<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>FPGA Implementation of a BPSK Modulator with Frequency Hopping</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesco Beritelli</string-name>
          <email>francesco.beritelli@.unict.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giacomo Capizzi</string-name>
          <email>gcapizzi@diees.unict.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Corrado Rametta</string-name>
          <email>rametta@diag.uniroma1.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian Napoli</string-name>
          <email>cnapoli@diag.uniroma1.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer, Control and Management Engineering, Sapienza University of Rome</institution>
          ,
          <addr-line>Via Ariosto 25, 00135, Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Electrical, Electronic and Computer Engineering, University of Catania</institution>
          ,
          <addr-line>Viale A. Doria 6, 95125, Catania</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>40</fpage>
      <lpage>44</lpage>
      <abstract>
        <p>PSK modulations are very widespread in communication due to their robustness to the noise. In order to avoid interference or for anti-jamming purposes, frequency hopping may be applied. In this work we present an FPGA implementation of a BPSK modulator based on frequency hopping. The results shows good performance, more than 300 MHz of clock system, low area occupation and low power dissipation (about 100 mW).</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Frequency Hopping</kwd>
        <kwd>DDS</kwd>
        <kwd>BPSK</kwd>
        <kwd>FPGA</kwd>
        <kwd>Spread Spectrum</kwd>
        <kwd>Anti-jamming</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        at regular intervals in a pseudo-random way through a
pre-established code. Several modern applications make
Phase-Shift Keying (PSK) modulations are the best known use of Frequency Hopping to avoid interference, among
and most used numerical modulations in the field of com- them, the most known is the Bluetooth technology [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. If
munications. The information is encoded in the carrier several terminals transmit on the same carrier, collisions
phase which assumes discrete values as a function of the are created. By applying Frequency Hopping according
bits or sequence of bits to be transmitted. The signal to a certain law, this problem is avoided. Obviously only
amplitude and frequency remain constant. Since the in- those who transmit and receive know the sequence of
formation is coded in the phase, this type of modulation frequency jumps and where there should be interference
has an excellent robustness towards amplitude errors in a given instant, it will be of short duration because
of the received symbols [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In modern applications at the next instant, the frequencies will most likely be
there was the necessity to strengthen the communication diferent. With the difusion of the IoT, secure
commuprotocols mostly for avoiding interference both volun- nications will be always more required. Sensible data,
tary (such as the case of jammers, very used in electronic locally processed by smart nodes equipped with machine
warfare [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) and involuntary (such as the transmission learning algorithms[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] (that nowadays find application in
of several devices on the same frequency [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). One of the always more fields [ 10],[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ],[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ],[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] must
most used technique useful to avoid these issues is the be transmitted over the internet in the safest way
posSpread Spectrum [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The Spread Spectrum was initially sible In such a context, FPGAs can be a powerful and
developed in the military field to avoid radio intercep- valuable ally for the de-centralization of computing as
tions. Originally, any type of transmission that guaran- for example in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
teed a non-stationary spectrum was considered a spread The paper is structured as follows: Section 2 gives a
spectrum. With the introduction of the Code Division brief introduction on PSK modulation, Section 2.1 gives
Multiple Access (CDMA) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the spread spectrum is gen- some info about frequency hopping and its
implemenerated by multiplying the information by a code. Spread tation by using Digital Direct Synthesis, in Section 3
Spectrum can be also generated by using the frequency simulation and implementation results are shown, end,
hopping technique, the so called Frequency-Hopping ifnally, in Section 4 some conclusion are discussed.
Spread Spectrum (FHSS) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. As for CDMA, FHSS is a
transmission technique used to increase the bandwidth of
a signal. It consists in varying the transmission frequency 2. PSK Modulation
There are several types of PSK modulation. Among the
most used are:
• Binary phase-shift keying (BPSK): it associates
the two binary digits 1 and 0 with two diferent
carrier phase values, such as 0° and 180°.
• Quadrature phase-shift keying (QPSK): in this
      </p>
      <p>case we have 4 equally spaced phases to represent</p>
      <sec id="sec-1-1">
        <title>An easy way to generate the carrier is the use of a</title>
        <p>
          Digital Direct Synthesizer [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] based on a 2 locations
memory where the samples for the wave generation are
stored. The binary information, i.e. the shift phase, is
given by adding an ofset to the read-address. Ofset 0
means 0° phase (bit 0), ofset 2 − 1 means 180° phase
(bit 1). A simplified scheme of our system is depicted in
Fig.2.1.
