<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1628585</id>
	<title>Projects - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1628585"/>
	<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php/Special:Contributions/A1628585"/>
	<updated>2026-04-30T23:34:14Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.4</generator>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7291</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7291"/>
		<updated>2016-10-26T09:52:34Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Final Design */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Final Design === &lt;br /&gt;
&lt;br /&gt;
The PCB was manufactured using Entech electronics, using FR4 board material with a thickness of 1.6 mm and a dielectric constant of epsilon = 4.2 . Due to cost constraints a stencil cut out could not be purchased and the board was soldered by hand in house.&lt;br /&gt;
&lt;br /&gt;
[[File:foto.jpg|750px]]&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|750px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7290</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7290"/>
		<updated>2016-10-26T09:52:19Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Final Design */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Final Design === &lt;br /&gt;
&lt;br /&gt;
The PCB was manufactured using Entech electronics, using FR4 board material with a thickness of 1.6 mm and a dielectric constant of epsilon = 4.2 . Due to cost constraints a stencil cut out could not be purchased and the board was soldered by hand in house.&lt;br /&gt;
&lt;br /&gt;
[[File:foto.jpg]]&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|750px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpg&amp;diff=7289</id>
		<title>File:Foto.jpg</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpg&amp;diff=7289"/>
		<updated>2016-10-26T09:51:59Z</updated>

		<summary type="html">&lt;p&gt;A1628585: A1628585 uploaded a new version of &amp;amp;quot;File:Foto.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpg&amp;diff=7288</id>
		<title>File:Foto.jpg</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpg&amp;diff=7288"/>
		<updated>2016-10-26T09:50:32Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpeg&amp;diff=7287</id>
		<title>File:Foto.jpeg</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Foto.jpeg&amp;diff=7287"/>
		<updated>2016-10-26T09:48:35Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7286</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7286"/>
		<updated>2016-10-26T09:47:01Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Final Design === &lt;br /&gt;
&lt;br /&gt;
The PCB was manufactured using Entech electronics, using FR4 board material with a thickness of 1.6 mm and a dielectric constant of epsilon = 4.2 . Due to cost constraints a stencil cut out could not be purchased and the board was soldered by hand in house.&lt;br /&gt;
&lt;br /&gt;
[[File:foto.jpeg]]&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|750px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7282</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7282"/>
		<updated>2016-10-26T09:44:33Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Transmit System Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|750px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7279</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7279"/>
		<updated>2016-10-26T09:43:03Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Transmit System Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|500px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7277</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7277"/>
		<updated>2016-10-26T09:42:51Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Transmit System Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png|100px]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7274</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7274"/>
		<updated>2016-10-26T09:41:02Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.png]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Graph.png&amp;diff=7273</id>
		<title>File:Graph.png</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Graph.png&amp;diff=7273"/>
		<updated>2016-10-26T09:40:39Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7271</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7271"/>
		<updated>2016-10-26T09:40:13Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Transmit System Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is 14 dBm&lt;br /&gt;
&lt;br /&gt;
[[File:Graph.jpg]]&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7270</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7270"/>
		<updated>2016-10-26T09:38:58Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* PCB Design 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Meme.png]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Meme.png&amp;diff=7269</id>
		<title>File:Meme.png</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=File:Meme.png&amp;diff=7269"/>
		<updated>2016-10-26T09:38:26Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7261</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7261"/>
		<updated>2016-10-26T09:33:55Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7260</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7260"/>
		<updated>2016-10-26T09:31:37Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7259</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7259"/>
		<updated>2016-10-26T09:31:25Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7258</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7258"/>
		<updated>2016-10-26T09:30:34Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
[1] G . Charvat, J . Williams, A . Fenn, S . Kogon, J .Herd. RES.LL-003 Build a Small Radar&lt;br /&gt;
System Capable of Sensing Range, Doppler, and Synthetic Aperture Radar Imaging, January&lt;br /&gt;
IAP 2011. (Massachusetts Institute of Technology: MIT OpenCourseWare),&lt;br /&gt;
http://ocw.mit.edu (Accessed 19 Apr, 2016). License: Creative Commons BY-NC-SA&lt;br /&gt;
[2] M . Richards, J . Scheer, William . Holm Principles of Modern Radar Vol. I: Basic&lt;br /&gt;
Principles, 2nd ed., SciTech Publishing, 2015.&lt;br /&gt;
[3] B. Mahafza, A.Elsherbeni Matlab Simulations for Radar Systems Design, 1st ed., Chapman&lt;br /&gt;
&amp;amp; Hall, 2004.&lt;br /&gt;
[4] M . Jankiraman Design of Multi-Frequency CW Radars, 1st ed., McGraw Hill, 2007.&lt;br /&gt;
[5] J . Toomay, P . Hannen Radar Principles for the Non-Specialist, 3rd ed., SciTech Publishing,&lt;br /&gt;
2004.&lt;br /&gt;
[6] C. Coleman, An Introduction to Radio Frequency Engineering, 1st ed., Cambridge University&lt;br /&gt;
Press, 2004.&lt;br /&gt;
[7] D . Pozar, Microwave Engineering, 3rd ed., John Wiley &amp;amp; Sons, Inc, 2012.&lt;br /&gt;
[8] &amp;quot;Mini Circuits - Global Leader of RF and Microwave Components&amp;quot;, Minicircuits.com, 2016.&lt;br /&gt;
[Online]. Available: http://www.minicircuits.com/. [Accessed: 22- Apr- 2016].&lt;br /&gt;
[9] M. Skolnik Introduction to Radar Systems, 3rd ed., McGraw Hill, 2001.&lt;br /&gt;
[10] B. Wadell Transmisson Line Design Handbook, 1st ed., Artech House, 1991.&lt;br /&gt;
[11] &amp;quot;RF / Microwave PC Board Design and Layout&amp;quot;, jlab.org, 2016. [Online]. Available:&lt;br /&gt;
https://www.jlab.org/accel/eecad/pdf/050rfdesign.pdf. [Accessed: 22- Apr- 2016].&lt;br /&gt;
