2023
DOI: 10.36227/techrxiv.170244520.01558910/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Analytical Characterization of a Transmission Loss of an Antenna-Embedded Wall

lauri vähä-savo,
Lorenzo Veggi,
Enrico M Vitucci
et al.

Abstract: An analytical model for an antenna-embedded wall, also called signal-transmissive wall, is presented in this work. In the signal-transmissive wall, multiple antenna elements are distributed periodically on both wall sides, and connected back-to-back through coaxial cables. Numerical full-wave simulations of the signal-transmissive wall are computationally demanding due to the fine meshes required in the cables while having an electrically large wall size. Therefore the simulations above 8 GHz are not feasible … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 5 publications
1
2
0
Order By: Relevance
“…2), which allows to assert the presence of a data leak in the information transmission channel. The formulated conclusions about the physical justification of the results obtained do not contradict similar conclusions obtained by other authors about the possibility of detecting data leaks in information systems [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. The algorithm for searching for the associative dependence of control features for quickly identifying the presence of a data leak should be constantly used during the operation of the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 76%
See 2 more Smart Citations
“…2), which allows to assert the presence of a data leak in the information transmission channel. The formulated conclusions about the physical justification of the results obtained do not contradict similar conclusions obtained by other authors about the possibility of detecting data leaks in information systems [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. The algorithm for searching for the associative dependence of control features for quickly identifying the presence of a data leak should be constantly used during the operation of the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 76%
“…The conducted analysis [2,3,5] shows that expert methods and the method based on the calculation of the correlation between the characteristics are most often used to determine the dependence between the characteristics [5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Literature and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation