I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
7
,
No
.
4
,
A
u
g
u
s
t
201
7
,
p
p
.
2
1
0
1
~
2
1
0
8
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v7
i
4
.
p
p
2
1
0
1
-
2108
2101
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
So
urce
b
a
sed S
ec
urity Is
sues
in
W
DM
Sys
te
m
s
A.
Ant
w
iwa
a
,
A.
K
u
m
a
r,
A.
K
J
a
is
wa
l
De
p
a
rtme
n
t
o
f
El
e
c
tro
n
ics
a
n
d
C
o
m
m
u
n
ica
ti
o
n
E
n
g
in
e
e
rin
g
,
S
a
m
Hig
g
in
Bo
tt
o
m
Un
iv
e
rsit
y
o
f
A
g
ri
c
u
lt
u
re
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ma
r
2
8
,
2
0
1
7
R
ev
i
s
ed
J
u
n
6
,
2
0
1
7
A
cc
ep
ted
J
u
n
2
0
,
2
0
1
7
T
h
e
issu
e
o
f
se
c
u
rit
y
h
a
s
b
e
c
o
m
e
a
b
ig
g
e
r
h
e
d
d
le
f
o
r
a
ll
tele
c
o
m
m
u
n
ica
ti
o
n
c
o
m
p
a
n
ies
to
c
li
m
b
in
th
is
e
ra
w
h
e
re
in
f
o
r
m
a
ti
o
n
h
u
n
g
ry
c
u
st
o
m
e
rs
a
r
e
in
c
re
a
sin
g
d
a
il
y
.
Un
a
u
th
o
rize
d
u
se
rs
a
re
f
in
d
in
g
n
o
v
e
l
w
a
y
s
o
f
a
c
c
e
ss
in
g
in
f
o
rm
a
ti
o
n
o
f
o
th
e
rs
a
n
d
th
e
re
b
y
a
tt
a
c
k
in
g
th
e
re
q
u
isit
e
leg
it
i
m
a
te
u
se
rs’
in
f
o
rm
a
ti
o
n
a
c
c
o
u
n
ti
n
g
to
se
c
u
rit
y
th
re
a
ts.
In
th
i
s
w
o
rk
,
tw
o
f
o
rm
s
o
f
W
DM
s
y
ste
m
a
tt
a
c
k
s
w
il
l
b
e
c
o
n
sid
e
re
d
.
T
h
e
se
a
tt
a
c
k
s in
c
lu
d
e
a
c
lo
n
e
so
u
rc
e
b
a
se
d
a
tt
a
c
k
w
h
e
r
e
th
e
a
d
v
e
rsa
r
y
tri
e
s
to
re
p
li
c
a
te
th
e
tran
s
m
it
ted
sig
n
a
l
o
f
th
e
leg
it
ima
te
u
se
r
b
y
tran
s
m
it
ti
n
g
a
t
th
e
sa
m
e
wa
v
e
len
g
th
a
n
d
p
o
w
e
r
a
n
d
th
e
d
if
f
e
re
n
t
w
a
v
e
len
g
th
so
u
rc
e
b
a
se
d
a
tt
a
c
k
w
h
e
re
th
e
a
d
v
e
rs
a
r
y
tra
n
sm
it
a
t
a
w
a
v
e
len
g
th
d
iff
e
r
e
n
t
f
ro
m
th
a
t
o
f
th
e
leg
it
i
m
a
te
u
se
r
th
e
re
b
y
c
re
a
ti
n
g
in
tera
c
ti
o
n
e
f
f
e
c
ts
ig
n
it
in
g
se
c
u
rit
y
is
su
e
s.
F
in
a
ll
y
,
a
si
m
u
latio
n
o
f
th
e
o
u
tco
m
e
w
il
l
b
e
c
o
n
sid
e
re
d
a
n
d
t
h
e
re
su
lt
in
g
o
u
t
p
u
t
w
il
l
b
e
a
n
a
ly
z
e
d
.
K
ey
w
o
r
d
:
A
d
v
er
s
ar
y
A
ttac
k
C
lo
n
e
Secu
r
it
y
So
u
r
ce
b
ased
Co
p
y
rig
h
t
©
2
0
1
7
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
An
ita
An
t
w
i
w
aa
,
Dep
ar
t
m
en
t o
f
E
lectr
o
n
ics a
n
d
C
o
m
m
u
n
icat
io
n
E
n
g
i
n
ee
r
in
g
,
Sa
m
Hi
g
g
i
n
B
o
tto
m
U
n
i
v
er
s
it
y
o
f
Ag
r
icu
lt
u
r
e
T
ec
h
n
o
lo
g
y
a
n
d
Scien
ce
,
2
1
1
0
0
7
,
A
llah
ab
ad
,
R
e
w
a
R
o
a
d
,
I
n
d
ia
.
E
m
ail: a
n
itaa
n
t
w
i
w
aa
@
y
ah
o
o
.
co
m
1.
I
N
T
R
OD
U
C
T
ION
W
av
elen
g
t
h
d
iv
i
s
io
n
m
u
ltip
le
x
in
g
(
W
DM
)
h
a
s
th
e
ca
p
ab
ili
t
y
o
f
tr
a
n
s
m
itt
in
g
o
n
to
a
s
in
g
le
o
p
tical
f
ib
er
m
u
ltip
le
n
u
m
b
er
o
f
s
ig
n
als
w
it
h
d
if
f
er
en
t
w
a
v
elen
g
t
h
.
Dif
f
er
en
t
in
f
o
r
m
at
io
n
c
h
an
n
e
ls
ca
n
b
e
ad
d
ed
o
r
ex
tr
ac
ted
at
d
i
f
f
er
e
n
t
lo
ca
tio
n
b
y
e
m
p
lo
y
in
g
th
e
s
er
v
ice
s
o
f
ad
d
/d
r
o
p
m
u
ltip
le
x
er
.
T
h
is
ad
d
s
f
le
x
ib
ilit
y
to
th
e
W
DM
s
y
s
te
m
[
1
-
3
]
.
W
DM
s
y
s
te
m
u
p
o
n
it
s
n
u
m
er
o
u
s
ad
v
a
n
ta
g
es a
ls
o
f
ac
es a
lo
t
o
f
s
ec
u
r
it
y
t
h
r
ea
ts
.
Secu
r
it
y
h
as b
ec
o
m
e
a
m
aj
o
r
co
n
ce
r
n
to
to
d
ay
’
s
telec
o
m
m
u
n
icatio
n
.
C
o
m
p
a
n
i
es
ar
e
s
tr
iv
i
n
g
to
f
i
n
d
w
a
y
s
o
f
p
r
o
tectin
g
t
h
e
in
te
g
r
it
y
o
f
t
h
e
d
ata
o
f
t
h
eir
c
u
s
to
m
er
s
.
Am
id
s
t
all
s
tr
iv
e
s
,
d
ata
th
e
f
t
h
as
i
n
cr
ea
s
ed
e
x
p
o
n
en
t
iall
y
w
it
h
i
n
t
h
e
y
ea
r
s
.
Sev
er
al
r
ev
ie
w
liter
at
u
r
es
in
[
4
-
8
]
h
av
e
d
is
cu
s
s
ed
s
o
m
e
t
h
eo
r
etica
l
m
et
h
o
d
s
w
h
i
ch
ca
n
b
e
u
s
ed
to
d
etec
t so
m
e
attac
k
s
w
h
ich
an
attac
k
er
ca
n
i
n
f
lict
u
p
o
n
t
h
e
i
n
f
r
astr
u
ctu
r
e
o
f
a
n
a
ll o
p
tical
n
et
w
o
r
k
.
T
h
e
attac
k
s
co
n
s
id
er
ed
in
cl
u
d
e
tr
af
f
ic
a
n
a
l
y
s
i
s
,
d
ata
d
ela
y
,
s
er
v
ice
d
en
i
al,
ea
v
esd
r
o
p
p
in
g
,
q
u
al
it
y
o
f
s
er
v
ice
d
eg
r
ad
atio
n
an
d
s
p
o
o
f
i
n
g
.
A
ttac
k
s
h
a
s
b
ee
n
ca
te
g
o
r
ized
in
to
3
t
y
p
es
[
9
-
1
1
]
n
a
m
el
y
d
ir
ec
t
at
tack
w
h
er
e
th
e
attac
k
er
ai
m
s
at
th
e
tr
an
s
m
is
s
io
n
n
et
w
o
r
k
,
o
p
tical
a
m
p
li
f
ier
s
a
n
d
o
p
tical
tr
an
s
m
is
s
io
n
to
ca
u
s
e
j
a
m
m
i
n
g
,
g
ain
co
m
p
etit
io
n
an
d
f
ib
er
cu
t
r
e
s
p
ec
tiv
el
y
.
T
h
e
attac
k
er
ca
n
al
s
o
ai
m
at
ce
r
tain
n
et
w
o
r
k
ele
m
e
n
t
s
to
ca
u
s
e
i
n
d
ir
ec
t
cr
o
s
s
tal
k
,
u
n
a
u
t
h
o
r
ized
ac
ce
s
s
th
r
o
u
g
h
t
h
e
u
s
e
o
f
ad
d
/d
r
o
p
p
o
r
ts
an
d
in
te
n
tio
n
al
cr
o
s
s
talk
p
r
o
p
ag
ati
o
n
f
r
o
m
p
r
ec
ed
in
g
b
lo
ck
s
a
n
d
th
i
s
i
s
k
n
o
w
n
a
s
i
n
d
ir
ec
t a
ttack
.
T
h
e
las
t c
ate
g
o
r
y
i
s
w
h
er
e
th
e
an
o
m
alie
s
ca
u
s
ed
b
y
th
e
s
i
g
n
if
ican
t
ch
an
g
es
i
n
t
h
e
q
u
al
it
y
o
f
s
i
g
n
al
m
i
m
ic
a
n
ad
v
er
s
ar
y
b
u
t
t
h
e
y
ar
e
ac
tu
a
ll
y
n
o
t
an
ad
v
er
s
ar
y
.
T
h
is
is
ca
l
led
p
s
eu
d
o
-
attac
k
s
.
Fi
g
u
r
e
1
r
ep
r
esen
t
s
a
d
ir
ec
t
a
ttack
w
h
er
e
t
h
e
i
n
tr
u
d
er
’
s
s
i
g
n
al
h
a
s
a
f
f
ec
t
ed
o
th
er
leg
iti
m
ate
u
s
er
s
w
h
o
d
o
n
o
t sh
ar
e
co
m
m
o
n
p
h
y
s
ical
co
m
p
o
n
e
n
ts
v
ia
cr
o
s
s
talk
[
9
]
.
T
h
is
w
o
r
k
w
i
ll
co
n
s
id
er
a
s
o
u
r
ce
b
ased
attac
k
(
SB
A
)
w
h
e
r
e
th
e
attac
k
er
ca
p
italizes
o
n
th
e
in
p
u
t
s
o
u
r
ce
w
it
h
in
a
p
ar
ticu
lar
n
et
w
o
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
4
,
A
u
g
u
s
t
2
0
1
7
:
2
1
0
1
–
2
1
0
8
2102
Fig
u
r
e
1
.
Dir
ec
t a
ttack
v
ia
i
n
-
b
an
d
cr
o
s
s
talk
.
2.
O
VE
RVI
E
W
O
F
WDM
T
h
e
in
cr
ea
s
e
o
f
th
e
d
e
m
an
d
f
o
r
d
ata
h
as
ca
lled
f
o
r
an
in
cr
ea
s
e
in
th
e
d
ata
ca
r
r
y
in
g
ca
p
ac
it
y
o
f
th
e
n
et
w
o
r
k
a
s
w
e
ll
as
an
i
n
cr
ea
s
e
in
th
e
s
p
ee
d
an
d
th
e
q
u
alit
y
o
f
s
er
v
ice
o
f
t
h
e
n
et
w
o
r
k
.
T
h
er
e
is
th
er
e
f
o
r
e
a
n
ee
d
f
o
r
a
tec
h
n
o
lo
g
y
w
h
ic
h
c
an
u
tili
ze
t
h
e
e
x
is
tin
g
d
e
v
ices
b
y
m
a
k
i
n
g
u
s
e
o
f
th
e
c
h
a
n
n
e
l.
W
DM
m
u
ltip
le
x
es
m
u
ltip
le
o
p
tical
ca
r
r
ier
s
ig
n
a
ls
o
n
to
a
s
in
g
le
f
ib
er
v
ia
th
e
u
s
e
o
f
d
if
f
er
e
n
t o
p
tical
w
av
ele
n
g
t
h
s
.
Fig
u
r
e
2
r
ep
r
esen
ts
a
W
DM
s
y
s
te
m
w
h
ich
tr
a
n
s
m
it
s
an
d
r
ec
eiv
es
f
iv
e
d
if
f
er
e
n
t
w
a
v
elen
g
t
h
s
.
I
n
cr
ea
s
in
g
t
h
e
n
u
m
b
er
o
f
w
av
elen
g
th
s
o
f
t
h
e
ch
a
n
n
el
ca
n
le
ad
to
d
ec
r
ea
s
e
in
ch
an
n
el
s
p
ac
in
g
.
T
h
e
d
ec
r
ea
s
e
i
n
th
e
c
h
an
n
el
s
p
ac
in
g
b
r
ee
d
s
f
o
u
r
-
w
a
v
e
m
i
x
i
n
g
(
FW
M)
an
d
c
r
o
s
s
p
h
ase
m
o
d
u
la
tio
n
(
XP
M)
w
h
ic
h
i
s
tr
i
g
g
er
ed
b
y
i
m
p
a
ir
m
e
n
ts
d
u
e
to
n
o
n
-
li
n
ea
r
it
y
o
f
t
h
e
f
ib
er
[
1
2
]
.
T
h
ese
i
m
p
air
m
en
ts
af
f
ec
t
s
t
h
e
o
v
e
r
all
p
er
f
o
r
m
a
n
ce
o
f
th
e
s
y
s
te
m
a
n
d
cr
ea
te
lo
o
p
h
o
les f
o
r
s
ec
u
r
it
y
v
u
l
n
er
ab
ilit
ie
s
o
f
th
e
n
et
w
o
r
k
.
Fig
u
r
e
2.
W
DM
s
y
s
te
m
w
it
h
f
iv
e
tr
an
s
m
itter
s
a
n
d
f
i
v
e
r
ec
eiv
er
s
3.
E
XI
ST
I
N
G
AT
T
ACK
S A
N
D
I
T
S
E
F
F
E
C
T
O
N
WDM
SYST
E
M
S
T
h
er
e
ar
e
v
ar
io
u
s
f
o
r
m
s
o
f
attac
k
s
t
h
at
ca
n
ef
f
ec
t
a
W
D
M
s
y
s
te
m
.
So
m
e
o
f
t
h
ese
att
ac
k
s
h
av
e
ad
v
er
s
e
ef
f
ec
t
o
n
W
DM
s
y
s
te
m
s
to
t
h
e
e
x
te
n
t
o
f
ca
u
s
in
g
s
e
r
v
ice
d
is
tr
u
p
tio
n
.
T
h
ese
attac
k
s
w
ill
b
e
r
ev
ie
w
ed
in
th
is
s
ec
t
io
n
.
A
ttac
k
s
w
as
s
t
u
d
ied
u
n
d
er
th
r
ee
ca
teg
o
r
ies
[
8
]
b
y
co
n
s
id
er
in
g
A
ll
o
p
tical
Net
w
o
r
k
(
A
O
N)
.
T
h
ese
attac
k
s
i
n
cl
u
d
es
I
n
-
b
an
d
J
am
m
i
n
g
m
et
h
o
d
w
h
er
e
t
h
e
attac
k
er
in
ter
f
er
w
ith
t
h
e
s
i
g
n
al
to
r
ed
u
ce
th
e
ef
f
ec
ie
n
c
y
o
f
th
e
n
et
w
o
r
k
t
h
er
eb
y
ca
u
s
in
g
s
er
v
ice
d
is
tr
u
p
tio
n
.
T
h
e
s
ec
o
n
d
m
e
th
o
d
co
n
s
id
er
ed
w
as
an
o
u
t
-
of
-
b
an
d
j
am
m
i
n
g
m
et
h
o
d
w
h
er
e
th
e
attac
k
er
r
e
d
u
ce
s
th
e
ef
f
icie
n
c
y
o
f
th
e
co
m
m
u
n
icat
io
n
s
ig
n
al
co
m
p
o
n
e
n
t
v
i
a
m
ak
in
g
u
s
e
o
f
t
h
e
leak
y
co
m
p
o
n
en
ts
o
r
cr
o
s
s
-
m
o
d
u
latio
n
ef
f
ec
t
to
ca
u
s
e
s
er
v
ice
d
is
r
u
p
tio
n
.
Fi
n
all
y
,
t
h
e
au
th
o
r
co
n
s
id
er
ed
an
u
n
au
t
h
o
r
ized
o
b
s
er
v
atio
n
w
h
er
e
th
e
cr
o
s
s
tal
k
leak
in
g
f
r
o
m
ad
j
ce
n
t
s
ig
n
al
is
li
s
ten
ed
b
y
th
e
at
tack
er
u
s
in
g
a
s
h
ar
ed
r
e
s
o
u
r
ce
s
in
o
r
d
er
to
ac
ce
s
s
th
e
in
f
o
r
m
at
io
n
tr
a
n
s
m
it
ted
.
