2018
DOI: 10.11591/ijres.v7.i3.pp173-185
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a New Architecture of a Real-Time Reconfigurable Digital Modulator (DM) Into QPSK, 8-PSK, and 16-PSK on FPGA

Abstract: One of the prerequisites of Electronic Warfare (EW) is to have the means to provide secure point-to-point wireless data and voice communications with other ground stations. New technologies are giving rise to bigger information security threats. This situation illustrates the best the urgency of reducing the development and upgrade time of EW systems. Previous works suggest that digital systems are the best candidates for this purpose and therefore form the backbone of modern Electronic Warfare. Indeed, Digita… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Before carrying out the hardware/software design of the proposed fuzzy controller, we have tested it by applying a car plant [26] according to our car dimensions, shown in Figure 5. It is a discrete transfer function given in (4). The sample time is equal to 0.2 s.…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Before carrying out the hardware/software design of the proposed fuzzy controller, we have tested it by applying a car plant [26] according to our car dimensions, shown in Figure 5. It is a discrete transfer function given in (4). The sample time is equal to 0.2 s.…”
Section: System Modelmentioning
confidence: 99%
“…π›₯𝑣 π›₯𝑒 = 0.0007198z 2 +0.00217z+0.0003955 𝑧 3 -2.18z+1.487z-0.3009 (4) where u  is the control signal that is considered as throttle control and used to increase or decrease the engine driver force [26] and v  is the car speed in cm/s. Figure 4 presents the system model developed in MATLAB/Simulink environment.…”
Section: 𝐻(𝑧) =mentioning
confidence: 99%
See 1 more Smart Citation
“…By applying some basic algebra to (5), it follows ( ) = ( 0 0 ) 0 + ( 0 1 + 1 0 + 0 0 + 1 1 βˆ’ ( 0 0 + 1 1 )) 1 After equaling (5) and (8), and by identification it follows:…”
Section: Third-degree Karatsuba Analysismentioning
confidence: 99%
“…The need to protect data and information is crucial; it can make the difference between life and death. More particularly, in the military field, winning a war relies heavily on the protection of information [1]. The use of encryption keys is one of the means used to preserve the authenticity, confidentiality, nondenial, and integrity of the data.…”
Section: Introductionmentioning
confidence: 99%