Jump to: navigation, search

Youtube search... ...Google search

Cognitive Radio (CR) / Software-defined radio (SDR)

Software-defined radio (SDR) is a radio communication system where components that have been traditionally implemented in hardware (e.g. mixers, filters, amplifiers, modulators/demodulators, detectors, etc.) are instead implemented by means of software on a personal computer or embedded system. Software radios have significant utility for the military and cell phone services, both of which must serve a wide variety of changing radio protocols in real time. In the long term, software-defined radios are to become the dominant technology in radio communications. SDRs, along with software defined antennas are the enablers of the cognitive radio.

GNU Radio

is a free & open-source software development toolkit that provides signal processing blocks to implement software radios. It can be used with readily-available low-cost external RF hardware to create software-defined radios, or without hardware in a simulation-like environment.

Deepwave Digital Systems

Enabling deep learning and AI at the edge of wireless systems. GPUs are extremely well suited for processes that are highly parallel. The Fast Fourier Transform (FFT) is one of the most common techniques in signal processing and happens to be a highly parallel algorithm. In this blog post the Deepwave team walks you though how to leverage the embedded GPU built into the AIR-T to perform high-speed FFTs without the computational bottleneck of a CPU and without having to experience the long development cycle associated with writing VHDL code for FPGAs. By leveraging the GPU on the AIR-T, you get the best of both worlds: fast development time and high speed processing. A familiar tool to anyone working in the wireless domain, GNU Radio allows signal processing experts to tie together blocks of functionality using an intuitive GUI. Many of the “in the weeds” details regarding the software implementation are well abstracted so the user can focus on the algorithm instead.Once an algorithm has been optimized (or a pre-trained algorithm has been downloaded by a 3rd party), the user will reference it in Deepwave’s GR-WAVELEARNER software that provides a TensorRT Inference block for GNU Radio Companion (GRC)


Machine learning solving practical problems in Communications

Physical Layer Security (PLS)

Youtube search... ...Google search

Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. Physical Layer Security for Downlink NOMA: Requirements, Merits, Challenges, and Recommendations | H. Furqan, J. Hamamreh, and H. Arslan


Youtube search... ...Google search


YouTube search... ...Google search

Stanford Seminar - Promise of 5G Wireless – The Journey Begins
Arogyaswami Paulraj Stanford University October 3, 2019 Professor Emeritus Arogyaswami Paulraj, Stanford University, is a pioneer of Multiple-Input Multiple-Output (MIMO) wireless communications, a technology break through that enables improved wireless performance. MIMO is now incorporated into all new wireless systems. Paulraj is the author of over 400 research papers, two text books and a co-inventor in 79 US patents. Paulraj has won over a dozen awards, notably the National Inventors Hall of Fame (USPTO), Marconi Prize and Fellowship, 2014 and the IEEE Alexander Graham Bell Medal, 2011. He is a fellow of eight scientific / engineering national academies including the US, China, India and Sweden. He is a fellow of IEEE and AAAS. In 1999, Paulraj founded Iospan Wireless Inc. – which developed and established MIMO-OFDMA wireless as the core 4G technology. Iospan was acquired in by Intel Corporation in 2003. In 2004, he co-founded Beceem Communications Inc. The company became the market leader in 4G-WiMAX semiconductor and was acquired by Broadcom Corp. in 2010. In 2014 he founded Rasa Networks to develop Machine Learning tools for WiFi Networks. The company was acquired HPE in 2016. During his 30 years in the Indian (Navy) (1961-1991), he founded three national level laboratories in India and headed one of India’s most successful military R&D projects – APSOH sonar. He received over a dozen awards (many at the national level) in India including the Padma Bhushan, Ati Vishist Seva Medal and the VASVIK Medal.

5G-IoT-Edge-ML/AI: Technologies That Will Transform
Digi International Inc. 5G networks are being deployed, and we believe that 5G, IoT, edge compute, machine learning and artificial intelligence will combine to create the perfect technological storm – in a good way! In this video Digi engineering director Harald Remmert describes how low-cost IoT devices combined with the huge capacity of 5G will transform society, and how you can leverage 4G LTE today.