[12] &amp;quot;AD8338 Technical Data Sheet&amp;quot;, www.analog.com, 2016. [Online]. Available:&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf.&lt;br /&gt;
[Accessed: 5- Jun- 2016].&lt;br /&gt;
http://www.analog.com/media/en/technical-documentation/data-sheets/AD8338.pdf&lt;br /&gt;
[13] &amp;quot;High Speed PCB Layout Techniques&amp;quot;, http://www.ti.com/, 2016. [Online].&lt;br /&gt;
Available:http://www.ti.com/lit/ml/slyp173/slyp173.pdf&lt;br /&gt;
[14] &amp;quot;High-Speed DSP Systems Design&amp;quot;, www.ti.com, 2005. [Online]. Available:&lt;br /&gt;
http://www.ti.com/lit/ug/spru889/spru889.pdf&lt;br /&gt;
[15] &amp;quot;Wireless LANs in the 2.4 GHz band FAQ&amp;quot;, www.acma.gov.au, 2016. [Online]. Available:&lt;br /&gt;
http://www.acma.gov.au/Citizen/Internet/Internet-services/Wireless-local-area-&lt;br /&gt;
networks/wireless-lans-in-the-24-ghz-band-faqs.&lt;br /&gt;
60&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7256</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7256"/>
		<updated>2016-10-26T09:29:20Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
=== Transmit System Results ===&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7255</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7255"/>
		<updated>2016-10-26T09:28:57Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
\subsection{Transmit System Results}&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
=== PCB Design 2.0 ===&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7254</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7254"/>
		<updated>2016-10-26T09:28:29Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Results ==&lt;br /&gt;
&lt;br /&gt;
\subsection{Transmit System Results}&lt;br /&gt;
&lt;br /&gt;
The first testing began on the transmitting system, applying a voltage to the VCO and measuring the frequency and frequency output of the system by connecting the output directly to a spectrum analyser. The cables used for measurements were found to have significant losses, and losses were measured using the RF signal generator at each power and frequency measured from the transmit system.&lt;br /&gt;
&lt;br /&gt;
The transmitting system consists of the power amplifier and bandpass filter. From pre-calculations, the expected transmit power is&lt;br /&gt;
&lt;br /&gt;
For the bandwidth of 2.4GHz to 2.5GHz, as required for this system, a minimum voltage of 2.1331V and a maximum voltage of 3.5803. Hence the transmission signal is a 50% duty cycle sawtooth wave, with a DC offset of 2.1331V, an amplitude of 2.8944V and a PRF of 200Hz.&lt;br /&gt;
&lt;br /&gt;
The transmission power was smaller than expected theoretically, comparing to the data sheets, with measurements of 3dB lower power levels than expected.&lt;br /&gt;
&lt;br /&gt;
The variations in power with frequency would be a result of changes of impedance in the transmission due to changes in frequency. &lt;br /&gt;
&lt;br /&gt;
The receive chain was not operational upon fabrication. Testing of the chain with an input frequency of 700MHz and power of -30dBm netting an output power of 5dBm as expected at the amplifier output. Upon visual inspection of the mixer the alignment was off, and attempts to fix this issue were not successful.&lt;br /&gt;
&lt;br /&gt;
= PCB Design 2.0 =&lt;br /&gt;
&lt;br /&gt;
After the manufacture of the initial PCB design, errors in layout were corrected and is present in the final PCB. &lt;br /&gt;
&lt;br /&gt;
The changes are relevant to the practical manufacture and bypassing. The DC power supply has been flipped into it&amp;#039;s correct place, and the circular through holes have been replaced with rectangular plated through holes. The capacitor DC input bypassing capacitor has been moved to accommodate for the size of the DC power jack, and so has the capacitor discharge resistor. Thermal relief has been added to the SMA jacks, to assist with soldering. Two more bypassing capacitors have been placed at the transmit amplifier, to better assist with bypassing at that point, particularly noise present from leakage of the VCO. Implemented is an amplifier for the VCO input, decreasing the drive required on the input source.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7250</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7250"/>
		<updated>2016-10-26T09:26:48Z</updated>

		<summary type="html">&lt;p&gt;A1628585: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
This thesis outlines the steps taken to design a portable Radar system into a PCB based implementation. The objective characteristics were a range resolution smaller than 2 and a range of approximately 100m for a target with a radar cross section of 1m^2&lt;br /&gt;
&lt;br /&gt;
Through the analysis of different radar architectures and waveforms a stretch processing system was decided upon.The designed system had a theoretical range resolution of 1.764m and a maximum range of 100m.&lt;br /&gt;
&lt;br /&gt;
Although the system was deemed not operational at completion, the transmitter system was operational, tested and voltage waveforms designed for its use. The fabricated system had increased portability comparing to previous works outlined in.&lt;br /&gt;
&lt;br /&gt;
Although the manufacture objectives of the project were not met, the design objectives were and further work and manufacture of PCB design 2.0 will result in an operational system with the referenced above characteristics.&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-160c_Cyber_Security_-_Personal_Networks_and_Devices&amp;diff=7241</id>
		<title>Projects:2016s1-160c Cyber Security - Personal Networks and Devices</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-160c_Cyber_Security_-_Personal_Networks_and_Devices&amp;diff=7241"/>
		<updated>2016-10-26T09:19:28Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Group Members: Michael Hua, Olga Rodionova, Petko Stefanov&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NFC Security ==&lt;br /&gt;
&lt;br /&gt;
Michael Hua&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Near Field Communication (NFC) is a form of wireless communication over a very short range in the order of centimeters [1]. NFC technology differentiates from other forms of wireless communication with its speed and efficiency. The communication between two devices is able to occur in just seconds with minimal overhead setup costs that is associated with Bluetooth and QR Codes. Communication can happen in various modes: Active – Active, Active – Passive, Passive – Active; where active devices have their own power supply and passive devices are powered from active devices via induction [1, 2]. An example of an active device may be a smart phone and a passive device may be an NFC Tag. NFC tags are a common technology where a tag is able to store data (a simple message or data structure) and is able to be read by an NFC capable device, such as a smart phone [1]. &lt;br /&gt;
&lt;br /&gt;
== The Security Issue ==&lt;br /&gt;
&lt;br /&gt;
In a society where technology is advancing at an astonishing rate, technology such as NFC seems very promising. NFC technology markets itself as quick and easy, however, the compromise or trade off would be security [1]. NFC is able to enhance the quality of our current technology and opens up more possibilities. Thus the motivation behind this research project is to strengthen NFC security in attempt to promote further development and utilisation of NFC-Tag based applications and NFC based technology.&lt;br /&gt;
&lt;br /&gt;
