<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Protection of Information Networks Based on LoRa Technology</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Pukhov Institute for Modeling in Energy Engineering of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The paper deals with modern technology for transmitting short messages over long distances named LoRa, where the transmitted signal uses linear frequency modulation (chirp). The object of the study to define lack of transmitters that it has a design on LoRa technology for assessment their applicable in condition urban city where there are a lot of radiation sources. The goal of the work is the creation of a method of assessing the act the interference conditions that based on measurement bit error rate and signal-noise ratio and via on which to get individual host vulnerability levels. The processing of these signals is carried out by means of a time-frequency transformation. The chirp signal is characterized by 4 parameters: frequencies, time, modulation rate and amplitude. By analogy with the wavelet transform, the processing of chirp signals involves a chirplet decomposition. Since the chirp signals are strongly influenced by mutual interference due to multipath, the article studies the effectiveness of LoRa technology in conditions of mutual interference of radiation sources. The developed method utilized chirplet decomposition and retrieve symbols of a message in the dictionary. The conducted experiments have confirmed the proposed software operability and allow recommending it for use in practice for solving the problems receiving signal. The prospects for further research may include the creation of parallel methods for calculation of the set of proposed indicators, the improvement of software, as well as an experimental study of proposed indicators in real conditions.</p>
      </abstract>
      <kwd-group>
        <kwd>Chirp</kwd>
        <kwd>Time-Frequency Transform</kwd>
        <kwd>Chirplet Decomposition</kwd>
        <kwd>LoRa Technology</kwd>
        <kwd>Interference</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>tude, center frequency, deviation range and the center of the pulse. Each symbol is
assigned a chirp, characterized by these 4 parameters. A complete set of symbols
forms a dictionary of chirplets, named by analogy with wavelets. The analysis of the
message consists of selecting symbols from the dictionary and finding the best
matching of the chirplets to the symbols of the received message. This analysis, called a
chirplet decomposition, is carried out in the time-frequency domain. In spite of the
fact that chirp signals use the spreading of the spectrum the jamming in the receiving
channel cause some difficulties. Processing of chirp signals is complicated by mutual
interference from similar sources, as a result of which the received signal has
distortions. The main goal of the paper is to research the effectiveness of the chirplet
decomposition under interference conditions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Review of the Literature</title>
      <p>
        Previous work [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] addressed general issues of network congestion assessment,
without reference to vulnerability. However, solution providers, operators, and researchers
show a natural interest in the latest network technology LoRa. The most detailed
analysis of this technology is presented in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This paper deals with some open
questions related to LoRa research and development. The innovative mathematical model
of the network LoRaWAN is presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This model provides a determination of
the network capacity and reliability of information transmission. Mathematical
simulation of the radio channel for the LoRaWAN transceiver in various operating states
for different environments covering the urban, suburban and rural areas is given in
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The study in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] has shown that the best suitable model for all registered levels of
the received measurement signal is described by the Nakagami distribution and, in
general, LoRa is a reliable portable wireless technology. Asynchronous protocol
LoRaWAN by type ALOHA for access to the channel without the limitation of the
working cycle is presented in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        However, the processing of LoRa signals is currently not fully researched. The
quality of signal processing is based on the research of their types and the methods of
protection against interference that are used. It should be noted that the use of
frequency analysis alone, in conjunction with classical digital processing, as it was used
in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], is not suitable since LoRa uses spread spectrum technology. Measurement of
only the center frequency of the signal is not sufficient to decipher the complete
message. General information on the modulation used in LoRa technology is given in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
The main technology is the use of signals with linear frequency modulation.
Processing chirp signal based on decomposition by Gaussian chirplets was an active
area of research in signal processing in the 90s of the last century [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>
        The approach to chirplet-decomposition of the received signal is presented in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
However, the expansion of the adopted chirp on the basis of Gaussian functions
turned out to be unsuitable, since Gaussian chirplets do not form an orthogonal basis.
A promising solution was the scheme of decomposition of signals based on matching.
An algorithm for searching of optimal Gaussian chirplets using a crude dictionary is
presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. A similar algorithm for estimating the characteristics of visually
evoked potentials (VEP) based on the Chirplet representation is applied in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In
[
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ] the structure of the Chirp-Binary Orthogonal Keying (BOK) system is
studied on a background of white Gaussian noise and a frequency filter for eliminating
slit-like interference in direct-spectrum communications (DSC).