T
h
is
m
et
h
o
d
lead
s
to
ea
v
esd
r
o
p
p
in
g
.
An
o
th
er
f
o
r
m
o
f
attac
k
is
as
a
r
esu
lt
o
f
th
e
ex
p
lio
tatatio
n
o
f
th
e
ch
ar
ac
ter
i
s
tics
o
f
t
h
e
v
ar
io
u
s
co
m
p
o
n
e
n
t
s
i
n
W
DM
s
y
s
te
m
[
9
]
.
So
m
e
o
f
t
h
e
co
m
p
o
n
en
t
s
co
n
s
id
er
ed
w
er
e
t
h
e
o
p
tical
f
ib
er
a
n
d
t
h
e
a
m
p
li
f
ier
s
.
T
ap
p
in
g
w
a
s
p
er
f
o
r
m
ed
b
y
ex
p
lio
ti
n
g
th
e
n
o
n
-
li
n
ea
r
itie
s
o
f
t
h
e
f
ib
er
u
s
in
g
a
cr
o
s
s
-
p
h
as
e
m
o
d
u
latio
n
an
d
R
a
m
an
ef
f
ec
t
w
h
ic
h
h
as t
h
e
te
n
d
en
c
y
o
f
ca
u
s
in
g
a
m
p
li
f
icatio
n
o
r
atten
u
ati
o
n
o
f
s
ig
n
al
o
n
o
n
e
w
a
v
ele
n
g
t
h
b
y
th
e
ad
j
ac
en
t
w
av
elen
g
t
h
.
I
t
w
as
d
ed
u
ce
d
th
a
t
an
attac
k
er
ca
n
tak
e
ad
v
a
n
ta
g
e
o
f
th
e
cr
o
s
s
tal
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
o
u
r
ce
b
a
s
ed
S
ec
u
r
ity
I
s
s
u
es in
W
D
M S
ystems
(
A
.
A
n
tw
iw
a
a
)
2103
ef
f
ec
ts
a
n
d
p
r
o
p
ag
ate
a
m
ali
cio
u
s
s
ig
n
al
u
n
to
t
h
e
f
ib
er
w
h
ic
h
ca
n
d
ec
r
ea
s
e
t
h
e
q
u
al
it
y
o
f
s
er
v
ice.
Gai
n
co
m
p
e
n
s
at
io
n
w
as a
l
s
o
u
s
ed
a
s
a
m
ea
n
s
o
f
at
tack
b
y
i
n
j
ec
tin
g
a
s
i
g
n
al
w
it
h
d
if
f
er
en
t
w
a
v
el
en
g
t
h
i
n
to
th
e
f
ib
er
d
u
r
in
g
th
e
p
u
m
p
i
n
g
s
ta
g
e
a
n
d
th
e
i
n
j
ec
ted
s
ig
n
al
w
ill
b
e
am
p
li
f
ied
in
d
is
cr
i
m
i
n
atel
y
w
i
t
h
t
h
e
o
r
ig
n
a
l
s
i
g
n
al
ca
u
s
i
n
g
d
en
ial
o
f
s
er
v
ice.
T
im
i
n
g
a
n
al
y
s
is
attac
k
i
s
also
an
o
th
er
f
o
r
m
o
f
attac
k
w
h
ich
co
n
s
id
er
s
t
h
e
s
id
e
c
h
an
n
el
s
o
f
a
n
et
w
o
r
k
an
d
it
en
tails
t
h
e
to
tal
ti
m
e
i
n
v
o
l
v
ed
to
co
m
p
lete
a
cr
itica
l
ac
tio
n
[
1
3
]
.
A
t
y
p
e
o
f
atta
ck
co
n
s
id
er
ed
w
a
s
B
er
n
s
tein
’
s
ti
m
i
n
g
attac
k
w
er
e
th
e
s
ec
u
r
it
y
k
e
y
w
as
id
en
ti
f
ie
d
b
y
co
m
p
ar
in
g
t
h
e
cip
h
er
te
x
t
w
h
ic
h
i
s
ac
h
iev
ed
b
y
t
h
e
s
er
v
er
ti
m
e
s
ta
m
p
i
n
g
an
d
en
cr
y
p
tin
g
it
u
s
in
g
s
er
v
e
r
s
k
e
y
a
n
d
ad
d
in
g
ti
m
e
s
ta
m
p
w
i
th
t
h
e
s
er
v
er
’
s
r
ec
eiv
ed
cip
h
er
tex
t.
T
h
ese
ex
is
ti
n
g
attac
k
s
a
f
f
ec
ts
th
e
W
DM
s
y
s
te
m
ad
v
er
s
e
l
y
b
u
t
th
e
y
a
ll
m
a
k
e
u
s
e
o
f
t
h
e
n
o
n
-
li
n
ea
r
it
y
ef
f
ec
t
o
f
W
DM
c
h
an
n
el.
T
h
e
n
e
x
t
s
ess
io
n
d
is
c
u
s
s
es
n
o
v
el
f
o
r
m
o
f
at
tack
in
W
DM
s
y
s
t
e
m
w
h
ic
h
d
o
es
n
o
t
u
tili
ze
t
h
e
v
u
l
n
er
ab
ilit
ie
s
o
f
W
DM
n
o
n
-
li
n
ea
r
ities
.
4.
SO
URCE B
AS
E
D
A
T
T
A
CK
Fib
er
n
et
w
o
r
k
w
a
s
co
n
s
id
er
e
d
as
v
er
y
s
ec
u
r
ed
b
u
t
in
tr
u
d
e
r
s
ar
e
co
n
s
tan
tl
y
w
o
r
k
in
g
h
ar
d
to
ac
ce
s
s
u
n
a
u
t
h
o
r
ized
in
f
o
r
m
at
io
n
f
r
o
m
t
h
e
n
et
w
o
r
k
.
I
n
t
h
is
s
ec
t
io
n
,
w
e
p
r
o
p
o
s
e
t
w
o
n
o
v
el
f
o
r
m
o
f
attac
k
s
w
h
ich
ca
n
af
f
ec
t
t
h
e
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
W
DM
s
y
s
te
m
.
A
W
DM
n
et
w
o
r
k
h
a
s
s
e
v
er
al
tr
a
n
s
m
it
ter
s
w
h
ic
h
o
p
er
ates
at
d
if
f
er
e
n
t
w
a
v
ele
n
g
th
s
.
T
h
e
o
u
tp
u
t o
f
th
e
tr
an
s
m
itter
s
ar
e
m
u
ltip
lex
ed
o
n
to
a
s
i
n
g
le
c
h
an
n
el
.
A
t
a
p
o
in
t
in
ti
m
e
if
a
p
ar
ticu
lar
tr
an
s
m
itter
is
f
r
ee
,
an
ad
v
er
s
ar
y
f
r
o
m
w
it
h
i
n
t
h
e
n
et
w
o
r
k
ca
n
ca
p
italized
o
n
th
at
id
le
p
er
io
d
an
d
attac
k
t
h
e
n
e
t
w
o
r
k
.
T
h
is
ad
v
er
s
ar
y
ca
n
p
r
eten
d
to
b
e
a
l
eg
iti
m
ate
u
s
er
b
y
tr
an
s
m
i
tti
n
g
in
f
o
r
m
at
io
n
at
a
p
ar
ticu
lar
w
av
ele
n
g
t
h
.
T
h
e
w
a
v
ele
n
g
t
h
ca
n
g
o
a
lo
n
g
w
a
y
to
cr
ea
te
i
n
ter
f
er
en
ce
w
ith
th
e
o
n
g
o
i
n
g
tr
an
s
m
is
s
io
n
d
ep
en
d
in
g
o
n
t
h
e
w
av
ele
n
g
t
h
tr
a
n
s
m
itted
b
y
t
h
e
i
n
tr
u
d
er
.
T
h
is
ca
n
ca
u
s
e
t
h
e
s
i
g
n
al
s
tr
e
n
g
th
to
r
ed
u
ce
th
er
eb
y
ca
u
s
i
n
g
a
d
e
n
ial
o
f
s
i
g
n
al
as
w
ell
as
cr
ea
tin
g
f
o
u
r
-
w
av
e
m
i
x
i
n
g
ef
f
e
ct
an
d
cr
o
s
s
p
h
a
s
e
m
o
d
u
latio
n
ef
f
ec
t
a
s
a
r
es
u
lt
o
f
th
e
n
o
n
lin
ea
r
e
f
f
ec
t
i
n
t
h
e
m
ed
iu
m
.
T
h
is
f
o
r
m
o
f
attac
k
c
an
b
e
ter
m
ed
a
s
s
o
u
r
ce
b
ased
attac
k
(
SB
A
)
.