Because the NFC scanning process is so quick and easy, there are major security issues involving confidentiality, authentication, integrity and access/availability. Upon further investigation, there are have been multiple studies and analyses which delve into this issue further. However, by breaking down the entire end-to-end NFC scanning process, it is evident the current investigations and research targets the middle stages of the process, mainly considering the stored data itself. &lt;br /&gt;
[[File:NFC Chip.jpg|350px|thumb|right|NFC chip implanted in hand]]&lt;br /&gt;
A recent security exploit in NFC revealed that a hacker was able to implant an NFC-capable chip in his hand (refer to right image) and able to exploit members of the public by infecting their device with malware [3]. Although, the malware is quite simplistic and limited with numerous drawbacks, the fact that these devices could be easy compromised is an issue of concern [3]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A breakdown of the NFC scanning process into four steps:&lt;br /&gt;
&lt;br /&gt;
1.	Scanning of the NFC capable devices (devices or tags);&lt;br /&gt;
&lt;br /&gt;
2.	Notification; &lt;br /&gt;
&lt;br /&gt;
3.	Authentication, encryption and integrity check; &lt;br /&gt;
&lt;br /&gt;
4.	Network and content integrity.&lt;br /&gt;
&lt;br /&gt;
== Proposed Solution ==&lt;br /&gt;
&lt;br /&gt;
To directly combat this issue, a solution has been proposed making the first step of the NFC scanning process more deliberate by incorporating numerous conditions. If and only if these conditions are met, will the NFC scanning process be allowed to proceed.  Previously, if an unlocked NFC device and NFC tag were brought into very close proximity of each other, the device would successfully scan without permission from the user; this was the fundamental problem with the security breach where the hacker implanted a chip into his hand. &lt;br /&gt;
&lt;br /&gt;
The underlying principle behind the proposed solution is to make the process of NFC require active input but still remain as quick and as convenient as it were before. Basically, the NFC capabilities will indefinitely remain disabled until certain conditions are met. Once these conditions are met, the NFC capabilities will be enables for a short period of time where the user is then able to scan and utilise the NFC functions. After this brief period, the NFC capabilities will then again be disabled indefinitely.&lt;br /&gt;
&lt;br /&gt;
To test the feasibility and demonstrate this, a simple android application was developed. The application disables the phones NFC capabilities and only enables it only for a short period of time if the proximity sensor is not obstructed and the phone detects a shaking motion.  &lt;br /&gt;
&lt;br /&gt;
As the reputation and major selling point of NFC technology is that is quick, easy and convenient, the conditions to enable NFC communication must align with this very idea. The conditions required deliberate human action but must remain quick and convenient because if it becomes too complex, there would be nothing deterring developers and users towards Bluetooth or QR Code technology – other forms of short range wireless communication.&lt;br /&gt;
&lt;br /&gt;
The first condition which must be met is proximity. Under normal circumstances when a user decides to scan another device or an NFC Tag, the proximity sensor is unobstructed – it is counter intuitive and very unlikely a user will purposely scan their device with the proximity sensor obstructed. The idea behind this condition is to prevent a device being unknowingly scanned by a hacker if it is faced down, in the user’s pocket or bag, etc. This is just one of the two conditions proposed in attempt to improve the security of NFC technology.&lt;br /&gt;
&lt;br /&gt;
The other condition which must be met is a deliberate action. This deliberate action takes advantage of the phones accelerometer. This is a personalised action set by the user and could be a swish, a shake or any personalised action which can be recreated by the user. This deliberate action condition in most cases completely removes the possibility accidental and unwarranted scanning of devices. Furthermore, it idea of a simple physical action as one of the conditions to enable NFC capabilities still align with the fundamental idea and selling point of NFC technology. Although it does require an additional active input to enable the function it is still very quick, easy and convenient.&lt;br /&gt;
[[File:Process1.PNG|750px|thumb|centre|Flow Diagram of the NFC Enabling Process with Added Conditions]]&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
The application was successfully implemented with all the designed features. It was then able to be tested with NFC Tags. The overall conclusion is that this idea is feasible although there is a slight delay in the NFC being toggled on/off. Furthermore, the shaking motion is quite generic so this method will only be able to prevent some forms of unwarranted scanning. Where the original idea was to make this shake any form of custom motion, the next logical step would be to implement this and further build on the application. This next step should be able to have a “capture mode” where for a short period of time, records and stores a personalised motion through manipulation of the accelerometer. This can then replace the shake detector module; so if the phone is unlocked, the proximity sensor if not obstructed and the personalised motion is recreated, the phones NFC capabilities will be enabled for a short period of time. &lt;br /&gt;
&lt;br /&gt;
Though the application is not the main purpose or goal of this research, it is just a simple and easy method to practically demonstrate and test the feasibility of the idea. If it is determined this method is feasible and practical, phone developers may consider incorporating this additional security measure into their phones; this could be achieved much more easily without all the limitations encountered as an amateur application developer. Furthermore, it wouldn’t be in the form of an application, it would have to be implemented into the phones operating system and always running as a background operation.Although the protocol has been proposed for the use with NFC Tags, if technology is further developed, the same concept should be able to be utilised in all modes of NFC communication (active-active, active-passive, etc).&lt;br /&gt;
&lt;br /&gt;
== Future Works ==&lt;br /&gt;
&lt;br /&gt;
As the NFC scanning process has been broken down, it is evident another aspect of security in the NFC process which has yet to be considered is security from the back end. This is at the final stages of the process where the user has intentionally communicated with another device where the stored information has passed all checks for authenticity and integrity. Some ideas which can be further research would be along the lines of some network based security solutions. This may entail checking the software against a known blacklist/whitelist etc. Another alternative can be the use of an antivirus; this could potentially extend to an online antivirus of some sort as the device may be limited in size. Furthermore, a sandbox environment could also be utilised where the program is executed in an environment which is isolated and not able to interact with other elements of the system.   &lt;br /&gt;
&lt;br /&gt;
