmission eigenvalues and the system's physical parameters provides a way to do testing in a nondestructive way. However, to understand the region of interest in terms of its shape, size, and position, one needs to use different techniques. As a result, we consider reconstructing extended scatterers using an analogous method to the Direct Sampling Method (DSM), a new sampling method based on the Landweber iteration. We will need a factorization of the far-field operator to analyze the corresponding imaging function for the new Landweber direct sampling method. Then, we use the factorization and the Funk--Hecke integral identity to prove that the new imaging function will accurately recover the scatterer. The method studied here falls under the category of qualitative reconstruction methods, where an imaging function is used to retrieve the scatterer. We prove the stability of our new imaging function as well as derive a discrepancy principle for recovering the regularization parameter. The theoretical results are verified with numerical examples to show how the reconstruction performs by the new Landweber direct sampling method.</p><p><br></p><p dir="ltr">Motivated by the work done with the transmission eigenvalue problem with two conductivity parameters, we also study the direct and inverse problem for isotropic scatterers with two conductive boundary conditions. In such a problem, one analyzes the behavior of the scattered field as one of the conductivity parameters vanishes at the boundary. Consequently, we prove the convergence of the scattered field dealing with two conductivity parameters to the scattered field dealing with only one conductivity parameter. We consider the uniqueness of recovering the coefficients from the known far-field data at a fixed incident direction for multiple frequencies. Then, we consider the inverse shape problem for recovering the scatterer for the measured far-field data at a fixed frequency. To this end, we study the direct sampling method for recovering the scatterer by studying the factorization for the far-field operator. The direct sampling method is stable concerning noisy data and valid in two dimensions for partial aperture data. The theoretical results are verified with numerical examples to analyze the performance using the direct sampling method. </p>
|
57 |
Conception d’antennes et méthode de caractérisation des systèmes RFID UHF en champ proche et en champ lointain / Antenna design and characterization method of near-field and far-field UHF RFID systemsSouza, Aline Coelho de 07 October 2015 (has links)
La technologie d'identification par radiofréquence (RFID) a eu un essor très important ces dernières années notamment grâce à sa configuration polyvalente et aux innombrables possibilités d'intégration offertes par cette technologie notamment avec l'apparition d'un nouveau contexte applicatif celui des objets connectés. Depuis quelques années, des applications de la RFID UHF en champ proche ont été notamment développées afin de surmonter les problèmes liés à la dégradation de lecture des tags lorsqu'ils sont placés dans des milieux fortement perturbateurs. Les travaux de recherche présentés dans cette thèse s'intéressent à l'étude de la technologie RFID UHF en zones de champ proche et de champ lointain. Les études portent plus particulièrement sur la conception d'antennes lecteur et d'antennes tag ainsi que sur les méthodes de caractérisation des systèmes RFID en zones de champ proche et de champ lointain. Une étude sur les caractéristiques des champs rayonnées par une antenne est réalisée afin de souligner les critères les plus pertinents en vue de concevoir des antennes pour les lecteurs RFID, performantes en zone de champ proche. A partir de l'état de l'art sur les antennes tags et les méthodologies de conception classiques, une nouvelle approche de conception est développée qui vise à améliorer la conception d'antennes tags en intégrant une vision appropriée pour tenir compte du niveau de puissance espéré dans une application donnée. Enfin avec pour objectif la caractérisation des tags RFID UHF, d'une part une approche est proposée permettant l'identification de familles de tags, et d'autre part, une procédure innovante pour la mesure de l'efficacité du transfert de puissance est proposée et validée expérimentalement. / The Radiofrequency Identification technology (RFID) has had a huge growth these last years, due to its versatility and the uncountable possibilities to integrate this technology in many different application (tracking and inventory of goods, access control, supply chain, etc.), and in particular the brand new context of internet of things projects. For some years, the near field UHF RFID applications has been developed in order to overcome the problems related to degradations of tag's read range when needing to use it in a perturbing environment. The research work presented in this thesis come as a study of the UHF RFID in near field and far field zones. This study focus more particularly on the design of reader and tag antennas and on the characterization method in near field and far field zones. A study on the characteristics of fields outgoing from an antenna has been made, in order to underline the important criteria for the design of performant UHF RFID reader antennas in near field zone. From the state of art about tag antennas design and classical methodologies, we propose a new approach that aims improving the design of tag antennas in a more suitable point of view that is getting the expected power level in a given application. Finally, with an objective to characterize UHF RFID tags, we first propose a new approach enabling the identification of tag families, and then propose a new innovating power transfer efficiency measurement procedure, that has been validated experimentally.
|
58 |
Evaluation of industrial wireless communications systems’ securitySoderi, S. (Simone) 07 June 2016 (has links)
Abstract
The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS).
The aim of this thesis is to develop new security engineering methodologies for IWCS. The author develops countermeasures against confidentiality and integrity attacks and carries out a security analysis covering the protocol, electromagnetic and physical layer. In the first part of the thesis, Host Identity Protocol (HIP) is utilized to secure communication in an intra–vehicular network. Simulations and measurement campaigns are also conducted to evaluate the impact of the overhead on security in a tunnel, considering line–of–sight (LOS) and non–LOS (NLOS) scenarios.
Electromagnetic analysis (EMA) is an important step in the development of safety–related systems. Today, the increasing usage of smaller integrated circuit also increases the susceptibility to electromagnetic (EM) interference. From near–field (NF) to far–field (FF) transformation, a method for the evaluation of the emissions leakage is investigated. The virtual EM (VEM) interface of the device–under–test (DUT) is studied, and it is described how an adversary can exploit it for denial of service (DoS) attacks. An effective jamming attack model is studied, and the theoretical calculations are validated with experiment–based results.
Finally, focusing attention on physical layer security, two algorithms are developed. Active radio frequency fingerprinting (RFF) implements the exchange of a public key during the setup of secure communication. Afterwards, utilizing a jamming receiver in conjunction with the spread spectrum (SS) watermarking technique, the watermark–based blind physical layer security (WBPLSec) protocol is presented. The analysis and results indicate how the WBPLSec seems to be a valuable technique for deploying physical layer security by creating a secure region around the receiver. / Tiivistelmä
Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta.
Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa.
Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti.
Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus.
|
59 |
Měření směrových charakteristik antén / Measurement of the antenna directional patternDivín, Jan January 2011 (has links)
This Master’s Thesis is dealing with measuring antennas in far field. Especially with automation this measure, direction sensors made by optical mouse, Integrated Hall ICs for Linear and Off-Axis Rotary Motion Detection and remote unit this workplace, which can made communication with PC by USB. It describes the making control program for the PC.
|
60 |
Skener elektromagnetických polí a jeho využití při měření elektromagnetické kompatibility / Electromagnetic field scanner and its utilization in EMC measurementChupáč, Michal January 2013 (has links)
Master’s thesis is focused on making the acquaintance of EMC issues and ways of electromagnetic field scanner RS321 utilization for pre-compliance measurements. First part contains analysis of available equipment’s influence on measurement results on the basis of gathered specification. Next part includes an example measurement used as operational manual for scanner and its controlling program. The most important part is correction evaluation for performed EMI measurement of signal generator using its EMC certification protocol and application of gained correction curve on independent EMI measurement of device tested by EMC testing laboratory. Other possibilities of scanner utilization are mentioned in the next chapters. Last part of the thesis contains suitability evaluation of EMC scanner on the basis of findings from performed measurements.
|
Page generated in 0.0371 seconds