I
n
t
h
e
SB
A
a
ttack
,
an
ad
v
er
s
a
r
y
ca
n
ac
t
as
a
clo
n
e
tr
an
s
m
i
tter
b
y
tr
a
n
s
m
itti
n
g
in
f
o
r
m
atio
n
o
f
t
h
e
s
a
m
e
w
a
v
e
len
g
th
,
p
o
w
er
,
p
h
ase,
a
m
p
lit
u
d
e
etc.
Sin
ce
t
h
e
clo
n
e
a
n
d
t
h
e
leg
iti
m
ate
s
i
g
n
al
s
ar
e
th
e
s
a
m
e,
af
ter
m
u
ltip
lex
in
g
,
i
t
w
ill
b
e
v
er
y
d
if
f
ic
u
lt
f
o
r
th
e
r
ec
eiv
er
to
d
is
ti
n
g
u
i
s
h
b
et
w
ee
n
t
h
e
t
w
o
s
ig
n
al
s
h
e
n
ce
p
u
tti
n
g
t
h
e
le
g
iti
m
ate
u
s
er
’
s
s
ig
n
al
a
t
r
is
k
.
T
h
e
ad
v
er
s
ar
y
ca
n
al
s
o
tr
a
n
s
m
it
a
s
i
g
n
al
at
a
w
a
v
ele
n
g
t
h
a
n
d
p
o
w
er
eith
er
h
ig
h
er
o
r
lo
w
er
th
a
n
t
h
e
leg
iti
m
ate
u
s
er
.
T
h
e
ch
an
n
el
co
n
d
itio
n
w
ill
d
e
ter
m
i
n
e
th
e
ab
s
e
n
ce
o
r
p
r
esen
ce
o
f
n
o
n
l
in
ea
r
e
f
f
ec
ts
a
n
d
th
ese
ef
f
ec
ts
ca
n
cr
ea
te
s
ec
u
r
it
y
v
u
l
n
er
ab
il
ities
t
h
er
eb
y
p
u
tti
n
g
th
e
le
g
iti
m
ate
u
s
er
’
s
s
i
g
n
al
at
r
is
k
.
Fi
g
u
r
e
3
r
ep
r
esen
ts
a
s
i
m
u
lat
io
n
o
f
a
W
DM
SB
A
at
a
d
is
tan
ce
o
f
6
3
1
.
7
2
Km
with
0
.
2
d
B
/Km
f
ib
er
atten
u
at
io
n
.
Sectio
n
I
V
w
i
ll
d
is
cu
s
s
th
e
s
i
m
u
latio
n
r
es
u
lt
s
o
b
tain
ed
f
r
o
m
th
e
W
DM
SB
A
d
iag
r
a
m
i
n
F
i
g
u
r
e
3
.
Fig
u
r
e
3
.
Si
m
u
latio
n
o
f
W
DM
SB
A
at
f
ib
er
len
g
th
o
f
6
3
1
.
7
2
K
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
4
,
A
u
g
u
s
t
2
0
1
7
:
2
1
0
1
–
2
1
0
8
2104
5.
WDM
SB
A
SI
M
UL
AT
I
O
N
RE
SU
L
T
S
T
h
e
W
DM
SB
A
s
i
m
u
latio
n
s
tep
u
p
co
n
s
is
t
o
f
t
w
o
o
p
tical
s
o
u
r
ce
s
,
a
2
x
1
W
DM
m
u
l
tip
lex
er
,
an
o
p
tical
f
ib
er
len
g
t
h
o
f
6
3
1
.
7
2
K
m
w
it
h
0
.
2
d
B
/K
m
atten
u
ati
o
n
,
1
5
m
le
n
g
th
o
p
tical
a
m
p
lifie
r
an
d
a
1
x
2
W
DM
d
em
u
lt
ip
lex
er
w
it
h
a
1
9
3
.
1
an
d
1
9
3
.
2
T
Hz
o
u
tp
u
t p
o
r
ts
.
5
.
1
.
Clo
ne
So
urce
b
a
s
ed
At
t
a
c
k
(
CSB
A)
T
h
e
ad
v
er
s
ar
y
m
i
m
ic
t
h
e
c
h
ar
ac
ter
is
tics
o
f
th
e
le
g
it
i
m
a
te
u
s
er
an
d
attac
k
t
h
e
W
DM
s
y
s
te
m
b
y
u
s
i
n
g
th
e
s
a
m
e
f
r
eq
u
en
c
y
o
f
o
p
er
atio
n
an
d
th
e
in
p
u
t
p
o
w
er
as
t
h
at
o
f
th
e
le
g
it
i
m
a
te
u
s
er
.
T
h
e
ad
v
er
s
ar
y
u
s
ed
th
e
s
a
m
e
w
a
v
elen
g
t
h
a
n
d
p
o
w
er
as
t
h
at
o
f
th
e
le
g
iti
m
ate
u
s
er
.
T
h
e
ad
v
er
s
ar
y
ac
ts
lik
e
a
clo
n
e
u
s
er
.
T
h
e
w
a
v
ele
n
g
t
h
u
s
ed
w
as
1
9
3
.
1
T
Hz
an
d
in
p
u
t
s
i
g
n
a
l
p
o
w
er
o
f
1
9
.
0
0
1
1
5
m
w
.
T
h
e
r
es
u
lts
ar
e
s
h
o
w
n
in
F
ig
u
r
e
4
(
a
)
to
4
(
g
)
.
Fig
u
r
e
4
(
a
)
an
d
4
(
b
)
r
ep
r
esen
ts
th
e
s
i
g
n
a
l
o
f
th
e
ad
v
er
s
ar
y
an
d
t
h
e
le
g
it
i
m
a
te
u
s
e
r
r
esp
ec
tiv
el
y
.
B
o
th
u
s
er
s
ar
e
tr
an
s
m
itti
n
g
at
t
h
e
s
a
m
e
w
a
v
elen
g
t
h
an
d
p
o
w
e
r
b
u
t
d
if
f
er
e
n
t
b
it
s
eq
u
e
n
ce
ass
u
m
in
g
th
a
t
th
e
f
r
eq
u
en
c
y
o
f
tr
an
s
m
is
s
io
n
i
s
k
n
o
w
n
to
t
h
e
ad
v
er
s
ar
y
b
u
t
t
h
e
b
it
s
eq
u
en
ce
i
s
u
n
k
n
o
w
.
T
h
e
g
e
n
er
ated
s
i
g
n
als
ar
e
m
u
lt
ip
le
x
ed
r
esu
lti
n
g
i
n
t
h
e
o
u
tp
u
t
o
f
F
ig
u
r
e
4
(
c
)
.
T
h
e
m
u
ltip
le
x
ed
o
u
tp
u
t
s
h
o
w
s
t
h
at
t
h
e
m
u
ltip
le
x
er
s
ee
s
b
o
th
s
ig
n
al
s
as
t
h
e
s
a
m
e
s
i
g
n
a
l
s
in
ce
th
e
y
h
av
e
th
e
s
a
m
e
w
a
v
elen
g
t
h
a
n
d
p
o
w
er
.
T
h
is
ca
u
s
e
a
p
o
w
er
d
ec
r
ea
s
e
f
r
o
m
i
n
itia
l
1
9
.
0
0
1
1
5
m
W
to
1
1
.
0
0
0
m
W
w
h
ich
is
ab
o
u
t
5
7
.
8
%
d
ec
r
ea
s
e.
T
h
e
ad
v
er
s
ar
y
an
d
t
h
e
le
g
iti
m
at
e
u
s
er
’
s
s
i
g
n
al
ar
e
ad
d
ed
u
p
b
y
t
h
e
m
u
ltip
le
x
er
to
p
r
o
d
u
ce
a
s
in
g
le
p
u
ls
e
a
n
d
tr
an
s
m
it
ted
alo
n
g
t
h
e
ch
a
n
n
el.
(
a)
(
b
)
(
c)
(
d
)
(
e)
(
f
)
(
g
)
Fig
u
r
e
4
.
(
a
)
I
n
p
u
t sig
n
al
tr
an
s
m
itted
b
y
t
h
e
ad
v
er
s
ar
y
,
(
b
.
Si
g
n
al
tr
a
n
s
m
it
ted
b
y
t
h
e
le
g
iti
m
ate
u
s
er
,
(
c)
Mu
ltip
lex
ed
o
u
tp
u
t o
f
b
o
th
th
e
u
s
er
’
s
an
d
ad
v
er
s
ar
y
s
i
g
n
al
, (
d)
Sig
n
al
af
ter
tr
av
elli
n
g
f
o
r
6
3
1
.
7
2
k
m
,
(
e)
Am
p
li
f
ied
s
i
g
n
al,
(
f
)
De
m
u
lti
p
le
x
ed
s
ig
n
al
at
p
o
r
t 1
9
3
.