        </p>
        <p>In our experiments the number of bit N for the address
has been set to 10, as consequence the number of memory
locations is 1024. Also the number of bit of each memory
word is N=10 bit, but in general these two parameter can
be diferent. The tuning word is the input used to set the
carrier frequency following the law:
 =
 · 
2
(1)</p>
      </sec>
      <sec id="sec-1-2">
        <title>The input SEL is used to generate the binary informa</title>
        <p>tion: SEL=0 → bit 0, SEL=1 → bit 1.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. System simulation and FPGA</title>
    </sec>
    <sec id="sec-3">
      <title>Implementation</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] the authors present a frequency hopping system
based on Frequency Shift Key (FSK), in this work, we
focused our attention on PSK modulation. In detail, we
implemented a BPSK modulatior but the developed
system is suitable for any PSK modulation. Fig.2 depicts the
time behavior of a BPSK modulation. The carrier phase
(b) changes at varying of binary signal (a).
      </p>
      <p>In Fig.2, is instead shown the constellation of a BPSK.</p>
      <sec id="sec-3-1">
        <title>Before the implementation, the system has been simu</title>
        <p>lated first in floating point and then in fixed point by
using Simulink. After the system simulation the system
has been coded in VHDL and implemented in a Xilinx
Zynq 7020 FPGA. Fig.3 shows the exact correspondence
between the simulink simulation and the Xilinx Vivado.</p>
        <p>The Fig.3 shows the positive timing closure of the
system with a clock period of 3 ns corresponding to 333
2.1. Frequency Hopping with Digital MHz.</p>
        <p>About the power consumption, we did first an
estima</p>
        <p>Direct Synthesis (DDS) tion without considering the switching activity of the
The aim of a frequency-hopping-based system is to jump circuit nodes (see Fig.3), and then we repeated the same
to diferent frequencies. An example is depicted in Fig.2.1, estimation by using the value of switching activity
prowhere are shown all 79 frequencies where a device Blue- vided by the simulation (see Fig.3). In the latter case, the
tooth may work. value depends on the input test vectors.</p>
      </sec>
      <sec id="sec-3-2">
        <title>In both cases the estimated power is similar and is 147 mW for vectorless estimation and 120 mW for vectorbased estimation. The last aspect of the system implementation is the</title>
        <p>resources utilization on FPGA. The synthesis results are
shown in Fig.3</p>
        <p>As can be seen, the resource utilization is very low. By
increasing the value of N, the resource utilization will
increase linearly with the exception of the memory used to
store the wave samples that will increase exponentially.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>We propose the FPGA implementation of a BPSK
modulator based on frequency hopping. The system can be used
both for anti-jamming applications or to avoid collision
when two devices transmit on the same carrier. The
system has been tested with a clock frequency of 333 MHz
on a Xilinx Zynq 7020 device. The system makes use of a
very limited number of hardware resources with a power
dissipation of 120 mW.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <sec id="sec-5-1">
        <title>This work has been supported by the project “GreenTAGS” funded by the Italian Ministry of University and Research within the PRIN founding scheme 2017 (CUP B88D19003660001).</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. Q.</given-names>
            <surname>Hadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ehkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Anuar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Dawood</surname>
          </string-name>
          ,
          <article-title>Performance comparison of stbc-ft based ofdm wireless communication system using m-qam and m-psk modulation techniques</article-title>
          ,
          <source>in: 2016 3rd International Conference on Electronic Design (ICED)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>174</fpage>
          -
          <lpage>179</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICED.
          <year>2016</year>
          .
          <volume>7804631</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Ramlan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mohamad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Arbain</surname>
          </string-name>
          ,
          <article-title>Implementation of m-ary phase shift keying (psk</article-title>
          ) basedoi:
          <fpage>10</fpage>
          .1109/ICCAIE.
          <year>2011</year>
          .
          <volume>6162210</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <article-title>A new electronic jamming method inspried from bionics system</article-title>
          ,
          <source>in: 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>572</fpage>
          -
          <lpage>576</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSIP49896.
          <year>2020</year>
          .
          <volume>9339414</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Bianco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Marrocco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mazzenga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mejia-Aguilar</surname>
          </string-name>
          ,
          <article-title>Lora system for search and rescue: Path-loss models and procedures in mountain scenarios</article-title>
          ,
          <source>IEEE Internet of Things Journal</source>
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>1985</fpage>
          -
          <lpage>1999</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Duraisamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <article-title>Performance of selfencoded spread spectrum under pulsed-noise jamming</article-title>
          ,
          <source>in: 2010 IEEE 11th International Symposium on Spread Spectrum Techniques and Applications</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>174</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISSSTA.
          <year>2010</year>
          .
          <volume>5649468</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L. L.</given-names>
            <surname>Hanzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.-L.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-L.</given-names>
            <surname>Kuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yen</surname>
          </string-name>
          , CDMA Overview,
          <year>2004</year>
          , pp.
          <fpage>35</fpage>
          -
          <lpage>80</lpage>
          . doi:
          <volume>10</volume>
          .1002/ 0470863110.ch2.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bouzid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Trabelsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Elabed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Masmoudi</surname>
          </string-name>
          ,
          <article-title>Fpga implementation of fhss-fsk modulator</article-title>
          ,
          <source>in: 2008 3rd International Conference on Design and Technology of Integrated Systems in Nanoscale Era</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/DTIS.
          <year>2008</year>
          .