These are just some aspects of NFC security that can be further investigated. Overall, the future of NFC is promising; it is a quick, easy and convenient method of wireless communication with much potential. However, further research and development is required to strengthen and improve its security before it is utilised more widely in a commercial sense. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Petko Stefanov:&lt;br /&gt;
An analysis of security flaws in the NFC functionality of modern mobile devices &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Problem Statement&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Near Field Communication (NFC) is a relatively new communications protocol used in most modern mobile devices. It is used for very close range communication between devices or compatible NFC capable objects. One such object is a NFC tag, which can store instructions to be executed by any device that ``scans&amp;quot; it via NFC (e.g Go to a website, call a phone number or access an application). While convenient, such tags can be manipulated to store malicious instructions which can harm or compromise the device. The lack of security protocols on mobile devices make this form of malware infection very easy to execute. This project aims to introduce a solution to this problem by implementing a method in which a user may be able to stop their device from performing instructions transmitted by a malicious NFC tag, after it has been scanned. &lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Motivation and Significance&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
NFC is a tool that is being more and more widely used in mobile devices. However, the security flaws associated with it hinder is implementation. This project is important as it helps address these issues and possibly find a solution to them, thus providing a safer device to the user with the convenience and flexibility NFC allows for.&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Objectives&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
1.  Prepare an in-depth literature review covering security flaws in NFC tags, methods of attack and past attempts to provide solutions.&lt;br /&gt;
&lt;br /&gt;
2. Propose and design a solution. At this point in time, this is likely to be a system which takes into account prevention of scanning malicious NFC tags and limited protection once a tag is scanned.&lt;br /&gt;
&lt;br /&gt;
3. Analyse designed solution and identify strengths and weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is NFC? ==&lt;br /&gt;
NFC or Near Field Communications is a set of wireless communication protocols, mainly used in mobile devices. It is a derivation of RFID technology in the sense that it uses electromagnetic induction to power NFC compatible objects and transmit data to devices[1]. It transmits data at 13.56MHz and very short ranges (around 4-10cm)[4] and can transmit from device to device or via passive NFC objects (called tags) to device simply by placing the appropriate device or object within range of each other. Because of this short range, NFC uses very little power and does not require any pairing code[4]. Thus primary uses of NFC are for very quick transmissions of data from devices, normally for user convenience in replacing mundane actions.&lt;br /&gt;
&lt;br /&gt;
==NFC Tags==&lt;br /&gt;
Among the many functions of NFC, many utilise objects called NFC tags. NFC tags are passive objects that contain a computer chip which allows for interaction with NFC compatible devices. Their general purpose is simply to store instructions which (if compatible) are executed by the device that scans it via NFC. These instructions can be simple as ``call a phone number&amp;quot;, ``access a URL&amp;quot;, ``open an application&amp;quot;, or as complicated as ``open this electronic lock&amp;quot;, ``deduct payment from my funds&amp;quot;[5]. &lt;br /&gt;
&lt;br /&gt;
NFC tags contain no power source, thus are deemed ``passive&amp;quot;[5]. They are powered exclusively by electromagnetic induction from the scanning device and are automatically scanned when within range of an NFC enabled device. Specifically speaking, one only needs to place their phone within close proximity of a tag, and if compatible, whatever instructions it contains will be scanned executed without need of input. This convenience is a major driving point in the implementation of NFC in consumer electronics. &lt;br /&gt;
&lt;br /&gt;
However, it is important to note that of the major mobile brands, only Android devices have the capability of scanning NFC tags. Apple devices, while they do possess peer to peer capabilities for services such as apple pay, do NOT possess the ability to scan tags at will[6]. This is likely to do with the security issues that come associated with the ``convenience&amp;quot; of having tag instructions being executed automatically with no user interaction. Apple having a very user friendly and secure public image likely does not want to implement NFC in its full form due to these security issues. &lt;br /&gt;
&lt;br /&gt;
==Security Flaws==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Phishing attacks&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
This is the most commonly encountered attack type for NFC tags. The basic definition of such an attack is the NFC tag containing a URL link to a website that has the possibility of compromising the victim&amp;#039;s device. Such attacks are normally carried out by convincing the victim that they website they are accessing is legitimate and trustworthy [7]&lt;br /&gt;
&lt;br /&gt;
A defining aspect of a phishing attack is the victim willingly inputting sensitive information, believing the source to be a reputable and secure party [7]. Such attacks can easily be executed via NFC. Taking the smart poster example from stage 1, an attacker can mimic a smart poster but program the embedded tag for malicious purposes. For example the poster can advertise a promotion which is accessible via a social media website, which the embedded tag links to. However, unknown to the victim is that the linked social media website is counterfeit and the data they are inputting is being received by the hacker&amp;#039;s database[8]. In other words, the attacker has essentially created a website that ``looks&amp;quot; like the legitimate version and storing personal and sensitive information from the user, which can then be used by the hacker for nefarious purposes. After the victim has successfully entered their personal information (such as login credentials and/or name), they are then redirected to the legitimate website and thus unaware of what has transpired[8].&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Malware Infection&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Malware infection via NFC is done by using the wireless connection to instruct the phone to access an outside piece of software which infects the device.&lt;br /&gt;
&lt;br /&gt;
The end goal of such an attack is to infect a device with malware. However this normally can&amp;#039;t be done by directly sending software over via the NFC tag, as they contain too little memory to store large files. Thus, the most common form of malware infection via NFC is to store a link to a website on the tag. The website then downloads a piece of malware to the device via an internet connection, thus infecting it[8]. &lt;br /&gt;
	&lt;br /&gt;