1
T
Hz,
(
g
)
D
em
u
ltip
lex
ed
s
i
g
n
al
at
p
o
r
t 1
9
3
.
2
T
Hz
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
o
u
r
ce
b
a
s
ed
S
ec
u
r
ity
I
s
s
u
es in
W
D
M S
ystems
(
A
.
A
n
tw
iw
a
a
)
2105
Du
e
to
th
e
e
f
f
ec
t
o
f
t
h
e
v
ar
io
u
s
ch
a
n
n
el
i
m
p
air
m
e
n
t
s
,
t
h
e
m
u
ltip
lex
ed
s
i
g
n
a
l
h
as
s
u
f
f
er
e
d
a
d
r
asti
c
d
ec
r
ea
s
e
in
s
i
g
n
al
p
o
w
er
a
f
ter
6
3
1
.
7
2
Km
as
s
h
o
w
n
in
F
i
g
u
r
e
4
(
d
)
.
Mo
r
eo
v
er
,
th
e
s
i
g
n
al
h
as
b
ee
n
a
f
f
ec
ted
b
y
p
u
ls
e
b
r
o
ad
en
in
g
e
f
f
ec
t.
T
h
e
m
i
x
in
g
o
f
t
h
ese
t
w
o
s
ig
n
al
s
w
it
h
d
if
f
er
e
n
t
b
it
s
eq
u
en
ce
s
ca
n
lead
to
s
er
v
ice
d
en
iel
an
d
d
is
r
u
p
tio
n
b
ec
au
s
e
o
f
th
e
p
r
ese
n
ce
o
f
c
h
a
n
n
el
in
te
r
f
er
en
ce
a
n
d
w
ill r
es
u
lt i
n
a
s
i
g
n
i
f
ica
n
t c
h
a
n
g
e
i
n
th
e
d
e
m
u
ltip
le
x
ed
b
it
s
eq
u
e
n
ce
th
er
eb
y
ca
u
s
in
g
a
ch
a
n
g
e
in
t
h
e
b
it
s
eq
u
en
ce
o
f
t
h
e
leg
iti
m
ate
u
s
er
.
E
av
esd
r
o
p
p
in
g
is
a
p
o
s
s
ib
le
o
cc
u
r
r
en
ce
b
ec
au
s
e
o
f
t
h
e
e
f
f
ec
t
o
f
p
u
ls
e
b
r
o
ad
en
in
g
w
h
ic
h
c
an
ca
u
s
e
a
cr
o
s
s
tal
k
in
t
h
e
ad
j
ac
en
t
ch
a
n
n
el.
T
h
e
d
ec
r
ea
s
ed
s
ig
n
al
p
o
w
er
i
s
th
e
n
a
m
p
li
f
ied
an
d
th
e
o
u
tco
m
e
o
f
t
h
e
a
m
p
l
if
ica
tio
n
i
s
s
h
o
w
n
i
n
F
ig
u
r
e
4
(
e
)
.
T
h
e
a
m
p
li
f
ied
s
i
g
n
al
o
u
tp
u
t
is
d
e
m
u
ltip
le
x
ed
b
y
1
x
2
d
e
m
u
lt
ip
lex
er
w
it
h
1
9
3
.
1
an
d
1
9
3
.
2
T
Hz
w
a
v
ele
n
g
t
h
s
.
T
h
e
o
u
tp
u
t
is
s
h
o
w
n
i
n
f
ig
u
r
e
4
f
an
d
4
g
r
esp
ec
tiv
el
y
.
T
h
e
o
u
tp
u
t
r
esu
lts
s
h
o
w
s
t
h
a
t
b
o
th
s
ig
n
al
s
ar
e
th
e
s
a
m
e.
T
h
e
r
es
u
lta
n
t
o
u
tp
u
t
s
i
g
n
al
i
s
af
f
ec
ted
b
y
p
u
l
s
e
b
o
ar
d
en
in
g
ef
f
ec
t
w
h
ich
w
ill
ev
en
t
u
all
y
a
f
f
ec
t th
e
p
u
ls
e
s
eq
u
en
ce
.
C
o
m
p
ar
in
g
t
h
e
clo
n
e
b
ased
att
ac
k
w
it
h
t
h
e
e
x
is
ti
n
g
attac
k
s
r
ev
ie
w
ed
i
n
s
ec
tio
n
4
,
th
i
s
atta
ck
h
a
s
t
h
e
ca
p
ab
ilit
y
o
f
p
r
o
d
u
cin
g
all
t
h
e
ex
i
s
t
i
n
g
f
o
r
m
s
o
f
at
tack
s
a
n
d
h
as
a
s
er
io
u
s
i
m
p
lica
tio
n
o
n
t
h
e
n
et
w
o
r
k
.
T
h
is
s
h
o
w
s
t
h
at,
a
clo
n
e
b
ased
s
o
u
r
ce
attac
k
h
a
s
a
cr
u
cial
e
f
f
ec
t
o
n
th
e
s
ec
u
r
it
y
o
f
t
h
e
leg
iti
m
at
e
u
s
er
’
s
s
i
g
n
al.
T
h
e
ad
v
er
s
ar
y
ca
n
ea
s
i
l
y
i
n
ter
ce
p
t
th
e
leg
iti
m
ate
u
s
er
’
s
s
i
g
n
al
in
C
SB
A
th
er
eb
y
ca
u
s
i
n
g
a
s
er
v
ice
d
is
r
u
p
tio
n
,
ea
v
esd
r
o
p
p
in
g
an
d
s
er
v
ice
d
en
ial.
T
h
ese
b
r
in
g
th
e
n
et
w
o
r
k
to
a
co
m
p
r
o
m
i
s
e
a
n
d
t
h
e
in
te
g
r
it
y
o
f
t
h
e
r
es
u
ta
n
t
s
ig
n
al
w
il b
e
at
s
ta
k
e.
5
.
2
.
Dif
f
er
ent
Wa
v
eleng
t
hs
So
urce
B
a
s
ed
At
t
a
ck
(
DWSB
A)
T
h
is
t
y
p
e
o
f
a
ttack
ass
u
m
es
th
a
t
t
h
e
ad
v
er
s
ar
y
d
o
es
n
o
t
k
n
o
w
t
h
e
o
p
er
atin
g
w
a
v
ele
n
g
th
o
f
t
h
e
leg
it
m
ate
u
s
er
,
th
er
e
f
o
r
e
a
d
if
f
er
en
t
w
a
v
ele
g
t
h
w
as
u
s
ed
b
y
t
h
e
ad
v
er
s
ar
y
.
I
n
t
h
i
s
w
o
r
k
th
e
ad
v
er
s
ar
y
an
d
th
e
leg
iti
m
ate
u
s
er
’
s
w
a
v
ele
n
g
th
s
w
er
e
1
9
3
.
1
an
d
1
9
3
.
2
T
Hz
r
esp
ec
tiv
el
y
.
T
h
e
ad
v
er
s
ar
y
’
s
1
9
3
.
1
T
Hz
an
d
th
e
leg
iti
m
ate
u
s
er
’
s
1
9
3
.
2
T
Hz
tr
an
s
m
it
ted
s
ig
n
als
ar
e
r
ep
r
ese
n
ted
in
F
ig
u
r
e
5
(
a
)
an
d
5
(
b
)
r
esp
ec
tiv
el
y
.
B
o
th
u
s
er
s
h
a
v
e
d
if
f
er
e
n
t
b
it
s
eq
u
e
n
ce
b
u
t
th
e
s
a
m
e
p
o
w
er
.
T
h
e
m
u
lti
p
lex
ed
o
u
p
u
t
i
s
r
ep
r
esen
ted
in
F
i
g
u
r
e
5
(
c
)
.
Sin
ce
t
h
e
y
ar
e
o
f
d
if
f
er
e
n
t
w
a
v
ele
n
g
t
h
t
h
e
ar
e
co
p
r
o
p
ag
atin
g
i
n
t
h
e
ch
a
n
n
el
an
d
th
e
y
ar
e
ea
s
i
l
y
d
is
tin
q
u
is
h
ab
le.
T
h
e
im
p
air
m
en
ts
i
n
th
e
ch
a
n
n
el
h
a
s
ca
u
s
ed
s
i
g
n
a
ls
to
in
ter
ac
t
w
i
th
ea
ch
o
th
er
.
T
h
is
in
ter
ac
tio
n
h
as
tr
i
g
g
er
ed
a
f
o
u
r
w
a
v
e
m
i
x
i
n
g
e
f
f
ec
t
an
d
a
p
u
l
s
e
b
r
o
ad
en
in
g
e
f
f
ec
t.
T
h
e
o
u
tc
o
m
e
i
s
r
ep
r
esen
ted
in
F
i
g
u
r
e
5
(
d
)
w
h
er
e
m
u
ltip
le
p
u
ls
es
h
av
e
e
v
o
lv
ed
an
d
s
p
ec
t
r
u
m
to
h
a
s
w
id
d
en
.
