Chapter 2

References

Sensors. 2019;19(5)

66(6):2788-2798

2017

2016

2019

20

26-44

[1] Ramadan RA, Vasilakos AV. Brain computer interface: Control signals review. Neurocomputing. 2017;223:

detecting and weakening of cryptographic primitives. IEEE Transactions on IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2015;34(8):

[12] Al-Canaan A, Khoumsi A. Crossplatform approach to advanced IPtelephony services using JAIN-SIP. Journal of Networks. 2010;5(7):

[13] Al-Canaan A, Khoumsi A. Advanced IP-Telephony Service Creation using JAIN-SIP API: Crossplatform approach. In: Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNET 2008); December 2008; Amman,

[14] Machado-Fernandez J. Software defined radio: Basic principles and applications. Revista Facultad de Ingéniera. 2015;24(01):79-96

[15] Opencores.org. OpenCores; 2015

1236-1249

Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies

8080-8814

Jordan. pp. 46-51

[2] Jiang X, Bian GB, Tian Z. Removal of artifacts from EEG signals: A review.

[3] Shay WA. Understanding Data Communications and Networks. Boston, USA: PWS Publishing Company; 1994

[4] Manohar V, Kovitz JM, Rahmat-Samii Y. Synthesis and analysis of low profile, metal-only stepped parabolic reflector antenna. IEEE Transactions on Antennas and Propagation. June 2018;

[5] Sauter M. From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband. Hoboken, NJ, USA: Wiley;

[6] Lee W. Mobile Cellular Telecommunications: Analog and Digital Systems. Columbus, OH, USA:

McGraw Hill Education; 2017

[8] Ziemer RE, Tranter WH.

John Wiley; 2010

[7] Frenzel LE. Principles of Electronic Communication Systems. 4th ed. Columbus, OH, USA: McGraw-Hill;

Communications Systems, Modulation, and Noise. 6th ed. Hoboken, NJ, USA:

[9] Siva C, Murthy R, Manoj BS. Ad Hoc Wireless Networks. Upper Saddler River, NJ, USA: Printice Hall; 2004

[10] Wikipedia. Frequency Modulation,

[11] Swierczynski P, Fyrbiak M, Koppe P, Paar C. FPGA Trojans through