          <volume>4540261</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Marcel</surname>
          </string-name>
          ,
          <article-title>How Bluetooth Technology Uses Adaptive Frequency Hopping to Overcome Packet Interference</article-title>
          ,
          <source>Technical Report</source>
          ,
          <string-name>
            <surname>Bluetooth</surname>
            <given-names>SIG</given-names>
          </string-name>
          ,
          <year>2020</year>
          . URL: https://www.bluetooth.com/blog/ how
          <article-title>-bluetooth-technology-uses-</article-title>
          <string-name>
            <surname>adaptive</surname>
          </string-name>
          \
          <article-title>-frequency-hopping-to-overcome-</article-title>
          <string-name>
            <surname>packet</surname>
          </string-name>
          \
          <article-title>-interference.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Illari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Avanzato</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Napoli, Reducing the psychological burden of isolated oncological patients by means of decision trees</article-title>
          , volume
          <volume>2768</volume>
          ,
          <source>band modem on texas instrument digital signal</source>
          <year>2020</year>
          , p.
          <fpage>46</fpage>
          -
          <lpage>53</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>processor tms320c6713</article-title>
          , in: 2011 IEEE Interna- [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonanno</surname>
          </string-name>
          , G. Capizzi,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Sciuto</surname>
          </string-name>
          ,
          <article-title>A neuro tional Conference on Computer Applications and wavelet-based approach for short-term load foreIndustrial Electronics (ICCAIE</article-title>
          ),
          <year>2011</year>
          , pp.
          <fpage>627</fpage>
          -
          <lpage>632</lpage>
          .
          <article-title>casting in integrated generation systems</article-title>
          , in: 2013
          <source>International Conference on Clean Electrical Power (ICCEP)</source>
          , IEEE,
          <year>2013</year>
          , pp.
          <fpage>772</fpage>
          -
          <lpage>776</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Avanzato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Beritelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Vaccaro, Yolov3-based mask and face recognition algorithm for individual protection applications</article-title>
          , volume
          <volume>2768</volume>
          ,
          <year>2020</year>
          , p.
          <fpage>41</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonanno</surname>
          </string-name>
          , G. Capizzi,
          <article-title>Exploiting solar wind time series correlation with magnetospheric response by using an hybrid neuro-wavelet approach</article-title>
          ,
          <source>Proceedings of the International astronomical union 6</source>
          (
          <year>2010</year>
          )
          <fpage>156</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Simonetta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Paoletti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Muratore</surname>
          </string-name>
          ,
          <article-title>A new approach for designing of computer architectures using multi-value logic</article-title>
          ,
          <source>International Journal on Advanced Science, Engineering and Information Technology</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>1440</fpage>
          -
          <lpage>1446</lpage>
          . URL: http://ijaseit.insightsociety. org/index.php
          <article-title>?option=com_content&amp;view= article&amp;id=9&amp;Itemid=1&amp;article_id=15778</article-title>
          . doi:
          <volume>10</volume>
          .18517/ijaseit.11.4.15778.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>G. De Magistris</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Russo</surname>
            , P. Roma, J. Starczewski,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>An explainable fake news detector based on named entity recognition and stance classification applied to covid-19,</article-title>
          <string-name>
            <surname>Information</surname>
          </string-name>
          (Switzerland)
          <volume>13</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/info13030137.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Tramontana,</surname>
          </string-name>
          <article-title>An agentdriven semantical identifier using radial basis neural networks and reinforcement learning</article-title>
          , volume
          <volume>1260</volume>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>C.</given-names>
            <surname>Pasquarella</surname>
          </string-name>
          , et al.,
          <article-title>Microbial environmental contamination in italian dental clinics: A multicenter study yielding recommendations for standardized sampling methods and threshold values</article-title>
          ,
          <source>Science of the total environment 420</source>
          (
          <year>2012</year>
          )
          <fpage>289</fpage>
          -
          <lpage>299</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fallucchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gerardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Petito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. W. D.</given-names>
            <surname>Luca</surname>
          </string-name>
          ,
          <article-title>Blockchain framework in digital government for the certification of authenticity, timestamping and data property</article-title>
          ,
          <source>in: Proceedings of the 54th Hawaii International Conference on System Sciences | 2021</source>
          , University of Hawai'i at Manoa, Honolulu,
          <string-name>
            <surname>HI</surname>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>2307</fpage>
          -
          <lpage>2316</lpage>
          . doi:
          <volume>10</volume>
          .24251/HICSS.
          <year>2021</year>
          .
          <volume>282</volume>
          , http://hdl.handle.net/10125/70895.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Strelnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ryabov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. S.</given-names>
            <surname>Klyuzhev</surname>
          </string-name>
          ,
          <article-title>Direct digital synthesizer of phase-manipulated signals, based on the direct digital synthesis method</article-title>
          ,
          <source>in: 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/ SYNCHROINFO49631.
          <year>2020</year>
          .
          <volume>9166040</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>