T
h
is
FW
M
ef
f
ec
t
h
as
ca
u
s
ed
th
e
ad
v
er
s
ar
y
’
s
s
ig
n
al
to
i
n
ter
ac
t
w
ith
th
e
leg
i
ti
m
ate
u
s
er
’
s
s
ig
n
al.
T
h
e
d
ec
r
ea
s
ed
in
s
ig
n
al
p
o
w
er
w
it
h
ti
m
e
d
em
a
n
d
s
an
a
m
p
li
f
icatio
n
.
Fi
g
u
r
e
5
(
e
)
r
ep
r
esen
t
s
t
h
e
a
m
p
li
f
ied
s
i
g
n
al
a
f
ter
6
3
1
.
7
2
Km
.
T
h
e
r
es
u
lta
n
t
o
u
tp
u
t
s
ig
n
al
is
s
ep
ar
ate
b
y
t
h
e
1
x
2
d
e
m
u
ltip
le
x
er
ac
co
r
d
in
g
t
h
e
w
av
ele
n
g
t
h
at
t
h
e
p
o
r
t.
T
h
e
ad
v
er
s
ar
y
’
s
s
ig
n
al
o
u
tp
u
t
w
as
d
etec
ted
b
y
t
h
e
1
9
3
.
1
T
Hz
p
o
r
t
an
d
it
is
s
h
o
wn
in
f
i
g
u
r
e
5
f
t
h
at
t
h
e
s
i
g
n
al
r
ec
eiv
ed
h
as
b
ee
n
af
f
ec
ted
b
y
p
u
ls
e
b
r
o
ad
en
in
g
a
n
d
also
ca
r
r
ied
s
o
m
e
i
n
f
o
r
m
ati
o
n
b
elo
n
g
i
n
g
to
t
h
e
leg
iti
m
ate
u
s
er
.
T
h
e
leg
iti
m
ate
u
s
er
o
n
t
h
e
o
th
er
h
an
d
h
a
s
b
ee
n
ad
v
er
s
l
y
a
f
f
ec
ted
b
y
i
n
ter
ac
tio
n
w
h
ic
h
h
a
s
ig
n
ited
a
FW
M
ef
f
ec
t.
T
h
i
s
h
as
ca
u
s
e
d
th
e
s
i
g
n
al
to
d
e
g
r
ad
e
g
r
ea
t
l
y
.
T
h
e
s
ec
u
r
it
y
o
f
t
h
e
leg
it
m
ate
u
s
er
h
a
s
b
ee
n
co
m
p
r
o
m
is
ed
b
ec
au
s
e
t
h
e
tr
an
s
m
i
ted
s
i
g
n
a
l
w
as
n
o
t
r
ec
ei
v
e
d
an
d
th
e
ad
v
er
s
ar
y
h
a
s
s
u
cc
e
ed
ed
in
in
ter
ce
p
tin
g
th
e
o
r
ig
i
n
al
s
i
g
n
a
l.
FW
M
ef
f
ec
t
h
as
d
is
to
r
ted
th
e
s
i
g
n
al
c
o
m
p
lete
l
y
a
n
d
th
e
le
g
iti
m
ate
u
s
er
’
s
s
i
g
n
a
l
n
o
w
co
n
tain
s
p
ar
t
o
f
th
e
ad
v
er
s
ar
y
’
s
s
i
g
n
al.
T
h
is
ca
n
ca
u
s
e
a
s
er
v
ice
d
is
r
u
p
tio
n
,
d
en
ial
o
f
s
er
v
ice
as
w
ell
as
ea
v
esd
r
o
p
p
in
g
.
Si
n
ce
th
e
ad
v
e
r
s
ar
y
n
o
w
h
a
v
e
ac
ce
s
s
to
p
ar
t
o
f
th
e
i
n
f
o
r
m
atio
n
o
f
t
h
e
le
g
it
m
ate
u
s
er
,
ta
p
p
in
g
attac
k
w
h
ich
i
s
ai
m
ed
g
ai
n
i
n
g
u
n
au
t
h
o
r
ized
ac
ce
s
s
to
th
e
d
ata
an
d
u
s
in
g
it
f
o
r
tr
af
f
ic
a
n
al
y
s
i
s
ca
n
also
b
e
p
er
f
o
r
m
ed
b
y
t
h
e
ad
v
er
s
ar
y
.
C
o
m
p
ar
in
g
th
is
attac
k
to
th
e
ex
is
t
in
g
attac
k
s
r
ev
ie
w
ed
,
it
h
as
th
e
ca
p
ab
ilit
y
o
f
ca
u
s
in
g
s
e
r
io
u
s
tr
ea
t
to
th
e
W
DM
s
y
s
te
m
b
y
ca
u
s
i
n
g
a
d
en
ial
o
f
s
er
v
ice,
s
er
v
ice
d
is
r
u
p
tio
n
,
ea
v
esd
r
o
p
p
in
g
an
d
t
r
af
f
ic
a
n
al
y
s
i
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
4
,
A
u
g
u
s
t
2
0
1
7
:
2
1
0
1
–
2
1
0
8
2106
(
a)
(
b
)
(
c)
(
d
)
(
e)
(
f
)
(
g
)
Fig
u
r
e
5
.
(
a)
A
d
v
er
s
a
r
y
’
s
in
p
u
t
s
ig
n
al
at
1
9
3
.
1
T
Hz,
(
b
)
L
eg
iti
m
ate
u
s
er
’
s
in
p
u
t si
g
n
al
at
1
9
3
.
2
T
Hz,
(
c)
Mu
ltip
le
x
ed
o
u
tp
u
t o
f
t
h
e
ad
v
er
s
ar
y
an
d
th
e
u
s
er
’
s
s
ig
n
al,
(
d
)
T
r
an
s
m
i
tted
s
ig
n
al
o
u
tp
u
t,
(
e)
Am
p
l
if
ied
o
u
tp
u
t
s
ig
n
al,
(
f
)
O
u
tp
u
t
s
ig
n
al
f
r
o
m
1
9
3
.
1
d
em
u
ltip
ler
o
u
tp
u
t,
(
g
)
Ou
tp
u
t si
g
n
al
f
r
o
m
1
9
3
.
2
d
em
u
ltip
le
x
er
o
u
tp
u
t
p
o
r
t.
6.
CO
NCLU
SI
O
N
A
co
m
p
r
o
m
is
ed
n
et
w
o
r
k
h
as
a
g
r
ea
t
i
m
p
ac
t
o
n
t
h
e
n
et
w
o
r
k
u
s
er
s
a
n
d
th
e
n
et
w
o
r
k
o
p
er
ato
r
s
as
w
ell.
T
h
is
u
n
d
er
m
i
n
es
t
h
e
s
ec
u
r
it
y
o
f
th
e
o
n
g
o
i
n
g
co
m
m
u
n
icatio
n
.
C
o
n
f
id
e
n
tialit
y
b
et
w
ee
n
co
m
m
u
n
icati
n
g
p
ar
ties
is
v
er
y
e
s
s
e
n
tial
in
telec
o
m
m
u
n
icatio
n
.
Un
a
u
t
h
o
r
ized
u
s
es a
r
e
w
o
r
k
in
g
to
f
i
n
d
w
a
y
s
an
d
m
ea
n
s
to
ac
ce
s
s
v
i
tal
in
f
o
r
m
atio
n
o
f
u
s
er
s
.
An
i
m
p
o
r
tan
t
lo
o
p
h
o
le
in
W
DM
s
y
s
te
m
is
th
e
W
DM
s
o
u
r
ce
b
ased
a
ttack
.
W
DM
s
o
u
r
ce
b
ased
attac
k
h
as
a
g
r
ea
t
i
m
p
ac
t
o
n
W
DM
s
ig
n
al
s
.
I
n
t
h
e
p
r
es
en
ce
o
f
c
h
a
n
n
e
l
i
m
p
a
ir
m
e
n
ts
,
th
e
s
ig
n
al
s
s
u
f
f
er
s
f
r
o
m
v
ar
io
u
s
n
o
n
-
li
n
ea
r
it
y
i
s
s
u
es
w
h
ic
h
d
eg
en
er
ate
s
in
to
v
a
r
io
u
s
s
ec
u
r
it
y
i
s
s
u
es.
T
h
e
clo
n
e
s
o
u
r
ce
b
ased
attac
k
ad
v
er
s
el
y
a
f
f
ec
ts
th
e
s
ec
u
r
it
y
o
f
a
W
DM
s
y
s
te
m
s
in
ce
th
e
ad
v
er
s
ar
y
m
i
m
ics
th
e
leg
i
ti
m
ate
u
s
er
a
n
d
o
p
er
ates
w
it
h
t
h
e
s
a
m
e
w
a
v
elen
g
t
h
a
n
d
p
o
w
er
o
f
th
e
le
g
iti
m
ate
u
s
er
.