But why? Malware is software designed to damage or disrupt a device. The type of malware depends on the intention of the hacker. In cases of infecting mobile devices, these are some common types of malware the hacker can employ:&lt;br /&gt;
&lt;br /&gt;
-Spyware: which records user activity on the phone. This gives sensitive information to the hacker such as login credentials, identity credentials or financial credentials [9]&lt;br /&gt;
&lt;br /&gt;
-Bots: which can give the hacker remote access to he device and the ability to control it [9]&lt;br /&gt;
&lt;br /&gt;
-Worm: which is the most commonly used type of malware. Worms can replicate themselves and then attempt to spread to other devices in the victim&amp;#039;s connected network [9]. It&amp;#039;s very possible that a worm infecting a mobile device via NFC is only using it as a mode of transportation until the phone connects to a home network to which the worm can spread to the victim&amp;#039;s personal computer. &lt;br /&gt;
&lt;br /&gt;
==Proposed Solution==&lt;br /&gt;
&lt;br /&gt;
Overall security design will have 2 components. A ``front end&amp;quot;, which prevents unwanted tags from being scanned in the first place at the user&amp;#039;s discretion, and a ``back end&amp;quot; that analyses a scanned tag&amp;#039;s contents and determines if it is harmful to the device, blocking it if so&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Front End&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The chosen design incorporates a combination of the Proximity Detector and Accelerometer methods. The reason for this is they both are non intrusive additions to the NFC protocol by only requiring the user to hold a device a certain distance or move it a certain way. As well as this, using both these methods covers a wide range of attack methods. The requirement for phone movement when scanning the tag provides an input which only the user can make when they wish to scan the tag, preventing most attacks. The proximity sensor then provides a nice backup requirement for when there is unwanted movement on the device (such as when it&amp;#039;s in the user&amp;#039;s pocket). Thus, the combination of both provides a secure front-end protection ensuring that if a tag is scanned, the user was the one who initiated it.&lt;br /&gt;
&lt;br /&gt;
[[File:FrontEnd.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Back End&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
When considering the above options as to how to organise the Back-End Security layer, the design can be divided into 3 possible sub-layers of protection:&lt;br /&gt;
&lt;br /&gt;
1. Browser Level&lt;br /&gt;
&lt;br /&gt;
2. File Level&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Browser Level&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The browser-level protection focusses on stopping a scanned tag from linking malicious URLs. In this design, browser protection is implemented much like Browser protection seen in most Desktop security suits: with a Blacklist of untrustworthy and malicious URLs. When a new tag is scanned, and its NDEF message is detected as a URL, the user device will scan through the blacklist to see if it matches a known malicious site. If so, then the execution of this instruction is halted and the user is presented a pop-up message which states ``This URL links to a harmful website. Do you still wish to proceed?&amp;quot;. The use now has a final choice in continuing on (ideally, then should press ``no&amp;quot;), if so the URL proceeds to open as normal. If the user pressed ``no&amp;quot; on the prompt then the execution of the tag&amp;#039;s instructions stops. It is important to note that this ``final warning&amp;quot; is a pop-up prompt. Whilst it was discussed that such messages detract from the convenience of NFC and are seen as an annoyance, in this case, where the device is CONFIRMED to be in real danger, such a warning is necessary. As well as this, such prompts will not occur often unless the user is seeking out malicious tags on purpose. &lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
Along with the blacklist, there will also be a whitelist to work in conjunction with it. What this does is allow for the possible detection of several different types of malicious URLs that were not found in the blacklist. So if the URL in question:&lt;br /&gt;
	&lt;br /&gt;
1. Links to a phishing website: The website in question will not be whitelisted, thus a message/icon is shown to the user, stating that this website is not secure/confirmed. If the phishing site in question is attempting to mimic a legitimate site that IS whitelisted, then the user will be able to know that the URL liked by the tag is fake.&lt;br /&gt;
		&lt;br /&gt;
2. Links to a site that downloads malware: In this case, the browser security cannot check if a piece of software is legitimate, thus if software is downloaded, then it is passed onto the File-Level sub-layer for a security scan. &lt;br /&gt;
&lt;br /&gt;
In either case the user has some form protection against the URL in question which is vastly more secure than the current form of the technology. It is also important to note that the lists themselves must be frequently updated to keep up with new sites being created, and come from a trustworthy source. For Android devices, it is in the best interests of the developer/manufacturer to ensure this list comes directly from them as they can have confidence in their device security, thus guarantee safety to the consumer.&lt;br /&gt;
&lt;br /&gt;
[[File:BackEndURL.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;File Level Protection&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The design on protecting the device at a File-Level will mimic the structure of a desktop Anti-Virus program in the sense that it shall use Signature, Heuristic and Behavioural detection methods. The combination of these 3 security checks on a file should be sufficient to detect malicious behaviour and successfully flag it as malware.&lt;br /&gt;
	&lt;br /&gt;
When a file is detected via NFC tag or NFC linked URL, the system shall first check a whitelist of file signatures to see if the file in question has been deemed ``safe to execute&amp;quot;. If the system finds a match in the list, then the file is immediately executed with no check. This list is initially created by the 1st party developer (e.g Google), but after which it will be added to by the security system as files are deemed ``safe&amp;quot; by the subsequent detection systems. The reason for this is to save processing power, particularly in the behaviour based detection which shall use sandboxing, which is computationally intensive. Thus, to avoid long wait times, the whitelist shall be used to allow previously scanned files to execute normally. &lt;br /&gt;
	&lt;br /&gt;
If a match is not found, then the file first undergoes Signature based detection. The signature based detection shall once again, utilise a blacklist of known malware to compare the tag&amp;#039;s contents&amp;#039; signature with. A file, whose signature matches a known malware shall be blocked and the user shall be notified with a pop-up notification. The user is then given an option to either delete the file (recommended), or proceed at their discretion, at which point the file is executed as normal. Like the whitelist, the blacklist shall also be developed initially by the 1st party developer, but as well as this, any detections in the later methods will add the detected file&amp;#039;s signature to the blacklist for quicker detection in the future. &lt;br /&gt;