5G: The perfect storm and enabler of the next wave of AI
Webinar hosted by Norwegian Cognitive Center on September 16 2020. How does 5G relate and accelerate new and emerging technologies, AI, ML and industry 4.0? 5G will come as a service offering, but it is also a technology. Both will, for a number of reasons, be disruptive and can be utilized for new and enhanced services. 5G will bring us and our IoT devices closer and more connected. It will also change the way we work, play, think and plan. Join us at this webinar to further understand the changes, enhancements and opportunities 5G will bring. Speaker: Ingebrigt Lunde is Project Manager at Nordic 5G Consortium: Ingebrigt holds a M.Sc. in Computer Science. He has previously worked with research and development for 10 years in Digital Equipment Corporation (DEC), University of Bergen, establishing commercial internet in Norway and for the last 25 years in TV 2 Norway, designing and building the IP infrastructure and production and lately new production models. He was the project manager for the groundbreaking and award nominated TV 2 Hockey national wide NDI based production network system.

Why China can take a lead in 5G and AI technology application
China is among the world’s first countries to apply 5G to business services. China’s telecommunications guides the global 5G-technology trend. An open China is becoming the “playground” for global AI businesses and a key landmark for a joint exploration of AI’s direction of end development. Check out this video and have a look at why China can take a lead in 5G and AI technology application. Subscribe to us on YouTube:

5G Security

YouTube search... ...Google search

Three-step approach to reach a high level of intelligent security management. How to master E2E network security when introducing 5G core | Kari-Pekka Perttula - Ericsson

  • Dynamic: Introduce automated security policy configuration and compliance monitoring
  • Cognitive: Automated threat and vulnerability detection assisted with ML /AI
  • Intelligent: Repeatable, adaptive and holistic security management with threat intelligence. This provides end-to-end visibility for business-related security risks, and actions can be directed via automated workflows to mitigate risks faster.

Threat Model: STRIDE | Wikipedia The threats are:

Rambus: What Does Security Look Like When 5G Meets AI?
Presented by Neeraj Paliwal, VP and GM of Security Business Unit, Rambus. 5G represents a revolution in mobile technology with performance that will rival that of wireline networks. 5G's Ultra-Reliable Low Latency Communication (uRLLC) links will enable a profusion of AI-powered devices from delivery drones to smart cities. Given the great value and potential risks, it is critical to protect the data, devices and infrastructure resulting from the confluence of 5G and AI. This presentation will discuss the threats to, and the security solutions that can safeguard, the emerging 5G+AI world. The Linley Spring Processor Conference featured technical presentations on AI acceleration, targeting edge, automotive, IoT, and data center. Also covered were new CPU architectures, networking, security, SoC design, and other processor-related topics.

4G to 5G Evolution: In-Depth Security Perspective
RSA Conference Anand Prasad, CISO, Rakuten Mobile Networks In this talk we will present 4G security and issues identified recently followed by in-depth explanation of security enhancements in 5G. We will also cover potential security implications from usage of technologies such as virtualization in mobile networks. Finally we will summarize 5G related security activities expected in near future.Learning Objectives:1: Get a refresher on 4G security, security issues and solutions.2: Learn in-depth regarding 5G security.3: Find out considerations for end-to-end 5G network deployment.Pre-Requisites:Attendees should have some background in mobile networks and security, especially 4G will be beneficial. It is assumed that the attendees have good knowledge of information security.

Demystifying 5G Security through Threat Modeling
Zhijun Zhang, Lead Security Architect, The World Bank Group 5G promises to bring much faster data rate and many new services. At the same time it has created a lot of concerns around security risks. This talk will walk through the new technology components in a 5G network and the new services it provides, to comprehensively analyze the risks in this ecosystem through a threat model the World Bank Group developed and to discuss the mitigating controls. Pre-Requisites: Understanding of Threat models such as STRIDE.

R&S Thirty-Five: 5G security aspects
For us, security is always an important topic. The same goes for the security in the 5G era. Today’s presentation lists a few security threats as a motivation and presents further details on the sophisticated security mechanisms used in 5G, like e.g. authentication, key derivation, subscriber privacy protection and a secure communication between network functions. With R&S Thirty-Five, you can discover more about this topic here.