T
h
is
m
ak
e
s
it
d
if
f
ic
u
lt
f
o
r
th
e
r
ec
eiv
er
to
d
if
f
er
e
n
tiate
b
et
w
ee
n
th
e
ac
tu
a
l
s
ig
n
al
a
n
d
th
e
leg
i
ti
m
ate
s
ig
n
al
s
i
n
ce
b
o
th
s
i
g
n
als
ar
e
t
h
e
s
a
m
e.
I
t
h
a
s
t
h
e
ca
p
ab
ilit
y
o
f
p
r
o
d
u
cin
g
a
s
er
v
ice
d
e
n
iel,
s
er
v
i
ce
d
is
r
u
p
tio
n
a
n
d
ea
v
esd
r
o
p
p
in
g
attac
k
s
.
T
h
is
m
ak
e
s
it
th
i
s
attac
k
a
m
o
r
e
s
e
r
io
u
s
is
s
u
e
o
f
co
n
ce
r
n
.
T
h
e
a
d
v
er
s
ar
y
s
u
cc
ee
d
s
in
in
ter
ce
p
tin
g
th
e
le
g
iti
m
ate
s
i
g
n
al
t
h
er
eb
y
af
f
ec
ti
n
g
th
e
au
th
en
ticatio
n
a
n
d
co
n
f
id
en
t
iali
t
y
o
f
th
e
r
ec
eiv
ed
s
ig
n
al.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
o
u
r
ce
b
a
s
ed
S
ec
u
r
ity
I
s
s
u
es in
W
D
M S
ystems
(
A
.
A
n
tw
iw
a
a
)
2107
T
h
e
DW
SB
A
al
s
o
ca
u
s
e
s
t
h
e
s
ig
n
al
s
to
b
e
a
f
f
ec
ted
b
y
n
o
n
-
lin
ea
r
it
y
e
f
f
ec
ts
li
k
e
p
u
l
s
e
b
r
o
ad
en
in
g
an
d
FW
M
w
h
ic
h
cr
ea
tes
r
o
o
m
f
o
r
s
ec
u
r
i
t
y
v
u
ln
er
ab
ilit
i
es
in
W
DM
.
T
h
e
ad
v
er
s
ar
y
o
p
er
ates
w
it
h
in
a
f
r
eq
u
en
c
y
w
h
ic
h
is
d
if
f
er
e
n
t
f
r
o
m
t
h
at
o
f
t
h
e
le
g
iti
m
ate
u
s
er
.
T
h
e
o
p
er
atin
g
f
r
eq
u
e
n
c
y
ca
n
b
e
eith
er
h
ig
h
er
o
r
lo
w
er
th
a
n
t
h
at
o
f
t
h
e
leg
i
ti
m
ate
u
s
er
.
T
h
ese
g
en
er
ated
f
r
eq
u
en
c
ies
ca
n
eith
er
o
v
er
s
h
ad
o
w
o
r
d
r
ain
th
e
leg
iti
m
ate
u
s
e
s
s
i
g
n
al
t
h
er
eb
y
ca
u
s
in
g
lo
w
q
u
alit
y
o
f
s
er
v
ice,
d
en
ial
o
f
s
er
v
ice,
ea
v
e
s
d
r
o
p
p
in
g
an
d
tr
a
f
f
i
c
an
al
y
s
is
.
T
h
ese
attac
k
s
h
a
s
ad
v
er
s
e
r
ec
u
r
s
io
n
s
o
n
t
h
e
tr
an
s
m
itted
s
i
g
n
al
t
h
er
ef
o
r
e
m
eth
o
d
s
o
f
d
etec
ti
n
g
a
n
d
is
o
latin
g
C
SB
A
an
d
DW
SB
A
s
h
o
u
ld
b
e
co
n
s
id
er
ed
in
th
e
f
u
tu
r
e
w
o
r
k
s
.
RE
F
E
R
E
NC
E
S
[1
]
J.
M
.
S
e
n
io
r,
S
.
D.
C
u
sw
o
rth
,
“
De
v
ice
s
fo
r
W
a
v
e
len
g
th
M
u
lt
ip
lex
in
g
a
n
d
D
e
mu
lt
ip
lex
in
g
”
,
Op
t
o
e
lec
tro
n
ic
s,
IEE
E
P
r
o
c
e
e
d
in
g
s
,
v
o
l.
1
3
6
,
n
o
.
3
,
p
p
.
1
8
3
-
2
0
2
,
1
9
8
9
.
[2
]
E.
G
e
rd
Ke
is
e
r,
“
A
Re
v
ie
w
o
f
WDM
T
e
c
h
n
o
lo
g
y
a
n
d
A
p
p
li
c
a
ti
o
n
s”
,
Op
ti
c
a
l
Fi
b
e
r
T
e
c
h
n
o
lo
g
y
,
v
o
l
.
5
,
p
p
.
3
3
9
,
1
9
9
9
.
[3
]
S
.
S
.
Bu
jari
,
“
A
su
rv
e
y
o
n
si
m
u
latio
n
o
f
M
EM
S
o
p
t
ica
l
sw
it
c
h
f
o
r
W
DM
a
p
p
li
c
a
ti
o
n
s”
,
Wo
rld
J
o
u
rn
a
l
o
f
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
2
,
n
o
.
1
0
,
p
p
.
3
9
-
4
3
,
2
0
1
2
.
[4
]
M
.
M
´
e
d
a
rd
,
D.
M
a
r
q
u
is,
S
.
R.
C
h
in
n
,
“
At
ta
c
k
De
tec
ti
o
n
M
e
th
o
d
s
fo
r
a
ll
-
Op
ti
c
a
l
Ne
two
rk
s”
,
i
n
P
r
o
c
.
o
f
Ne
tw
o
rk
a
n
d
Distri
b
u
ted
S
y
ste
m
s
S
e
c
u
rit
y
S
y
m
p
o
siu
m
,
S
e
ss
io
n
3
,
p
a
p
e
r
2
,
S
a
n
Die
g
o
,
Ca
li
f
o
rn
ia,
1
9
9
8
.
[5
]
M
.
P
.
F
o
k
,
P
.
R.
P
ru
c
n
a
l
,
“
A
ll
-
O
p
ti
c
a
l
E
n
c
r
y
p
ti
o
n
b
a
se
d
o
n
I
n
terle
a
v
e
d
w
a
v
e
b
a
n
d
s
w
it
c
h
in
g
m
o
d
u
la
ti
o
n
f
o
r
o
p
ti
c
a
l
n
e
tw
o
rk
S
e
c
u
rit
y
,
”
Op
t.
L
e
tt
.
,
v
o
l.
3
4
,
p
p
.
1
3
1
5
–
1
3
1
7
,
A
p
r.
2
0
0
9
.
[6
]
M.
P
.
F
o
k
a
n
d
P
.
R.
P
ru
c
n
a
l,
“
L
o
w
-
L
a
ten
c
y
No
n
li
n
e
a
r
F
ib
e
r
-
b
a
se
d
A
p
p
ro
a
c
h
f
o
r
D
a
ta
En
c
ry
p
ti
o
n
a
n
d
A
n
ti
-
J
a
m
m
in
g
in
Op
ti
c
a
l
Ne
t
w
o
rk
”
,
p
re
se
n
ted
a
t
th
e
2
0
0
8
IEE
E/
L
E
OS
An
n
u
a
l
M
e
e
ti
n
g
,
Ne
w
p
o
rt
B
e
a
c
h
,
U.S
.
,
No
v
.
2
0
0
8
,
P
a
p
e
r
T
h
G
3
.
[7
]
M
.
P
.
F
o
k
,
W
a
n
g
Z.
,
De
n
g
Y,
P
r
u
c
n
a
l
P
.
R.
(
2
0
1
1
)
,
“
Op
ti
c
a
l
L
a
y
e
r
S
e
c
u
rit
y
in
F
i
b
e
r
-
Op
t
ic
Ne
tw
o
rk
s”
,
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
f
o
rm
a
ti
o
n
F
o
r
e
n
sic
s
a
n
d
S
e
c
u
rity,
V
o
l.
6
,
No
.
3
,
(S
e
p
tem
b
e
r
2
0
1
1
)
,
p
p
.
(
7
2
5
-
7
3
6
),
IS
S
N
1
5
5
6
-
6
0
1
3
[8
]
M
.
M
é
d
a
rd
,
D.
M
a
r
q
u
is,
R.
A
.
Ba
rr
y
,
F
in
n
S
.
G
.