	&lt;br /&gt;
If the file passes the signature based detection, it shall undergo heuristic based detection. If possible, the contents of the file in question are accessed and analysed. The code of the file in question is analysed by the system with the intention of locating common instructions associated with malicious behaviour. These actions can include (but are not limited to):&lt;br /&gt;
&lt;br /&gt;
-Excessive amounts of copying of the file to different locations on the device&lt;br /&gt;
&lt;br /&gt;
-A program that attempts to access, modify or replace core system files&lt;br /&gt;
&lt;br /&gt;
-A program that seeks to write to restricted device memory without permission&lt;br /&gt;
&lt;br /&gt;
-A program that remains in memory after execution&lt;br /&gt;
&lt;br /&gt;
-A program that remains dormant but behaves differently after a certain period of time&lt;br /&gt;
&lt;br /&gt;
-A program that creates a back door by monitoring wifi connections for a specific signal (I.e Malware awaiting remote instructions from an outside source via WiFi. Most common in bots)&lt;br /&gt;
&lt;br /&gt;
-A program whose code is noticeably similar to that of known Blacklisted malware&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the analysed program&amp;#039;s code exhibits any of these features, the program is flagged as malware and a pop-up notification is presented to the user where they can decide how to proceed. As well as this, the file&amp;#039;s signature is added to the blacklist for faster detection in the future.&lt;br /&gt;
	&lt;br /&gt;
Finally, if the file in question, passes the heuristic detection, it undergoes behaviour based detection. To test a program&amp;#039;s absolute behaviour, it must first be executed. Obviously, doing this on the device itself is counter-intuitive as the goal is to protect it from possible malware. So to counteract this, the ability for the system to create a sandbox environment to test the program shall be added. The methodology used for behaviour analysis is the approach of using machine learning to establish a model of how software interacts with the system. This allows the sandbox to safety predict and evaluate which interactions are safe and which are malicious as the program executes in real-time based off previous data obtained. This model will likely include interactions such as those described in the heuristic detection and categorise them as malicious. If the system determines the executing file as displaying malicious tenancies, it is flagged as malware and the same pop-up notification mentioned before is displayed. To ensure trust in the system, the model used should come from a trusted developer (e.g. Google directly) to ensure the data used in system predictions is trustworthy.&lt;br /&gt;
	&lt;br /&gt;
However, if after all these security checks, the file has not been flagged as malware, it is free to execute as normal. As well as this, the signature of the file is added to the whitelist, to allow for faster execution in the future. The primary reason for this is that behaviour monitoring methods (particularly the sandbox) are computationally intensive, thus take a noticeable amount of time to perform. To preserve the convenience of NFC, it is desirable to keep functions that slow down the use of the protocol to a minimum. Thus, whitelisting established ``safe&amp;quot; files avoids unnecessary repetition of the malware scanning processes.&lt;br /&gt;
&lt;br /&gt;
[[File:BackEndFile.png]]&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
The proposed design addressed the security flaws in NFC by implementing 2 security layers, which each addresses specific security flaws in the NFC protocol. The Front End layer adds more control to the user on when NFC is active on their device. This is done by putting in a distance and movement requirement on the device which the user must first perform, signifying their input in order for NFC to be active. This stops a wide variety of attacks that seek to forcible initiate a NFC scan without the user&amp;#039;s knowledge. The main downside to such an attack is using the user&amp;#039;s consent against them, by tricking them into scanning malicious tags.&lt;br /&gt;
	&lt;br /&gt;
This is addressed in the Back-End layer, which implements an automated system to check if the contents of the tag are malicious before executing, and stopping execution if so. This is implemented by first checking if the tag links to a URL or sends a file. In the case of a URL, the system employs blacklisting to determine if the site is confirmed malicious (blocking if so), and whitelisting to determine if it is trustworthy. In they case of a file being sent via NFC or downloaded via URL link, the Back-End layer employs an Anti-Virus architecture by utilising Signature based detection, Heuristic based Detection and Behavioural based detection via sandboxing to determine if the file is malware, and blocking it if so. This layer is successful in detecting a wide variety of malware, but does experience some difficulties. It can&amp;#039;t detect content beyond URLs/Files, prone to false positive detections depending on the precision of the behaviour detection model, and is susceptible to malware that can detect sandboxes and change it&amp;#039;s behaviour. However, such files are rare to encounter and can still be detected by the other 2 detection styles.&lt;br /&gt;
	&lt;br /&gt;
Overall, despite some weaknesses in that can be improved in future work, the design covers a wide variety of attacks and is vastly more secure than the existing state of NFC. &lt;br /&gt;
&lt;br /&gt;
==Future Work==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Implement Design&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
With a basic design outlined, the next step is to test its effectiveness by implementing it in a test environment. As tag scanning are primarily aimed at Android-based devices, the logical first step is implementing an Android app to implement the security layers. Google offers the Android Software Development kit for free use. This offers a software package to program apps and a testbed for emulating android device, or the ability to download and execute to a real device, thus testing it.&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Add Malicious Instruction Detection&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
As explained, a weakness in the Back-End layer is the inability to detect tag content outside of URLs and Files. NFC tags can send instructions to the mobile advice, opening the internet browser and executing the file are just one of many. An attacker can easily add an instruction to connect their device to the victim device via another form of wireless communication (e.g. Bluetooth), and exploit this to send malware. As such, an issue that must be addressed is researching methods of detecting these malicious instructions as a whole, instead of focussing on just the two most common ones&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Detect Environment Aware Malware Behaviour&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Another weakness of the Back-End security layer was the file level sub-layer&amp;#039;s inability to detect malware with the capacity to recognise when it&amp;#039;s being executed within a sandbox, thus disguising its behaviour, avoiding detection. As of now, this type of malware is the biggest weakness the design has, and while it is possible to detect such files via Signature and Heuristic execution, there is still the possibility of avoiding detection. As such, adding another form of detection to the file level sub-layer specifically to detect this type of malware would be invaluable to the overall security of the system.  &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Olga Rodionova:&lt;br /&gt;