5G and Security – UK5G Security Sub-Group Event Day 1
5G security event sponsored by 5G Security Sub Group UK5G, part of UK5G the national advisory body for the UK’s national 5G support programme with presentations from thought leaders on a variety of security topics from Security Assurance in a 5G World to How Colt is Addressing Security Challenges for B2B to a discussion panel on Security as a Policy. KTN exists to connect innovators with new partners and opportunities - together we can drive positive change. Find out more about KTN:

5G and Security – UK5G Security Sub-Group Event Day 2
5G security event sponsored by 5G Security Sub Group UK5G, part of UK5G the national advisory body for the UK’s national 5G support programme with presentations from thought leaders on a variety of security topics from Security Assurance in a 5G World to How Colt is Addressing Security Challenges for B2B to a discussion panel on Security as a Policy. KTN exists to connect innovators with new partners and opportunities - together we can drive positive change. Find out more about KTN:

5G Testing

YouTube search... ...Google search

5G Orchestration and Automation Toward Zero Touch Service Management
HPE Technology Explore business usages and opportunities that call for the adoption of more automatic network operations, and will examine design best practices to support them. Learn more about HPE at

5G Life Cycle Automation with AI-Based Continuous Testing
B-Yond and Keysight Technologies discuss 5G Life Cycle Automation with AI-Based Continuous Testing and Validation. Key insights about how to enable full end to end life cycle automation and testing, with a practical example of a customer deployment for 5G.

Virtualization - Dynamic Spectrum Sharing (DSS)

Youtube search... ...Google search ...Google News

Spectrum Sharing utilizes virtualization to partition optical spectrum

R&S Thirty-Five: Introduction to 5G Dynamic Spectrum Sharing
5G and LTE cooperating and sharing the same frequency. Is this possible and what are the technology settings and adjustments to make this real? Check out our today´s webcast and find out what Andreas Rößler, Technology Manager at Rohde & Schwarz thinks about it!

Understanding Dynamic Spectrum Sharing (DSS)
Keysight EEsof EDA This video introduces dynamic spectrum sharing also known as LTE 5G coexistence and looks at the techniques adapted by 5G NR in order to coexist with LTE. There is a demo of verifying a DSS implementation using Keysight’s PathWave Signal Generation (N7631C, N7624C) and PathWave Vector Signal Analysis (89600 VSA) software.

Stanford Seminar - The Future of Wireless Communications Hint: It's not a linear amplifier
EE380: Computer Systems Colloquium Seminar Speaker: Douglas Kirkpatrick is the co-founder and CEO of Eridan Communications ...The future of wireless communications will demand leaps in spectrum efficiency, bandwidth efficiency, and power efficiency for successful technology deployments. Key applications that will fundamentally change how we interact with wireless systems and the demands we place on wireless technologies include Dynamic Spectrum Access Networks, massive MIMO, and the evasive unicorn of the "universal handset". While each of these breakthrough "system" capabilities make simultaneous demands of spectrum efficiency, bandwidth efficiency, and power efficiency, the current suite of legacy technologies forces system designers to make undesirable trade-offs because of the limitations of linear amplifier technology. ...Dr. Kirkpatrick was a Program Manager and Chief Scientist at the Defense Advanced Research Projects Agency (DARPA). While he was at DARPA he started and managed programs that, among other things, developed and deployed the first LED flashlights, started and validated the DOD path to bio-renewable jet fuel, developed and demonstrated ultra-high efficiency solar cells, developed and demonstrated full 3d dynamic holographic displays, and developed and demonstrated portable tools for the rapid de-novo synthesis of DNA up to 10,000 base pairs long. In addition to his DARPA role he was simultaneously the Senior Technologist for Technology Productization for the Undersecretary for Acquisition, Technology, and Logistics in the Department of Defense... Dr. Kirkpatrick is a Fellow of the American Physics Society, a Member of the IEEE, and a Member of the Materials Research Society. Dr. Kirkpatrick holds a BS degree in Physics and Mathematics (1980) from the College of William and Mary and a Ph.D. in Physics from M.I.T. (1988).

5G & Spectrum Sharing Panel, Mobile World Congress LA 2019
Industry and government leaders discuss the SC2 Championship, how this relates to other spectrum sharing efforts being pursued by industry leaders and regulators, and look forward to the future of 5G and Spectrum Sharing technologies. Moderator: John Chapin, SC2 Subject Matter Expert Panelists: - Paul Tilghman, SC2 Program Manager, DARPA - Ali Kyayrallah, Engineering Director, Ericsson Research - John Smee - VP of Engineering, Qualcomm Research - Julius Knapp - Chief, Office of Engineering and Technology, FCC - Fred Moorefield - Acting Deputy CIO - C4IIC, DoD