(1
9
9
7
),
“
S
e
c
u
rit
y
Iss
u
e
s
in
A
ll
-
Op
ti
c
a
l
Ne
t
w
o
rk
s
”
,
IEE
E
Ne
two
rk
,
v
o
l.
1
1
,
n
o
.
3
,
(M
a
y
/Ju
n
e
1
9
9
7
),
p
p
.
4
2
-
48
,
IS
S
N
0
8
9
0
-
8
0
4
4
.
[9
]
M
.
F
u
rd
e
k
,
N.
S
k
o
ri
n
-
Ka
p
o
v
,
M
.
Bo
silj
e
v
a
c
,
Z.
S
ip
u
s,
“
An
a
lys
is
o
f
Cro
ss
ta
lk
in
O
p
ti
c
a
l
C
o
u
p
ler
s
a
n
d
Asso
c
ia
te
d
Vu
ln
e
ra
b
il
it
ies
”
,
i
n
P
r
o
c
.
3
3
rd
I
n
t.
Co
n
v
e
n
ti
o
n
(M
I
P
RO),
M
a
y
2
0
1
0
,
p
p
.
4
6
1
–
4
6
6
.
[1
0
]
J.
K.
P
a
tel,
S
.
U.
Kim
,
D.
H.
S
u
,
S
.
S
u
b
ra
m
a
n
ia
m
a
n
d
H.
-
A
.
Ch
o
i,
“
A
Fra
me
wo
rk
fo
r M
a
n
a
g
in
g
Fa
u
lt
s a
n
d
At
ta
c
k
s
in
W
DM
Op
ti
c
a
l
Ne
two
rk
s
”
,
P
r
o
c
.
o
f
th
e
DA
RP
A
In
f
o
rm
a
ti
o
n
S
u
rv
iv
a
b
il
it
y
Co
n
fe
re
n
c
e
a
n
d
Ex
p
o
siti
o
n
,
A
n
a
h
e
im
,
Ca
li
f
o
rn
ia 2
0
0
1
.
[1
1
]
N.
M
.
Ya
z
d
a
n
i,
M
.
S
.
P
a
n
a
h
i,
E.
S
.
P
o
o
r
,
“
In
telli
g
e
n
t
De
tec
ti
o
n
o
f
In
tru
sio
n
in
t
o
Da
tab
a
se
u
sin
g
Ex
ten
d
e
d
Clas
sif
ier S
y
ste
m
s
”
,
IAE
S
/IJECE,
v
o
l.
3
,
n
o
.
5
,
Oc
t
o
b
e
r
2
0
1
3
,
p
p
.
7
0
8
-
7
1
2
.
[1
2
]
A
.
M
.
A
d
e
l
S
a
leh
,
Ja
n
e
M
.
S
i
m
m
o
n
s,
“
T
e
c
h
n
o
lo
g
y
a
n
d
A
r
c
h
it
e
c
tu
re
to
En
a
b
le
th
e
E
x
p
l
o
siv
e
g
ro
w
th
o
f
th
e
In
tern
e
t,
”
IEE
E
Co
mm
u
n
ica
t
io
n
s
M
a
g
a
zin
e
,
p
p
.
1
2
6
-
1
3
2
,
Ja
n
.
,
2
0
1
1
.
[1
3
]
D.
R.
Ra
n
i,
S
.
V
e
n
k
a
tes
wa
lu
,
“
S
e
c
u
rit
y
a
g
a
in
st
T
i
m
in
g
A
n
a
l
y
si
s
A
tt
a
c
k
”
,
IAE
S
/IJECE,
v
o
l.
5
,
n
o
.
4
,
A
u
g
u
st
2
0
1
5
,
p
p
.
7
5
9
-
7
6
4
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
An
ita
A
n
tw
i
w
a
a
re
c
e
iv
e
d
h
e
r
B.
E
in
2
0
0
9
f
ro
m
A
ll
Na
ti
o
n
s
Un
iv
e
rsit
y
,
G
h
a
n
a
in
El
e
c
tro
n
ics
a
n
d
Co
m
m
u
n
ica
ti
o
n
En
g
i
n
e
e
rin
g
a
n
d
M
.
T
e
c
h
.
in
2
0
1
2
f
ro
m
S
RM
u
n
iv
e
rsit
y
,
In
d
ia
in
Co
m
m
u
n
ica
ti
o
n
S
y
st
e
m
s
En
g
in
e
e
rin
g
.
S
h
e
is
c
u
rre
n
tl
y
a
P
h
D
c
a
n
d
id
a
te
in
S
a
m
Hig
g
in
Bo
tt
o
m
u
n
iv
e
rsity
o
f
Ag
ricu
lt
u
re
T
e
c
h
n
o
lo
g
y
a
n
d
S
c
ien
c
e
s,
In
d
ia i
n
El
e
c
tro
n
ics
a
n
d
C
o
m
m
u
n
ica
ti
o
n
.
S
h
e
w
a
s
a
lec
tu
re
r
in
A
ll
Na
ti
o
n
s
Un
iv
e
rsity
,
G
h
a
n
a
f
ro
m
2
0
1
2
t
o
2
0
1
4
a
n
d
h
e
r
re
se
a
rc
h
in
tere
st
a
re
in
th
e
a
re
a
s
o
f
F
ib
e
r
o
p
t
ics
se
c
u
rit
y
,
Cr
y
p
to
g
ra
p
h
y
a
n
d
c
o
d
in
g
th
e
o
ry
.
M
s.
A
n
t
w
i
w
a
a
is
a
m
e
m
b
e
r
o
f
IEE
E,
IOP
,
NSBE
a
n
d
I
ET
G
h
a
n
a
.
An
il
K
u
m
a
r
is
A
ss
t.
P
ro
f
.
a
t
S
HIA
T
S
-
DU
A
ll
a
h
a
b
a
d
.
He
o
b
tai
n
e
d
B.
(M
M
M
EC,
G
o
rk
h
p
u
r)
in
ECE
,
M
.
T
e
c
h
.
(IIT
BHU
F
o
rm
e
rly
I
T
B.
H.U.)
in
M
icr
o
e
lec
tro
n
ics
En
g
in
e
e
rin
g
,
a
n
d
P
h
D
f
ro
m
S
HIA
T
S
-
DU
In
d
ia.
He
g
u
id
e
d
v
a
rio
u
s
p
r
o
jec
ts
&
re
se
a
rc
h
a
t
u
n
d
e
rg
ra
d
u
a
te
&
p
o
stg
ra
d
u
a
te
lev
e
l.
He
p
u
b
li
sh
e
d
m
a
n
y
re
se
a
rc
h
p
a
p
e
r
in
d
if
f
e
re
n
t
jo
u
r
n
a
ls.
He
h
a
s
m
o
re
th
a
n
1
0
y
e
a
rs
tea
c
h
in
g
e
x
p
e
rien
c
e
a
n
d
a
c
ti
v
e
l
y
in
v
o
lv
e
d
in
re
se
a
rc
h
a
n
d
p
u
b
li
c
a
ti
o
n
s.
His
a
re
a
o
f
in
tere
st
in
c
lu
d
e
s
A
n
ten
n
a
,
m
icro
w
a
v
e
,
a
rti
f
icia
l
n
e
u
ra
l
n
e
tw
o
rk
a
n
d
V
L
S
I.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
4
,
A
u
g
u
s
t
2
0
1
7
:
2
1
0
1
–
2
1
0
8
2108
A.K
.
J
a
is
w
a
l
is
P
r
o
f
.
a
n
d
He
a
d
o
f
ECE
-
De
p
a
rt
m
e
n
t
a
t
S
HIA
T
S
-
D
U A
ll
a
h
a
b
a
d
.
He
o
b
tai
n
e
d
M
.
S
c
.
in
El
e
c
tro
n
ic
&
Ra
d
io
En
g
in
e
e
rin
g
f
ro
m
A
ll
a
h
a
b
a
d
Un
iv
e
rsit
y
in
1
9
6
7
.
He
g
u
id
e
d
v
a
rio
u
s
p
ro
jec
ts
&
re
se
a
rc
h
a
t
u
n
d
e
rg
ra
d
u
a
te
&
p
o
stg
ra
d
u
a
te
lev
e
l.
He
h
a
s
m
o
re
th
a
n
4
0
y
e
a
rs
In
d
u
strial,
re
se
a
rc
h
a
n
d
T
e
a
c
h
in
g
e
x
p
e
rien
c
e
a
n
d
a
c
ti
v
e
l
y
in
v
o
lv
e
d
in
re
se
a
rc
h
a
n
d
p
u
b
li
c
a
ti
o
n
s.
Hi
s
a
re
a
o
f
in
tere
st
in
c
lu
d
e
s Op
ti
c
a
l
Ne
tw
o
rk
s an
d
sa
telli
te co
m
m
u
n
ica
ti
o
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.