Medical Data Security in wearable fitness devices&lt;br /&gt;
&lt;br /&gt;
In the recent years, wearable fitness devices have been blurring the line between medical and personal Internet&lt;br /&gt;
of Things (IoT) devices. This project aims to explore security aspects of data storage on fitness devices by&lt;br /&gt;
building on existing research into smart band networks and data collection. The integration of wearable fitness&lt;br /&gt;
devices into the medical industry will be considered and possible avenues for obtaining unauthorised access to&lt;br /&gt;
private medical information will be outlined.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[1]	M. Mareli, S. Rimer, B. S. Paul, K. Ouahada, and A. Pitsillides, &amp;quot;Experimental evaluation of NFC reliability between an RFID tag and a smartphone,&amp;quot; in AFRICON, 2013, 2013, pp. 1-5.&lt;br /&gt;
&lt;br /&gt;
[2]	M. Roland, Security Issues in Mobile NFC Devices: Springer International Publishing, ISBN 978-3-319-15487-9, 2015.&lt;br /&gt;
&lt;br /&gt;
[3]	M. R. (2014, 2 April 2016). Taking “being connected” to the next level: Man implants NFC chip into his hand. Available: http://www.phonearena.com/news/Taking-being-connected-to-the-next-level-Man-implants-NFC-chip-into-his-hand_id62057&lt;br /&gt;
&lt;br /&gt;
[4] R. Triggs, ``What is NFC \&amp;amp; how does it work?&amp;quot;, Android Authority, 2013. [Online]. Available: http://www.androidauthority.com/what-is-nfc-270730/. [Accessed: 30- Mar- 2016].&lt;br /&gt;
&lt;br /&gt;
[5] R. Triggs, ``All you need to know about NFC Tags&amp;quot;, Android Authority, 2016. [Online]. Available: http://www.androidauthority.com/nfc-tags-explained-271872/. [Accessed: 30- Mar- 2016].&lt;br /&gt;
&lt;br /&gt;
[6] ``What Happens When iPhone NFC Opens Up ?&amp;quot;, Rapidnfc.com, 2016. [Online]. Available: http://rapidnfc.com/blog/121/what\_happens\_when\_iphone\_nfc\_opens\_up. [Accessed: 02- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[7] R.  Dhamija, J.  Tygar and M.  Hearst, ``Why Phishing Works&amp;quot;, in SIGCHI Conference on Human Factors in Computing Systems, New York, 2006, pp. 581-590.&lt;br /&gt;
&lt;br /&gt;
[8] K. Gold, S. Shetty and T. Rogers, ``A testbed for modeling and detecting attacks on NFC enabled mobile devices&amp;quot;, in Military Communications Conference, MILCOM 2015, Tampa, FL, 2015, pp. 635 - 640.&lt;br /&gt;
&lt;br /&gt;
[9] N. Lord, ``Common Malware Types: Cybersecurity 101&amp;quot;, Veracode, 2012. [Online]. Available: https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101. [Accessed: 09- May- 2016].&lt;br /&gt;
&lt;br /&gt;
[10] mike.m&lt;br /&gt;
&lt;br /&gt;
[4.20] Petko Stefanvoic&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-160c_Cyber_Security_-_Personal_Networks_and_Devices&amp;diff=7240</id>
		<title>Projects:2016s1-160c Cyber Security - Personal Networks and Devices</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-160c_Cyber_Security_-_Personal_Networks_and_Devices&amp;diff=7240"/>
		<updated>2016-10-26T09:18:52Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Group Members: Michael Hua, Olga Rodionova, Petko Stefanov&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NFC Security ==&lt;br /&gt;
&lt;br /&gt;
Michael Hua&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Near Field Communication (NFC) is a form of wireless communication over a very short range in the order of centimeters [1]. NFC technology differentiates from other forms of wireless communication with its speed and efficiency. The communication between two devices is able to occur in just seconds with minimal overhead setup costs that is associated with Bluetooth and QR Codes. Communication can happen in various modes: Active – Active, Active – Passive, Passive – Active; where active devices have their own power supply and passive devices are powered from active devices via induction [1, 2]. An example of an active device may be a smart phone and a passive device may be an NFC Tag. NFC tags are a common technology where a tag is able to store data (a simple message or data structure) and is able to be read by an NFC capable device, such as a smart phone [1]. &lt;br /&gt;
&lt;br /&gt;
== The Security Issue ==&lt;br /&gt;
&lt;br /&gt;
In a society where technology is advancing at an astonishing rate, technology such as NFC seems very promising. NFC technology markets itself as quick and easy, however, the compromise or trade off would be security [1]. NFC is able to enhance the quality of our current technology and opens up more possibilities. Thus the motivation behind this research project is to strengthen NFC security in attempt to promote further development and utilisation of NFC-Tag based applications and NFC based technology.&lt;br /&gt;
&lt;br /&gt;
Because the NFC scanning process is so quick and easy, there are major security issues involving confidentiality, authentication, integrity and access/availability. Upon further investigation, there are have been multiple studies and analyses which delve into this issue further. However, by breaking down the entire end-to-end NFC scanning process, it is evident the current investigations and research targets the middle stages of the process, mainly considering the stored data itself. &lt;br /&gt;
[[File:NFC Chip.jpg|350px|thumb|right|NFC chip implanted in hand]]&lt;br /&gt;
A recent security exploit in NFC revealed that a hacker was able to implant an NFC-capable chip in his hand (refer to right image) and able to exploit members of the public by infecting their device with malware [3]. Although, the malware is quite simplistic and limited with numerous drawbacks, the fact that these devices could be easy compromised is an issue of concern [3]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A breakdown of the NFC scanning process into four steps:&lt;br /&gt;
&lt;br /&gt;
1.	Scanning of the NFC capable devices (devices or tags);&lt;br /&gt;
&lt;br /&gt;
2.	Notification; &lt;br /&gt;
&lt;br /&gt;
3.	Authentication, encryption and integrity check; &lt;br /&gt;
&lt;br /&gt;
4.	Network and content integrity.&lt;br /&gt;
&lt;br /&gt;
== Proposed Solution ==&lt;br /&gt;
&lt;br /&gt;
To directly combat this issue, a solution has been proposed making the first step of the NFC scanning process more deliberate by incorporating numerous conditions. If and only if these conditions are met, will the NFC scanning process be allowed to proceed.  Previously, if an unlocked NFC device and NFC tag were brought into very close proximity of each other, the device would successfully scan without permission from the user; this was the fundamental problem with the security breach where the hacker implanted a chip into his hand. &lt;br /&gt;
&lt;br /&gt;
The underlying principle behind the proposed solution is to make the process of NFC require active input but still remain as quick and as convenient as it were before. Basically, the NFC capabilities will indefinitely remain disabled until certain conditions are met. Once these conditions are met, the NFC capabilities will be enables for a short period of time where the user is then able to scan and utilise the NFC functions. After this brief period, the NFC capabilities will then again be disabled indefinitely.&lt;br /&gt;