      </p>
      <p>
        The main result of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] is the estimation of the number of erroneous bits (BER) in
the Chirp-BOK system. The protection of the receiving channel based on the
decomposition of chirplet is presented in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This paper also shows some
chirpletdecomposition possibilities under interference conditions. The obtained results can be
used in many areas including systems of communications of unmanned aerial vehicles
for monitoring objects of different type [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Problem Statement</title>
      <p>Chirp is a signal that has the form</p>
      <p>a(t) cos(2ft  ct 2 ) if t   0 / 2;
s(t)  
 0, otherwise,</p>
      <p>
S ( f )   s(t)e j2ft dt

(1)
(2)
(3)
where a (t) is the law of amplitude variation (envelope); f is the central frequency; t is
time, and c is the phase modulation coefficient. If c &gt; 0, the frequency increases, if
c&lt;0, the frequency decreases, c = 0 corresponds to a harmonic signal that is not
modulated in frequency; 0 is the pulse duration.</p>
      <p>The received signal can be presented as an additive mixture of a useful signal s(t),
a white noise with zero mean n(t) and a signal of re-reflections w(t)</p>
      <p>y(t )  s(t)  n(t )  w(t)</p>
      <p>The main indicators of information network security are topological characteristics,
one of which is a host’s vulnerability. Host vulnerability is determined based on
known vulnerabilities and the main type of vulnerability for LoRa system is the
interference for receiving set. To assess the quality of reception, we use the signal-to-noise
ratio and bit error rate and estimate the effectiveness of the LoRa system under
consideration by measuring the signal-to-noise ratio in a densely populated urban area.
4</p>
      <p>Elements of Protection
LoRa technology has a few elements of protection. First of them is a signal spectrum
that it is completely determined by the phase modulation component and represents
the Fourier transform of the signal s (t), i.e.</p>
      <p>For the signal s(t), representing a rectangular pulse of unit amplitude, i.e. a(t) = 1
and duration 0, expression (2) can be written in the form</p>
      <p>S ( f )  0/ 2 e jct2 e j2ft dt</p>
      <p>m
u
tr
c
e
p
S
e
d
u
ilt
p
m
A</p>
      <p>It should be noted that the width of the spectrum is an indirect indicator of security
since high-density interference is difficult to create in a wide frequency range.</p>
      <p>The next element of protection is encoding a chirp signal. In decoding used to use
chirplet decomposition. Chirplet is a Gaussian function of the form
where tc, fc are parameters of the time and frequency of the function;  is the variance,
which determines the duration of the chirp function; and c is the modulation rate.
The Gaussian chirplet is a fundamental function. Therefore, it is desirable to represent
the receiving signal during its processing as a weighted sum of Gaussian chirplet. The
form of the chirplet signal is shown in Fig. 2.
For the parameters tc = 0,  = 1, c = 0, fc = 0, the function gc(t) takes the form
(6)
(7)</p>
      <p>Expression (6) is called the base function of transformations. Modification (6) can
be used for the identification of parameters of the Gaussian function for its
representation by a harmonic oscillation with frequency modulation of a given kind.</p>
      <p>
        A set of chirplets can be used for the representation of chirp particles. For this
purpose, in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] it was suggested to use time convolution, frequency multiplication
together with time and frequency shifts. Unfortunately, this approach to chirplet
transformation does not give a positive result, because these transformations are interdependent,
therefore such a chirplet cannot be chosen as a basis for orthogonal functions [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Recently, a direction has been developed, related to the development of the Fourier
transform, in particular, a fractional Fourier transform, which measures the angular
distribution of the signal energy in the time-frequency plane. This operator, given by
the Wigner distribution for the signal s(t)</p>
      <p>W (t, ) 
1  st   s *  t   e  j d
2   2   2 
rotates the signal in the time-frequency plane. In formula (7) asterisk for signal s*(t)
means the complex conjugate signal s(t),  is the angular frequency equal to 2f.
Rotation represents a special combination of chirp convolution and of multiplication
chirp as a result of an orthogonal transformation of time-frequency coordinates. This
property is achieved by multiplying on the scale factor, using rotation, and by the time
and frequency shifts that form the four time-frequency atom parameters. However, it
is possible to use the chirplet decomposition to represent the complex signal in a
compact form. The appropriate time-frequency transform is presented in Fig. 3.
where pe is the bit error probability of the information bit or bit error rate (BER), N is
the number of bits in the packet. Assuming pe small, we get</p>
      <p>p p  pe N.</p>
      <p>To reduce the errors in the transmission of the information packets if they have
equal length of the packet N, we need to decrease the value of the bit error pe as
follows from expression (7).</p>
      <p>
        There are known [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] relations for estimating BER when representing the
transmission channel by the additive Gaussian white noise model. Therefore, the BER of
binary phase-shift keying (BPSK) modulation is
      </p>
      <p>In the chirplet expansion, the signal parameters g()= g [(l, , t, )] are
determined. The received signal is digitized, resulting in a set of g(n)= g[(ln, n, tn, n)], n
 N. And n is the set of possible sampled parameter values form a dictionary D, i.e. n
 D. Any function s(t) can be represented by a set of atoms g(). An algorithm that
allows searching a suitable combination of data from a dictionary should provide a
maximum of the search function
(9)
(20)
(31)
(42)
(53)
and carry out the next steps</p>
      <p>R0  s(t)</p>
      <p>R1  R0  sg0 g0</p>
      <p>The parameters s(t) specifying a maximum (10), will determine the maximum
approximation to the original signal. In this case, the parameter ln determines the time
domain dilatation, and its reciprocal value is the signal compression in the frequency
domain, the ellipse rotation angle n corresponds to the linear modulation of the
signal center frequency, and the variables tn, n are the time and frequency of the central
part of the signal. It becomes necessary to develop an algorithm for searching s(n).</p>
      <p>The peculiarity of the algorithm is that a set of parameters is selected from the
parameter block dictionary. The algorithm is iterative to provide the best internal signal
structure by computing the scalar product of the functions s( n ), gcn . The received
value must satisfy the condition
sg0  sup sg</p>
      <p></p>
      <p>Further, we compute the remainder term, which at the beginning of the algorithm is
equal to the signal itself
The stopping criterion is the ratio
(75)
(16)
(87)
(98)</p>
      <p>The higher this ratio value, the worse the chosen decomposition parameters.
5</p>
    </sec>
    <sec id="sec-4">
      <title>Experiments</title>
      <p>Consider a typical signal LoRa system that is a linear frequency modulated pulse
signal. This signal can be obtained, for example, with a voltage-controlled oscillator
in the form (1). A useful signal is a packet of pulses with binary modulation. In this
case, the logical signal “1” corresponds to the condition с &gt; 0 and the opposite signal,
a logical “0”, is obtained if c &lt; 0.</p>
      <p>In the experiment, a LoRa system transceiver is based on the SX1276 chip to
transmit a short message at a frequency of 868 MHz. The receiver is installed on the
top floor of the building. The transmitter gradually moves through the building from
the top floor to the basement room, which creates interference. In addition,
interference is created by mobile communication transmitters, whose antennas are located
on the roof of the building. In addition to the signal-to-noise ratio, the reception
quality was also determined by determining the number of erroneous bits in a message and
measuring the bit error rate (BER). The measurement scheme is shown in Fig. 5.</p>
      <p>The transmitting antennas of mobile operators and Wi-Fi routers that located near
the building create jamming with reception. The signals of these devices create an
interfering background, which is taken for "white" noise n(t). Crosstalk w(t) is created
by multiple re-reflection raying from the interior of the building from the reinforced
concrete structures. On each floor of the building, the level of signal and noise is fixed
and the quality of the message is controlled. The panoramic receiver selected as the
benchmark additionally documents the measurement results. A preliminary analysis
of the interference situation presented in Fig. 6.</p>
      <p>The results of the measured BER and signal error ratio are presented in Fig. 7.</p>
      <p>The obtained results allow us to represent the vulnerability of the host numerical
scale, when the high level of vulnerability corresponds to BER = 10%, SNR = -10 dB,
the average level of vulnerability BER = 5%, SNR = -5 dB, weak level BER = 2%,
SNR = 2 дБ.
6</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>Although LoRa technology is relatively new for telecommunication systems, linear
frequency modulation signals are used for data transmission, which are considered
standard in wireless communication systems over short distances (IEEE 802.15.4a).
The complexity of processing this type of signals is associated with the need for
simultaneous time-frequency analysis of the received signal.</p>
      <p>Moreover, an improvement in the accuracy of time measurement leads to
deterioration in the accuracy of frequency measurement and vice versa, which is explained by
the time-frequency uncertainty principle known in radar. The output in this situation
is the time-frequency decomposition of the received signal using the matching pursuit
algorithm to the message dictionary. The peculiarity of the study is the most suitable
use environment-a densely populated district in the city. The result of the study shows
that the placement of devices on the surface gives quite good results. Acceptable
results are achieved on the 1st and 2nd floor, where BER is about 1% and the
signal-tonoise ratio is not worse than 1-2 dB. Future research is planned to focus on the
creation of parallel methods for calculation of the set of proposed indicators, the
improvement of software, as well as an experimental study of proposed indicators in real
conditions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Kucherov</surname>
            ,
            <given-names>D.P.</given-names>
          </string-name>
          :
          <article-title>Control of Computer Network Overload</article-title>
          .
          <source>In: Information Technologies and Security (ITS</source>
          <year>2017</year>
          ), pp.
          <fpage>69</fpage>
          -
          <lpage>75</lpage>
          , Kiev, Ukraine, http://ceur-ws.
          <source>org/</source>
          Vol-2067/, last accessed
          <year>2018</year>
          /11/21
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Adelantado</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vilajosana</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuset-Peiro</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melià-Seguí</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watteyne</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Understanding the limits of LoRaWAN</article-title>
          . IEEE Communications Magazine,
          <volume>55</volume>
          (
          <issue>9</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bankov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khorov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyakhov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mathematical model of LoRaWAN channel access with capture effect</article-title>
          .
          <source>In: IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , IEEE, Montreal, QC, Canada (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Catherwood</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Little</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McLaughlin</surname>
            ,
            <given-names>J.A.D.</given-names>
          </string-name>
          :
          <article-title>Channel characterisation for wearable LoRaWAN monitors</article-title>
          .
          <source>Loughborough Antennas &amp; Propagation Conference (LAPC</source>
          <year>2017</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , IEEE, Loughborough,
          <string-name>
            <surname>UK</surname>
          </string-name>
          , (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Deng</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nie</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>An improved LoRaWAN protocol based on adaptive duty cycle</article-title>
          .
          <source>IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC)</source>
          , pp.
          <fpage>1122</fpage>
          -
          <lpage>1125</lpage>
          , IEEE, Chongqing, China (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kucherov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Іdentification approach to determining of radio signal frequency</article-title>
          .
          <source>International Conference on Antenna Theory and Techniques (ICATT)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , IEEE, Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <fpage>AN1200</fpage>
          .22. LoRa™ Modulation Basics. Revision 2, May
          <year>2015</year>
          . 2015
          <string-name>
            <given-names>Semtech</given-names>
            <surname>Corporation</surname>
          </string-name>
          , Wireless Sensing and Timing Products Division, https://www.semtech.com/uploads/documents/ an1200.22.pdf,
          <source>last accessed</source>
          <year>2018</year>
          /11/21.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Mann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haykin</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The chirplet transform: physical consideration</article-title>
          .
          <source>IEEE Trans. on Signal Processing</source>
          ,
          <volume>43</volume>
          (
          <issue>11</issue>
          ),
          <fpage>2745</fpage>
          -
          <lpage>2761</lpage>
          (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ashino</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagasw</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaillancourt</surname>
          </string-name>
          , R.:
          <article-title>Gabor, wavelet and chirplet transforms in the study of pseudodifferential operators</article-title>
          .
          <source>Surikaisekikenkyusho Kokyuroku</source>
          ,
          <volume>1036</volume>
          (
          <issue>10098</issue>
          ), pp.
          <fpage>23</fpage>
          -
          <lpage>45</lpage>
          , (
          <year>1997</year>
          ), https://www.osaka-kyoiku.ac.jp/~ashino/pdf/rimsr.pdf,
          <source>last accessed</source>
          <year>2018</year>
          /11/21.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bultan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A four-parameter atomic decomposition of chirplets</article-title>
          .
          <source>IEEE Trans. on Signal Processing</source>
          ,
          <volume>47</volume>
          (
          <issue>3</issue>
          ),
          <fpage>731</fpage>
          -
          <lpage>745</lpage>
          (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Yin</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qian</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A fast refinement for adaptive Gaussian chirplet decomposition</article-title>
          .
          <source>IEEE Trans. on Signal Processing</source>
          ,
          <volume>50</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1298</fpage>
          -
          <lpage>1306</lpage>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Cui</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wong</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Time-frequency analysis of visual evoked potentials using chirplet transform</article-title>
          .
          <source>Electronics Letters</source>
          ,
          <volume>41</volume>
          (
          <issue>4</issue>
          ),
          <fpage>217</fpage>
          -
          <lpage>218</lpage>
          (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fei</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Performance of chirp spread spectrum in wireless communication systems</article-title>
          .
          <source>In: 11th IEEE Singapore International Conference on Communication Systems (SICCS)</source>
          , pp.
          <fpage>466</fpage>
          -
          <lpage>469</lpage>
          , IEEE, Guangzhou, China (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Bultan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akansu</surname>
            ,
            <given-names>A.N.:</given-names>
          </string-name>
          <article-title>A novel time-frequency exciser in spread spectrum communications for chirp-like interference</article-title>
          .
          <source>In: IEEE International Conference on Acoustics, Speech and Signal Processing</source>
          ,
          <source>(ICASSP '98)</source>
          , pp.
          <fpage>3265</fpage>
          -
          <lpage>3268</lpage>
          , IEEE, Seattle, WA, USA (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>Y.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jeon</surname>
          </string-name>
          ,
          <string-name>
            <surname>J-J. Pseudo Wigner-Ville</surname>
          </string-name>
          time
          <article-title>-frequency distribution and its application to machinery condition monitoring</article-title>
          .
          <source>Shock and Vibration</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <fpage>65</fpage>
          -
          <lpage>76</lpage>
          (
          <year>1993</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>