&lt;br /&gt;
To test the feasibility and demonstrate this, a simple android application was developed. The application disables the phones NFC capabilities and only enables it only for a short period of time if the proximity sensor is not obstructed and the phone detects a shaking motion.  &lt;br /&gt;
&lt;br /&gt;
As the reputation and major selling point of NFC technology is that is quick, easy and convenient, the conditions to enable NFC communication must align with this very idea. The conditions required deliberate human action but must remain quick and convenient because if it becomes too complex, there would be nothing deterring developers and users towards Bluetooth or QR Code technology – other forms of short range wireless communication.&lt;br /&gt;
&lt;br /&gt;
The first condition which must be met is proximity. Under normal circumstances when a user decides to scan another device or an NFC Tag, the proximity sensor is unobstructed – it is counter intuitive and very unlikely a user will purposely scan their device with the proximity sensor obstructed. The idea behind this condition is to prevent a device being unknowingly scanned by a hacker if it is faced down, in the user’s pocket or bag, etc. This is just one of the two conditions proposed in attempt to improve the security of NFC technology.&lt;br /&gt;
&lt;br /&gt;
The other condition which must be met is a deliberate action. This deliberate action takes advantage of the phones accelerometer. This is a personalised action set by the user and could be a swish, a shake or any personalised action which can be recreated by the user. This deliberate action condition in most cases completely removes the possibility accidental and unwarranted scanning of devices. Furthermore, it idea of a simple physical action as one of the conditions to enable NFC capabilities still align with the fundamental idea and selling point of NFC technology. Although it does require an additional active input to enable the function it is still very quick, easy and convenient.&lt;br /&gt;
[[File:Process1.PNG|750px|thumb|centre|Flow Diagram of the NFC Enabling Process with Added Conditions]]&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
The application was successfully implemented with all the designed features. It was then able to be tested with NFC Tags. The overall conclusion is that this idea is feasible although there is a slight delay in the NFC being toggled on/off. Furthermore, the shaking motion is quite generic so this method will only be able to prevent some forms of unwarranted scanning. Where the original idea was to make this shake any form of custom motion, the next logical step would be to implement this and further build on the application. This next step should be able to have a “capture mode” where for a short period of time, records and stores a personalised motion through manipulation of the accelerometer. This can then replace the shake detector module; so if the phone is unlocked, the proximity sensor if not obstructed and the personalised motion is recreated, the phones NFC capabilities will be enabled for a short period of time. &lt;br /&gt;
&lt;br /&gt;
Though the application is not the main purpose or goal of this research, it is just a simple and easy method to practically demonstrate and test the feasibility of the idea. If it is determined this method is feasible and practical, phone developers may consider incorporating this additional security measure into their phones; this could be achieved much more easily without all the limitations encountered as an amateur application developer. Furthermore, it wouldn’t be in the form of an application, it would have to be implemented into the phones operating system and always running as a background operation.Although the protocol has been proposed for the use with NFC Tags, if technology is further developed, the same concept should be able to be utilised in all modes of NFC communication (active-active, active-passive, etc).&lt;br /&gt;
&lt;br /&gt;
== Future Works ==&lt;br /&gt;
&lt;br /&gt;
As the NFC scanning process has been broken down, it is evident another aspect of security in the NFC process which has yet to be considered is security from the back end. This is at the final stages of the process where the user has intentionally communicated with another device where the stored information has passed all checks for authenticity and integrity. Some ideas which can be further research would be along the lines of some network based security solutions. This may entail checking the software against a known blacklist/whitelist etc. Another alternative can be the use of an antivirus; this could potentially extend to an online antivirus of some sort as the device may be limited in size. Furthermore, a sandbox environment could also be utilised where the program is executed in an environment which is isolated and not able to interact with other elements of the system.   &lt;br /&gt;
&lt;br /&gt;
These are just some aspects of NFC security that can be further investigated. Overall, the future of NFC is promising; it is a quick, easy and convenient method of wireless communication with much potential. However, further research and development is required to strengthen and improve its security before it is utilised more widely in a commercial sense. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Petko Stefanov:&lt;br /&gt;
An analysis of security flaws in the NFC functionality of modern mobile devices &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Problem Statement&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Near Field Communication (NFC) is a relatively new communications protocol used in most modern mobile devices. It is used for very close range communication between devices or compatible NFC capable objects. One such object is a NFC tag, which can store instructions to be executed by any device that ``scans&amp;quot; it via NFC (e.g Go to a website, call a phone number or access an application). While convenient, such tags can be manipulated to store malicious instructions which can harm or compromise the device. The lack of security protocols on mobile devices make this form of malware infection very easy to execute. This project aims to introduce a solution to this problem by implementing a method in which a user may be able to stop their device from performing instructions transmitted by a malicious NFC tag, after it has been scanned. &lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Motivation and Significance&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
NFC is a tool that is being more and more widely used in mobile devices. However, the security flaws associated with it hinder is implementation. This project is important as it helps address these issues and possibly find a solution to them, thus providing a safer device to the user with the convenience and flexibility NFC allows for.&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Objectives&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
1.  Prepare an in-depth literature review covering security flaws in NFC tags, methods of attack and past attempts to provide solutions.&lt;br /&gt;
&lt;br /&gt;
2. Propose and design a solution. At this point in time, this is likely to be a system which takes into account prevention of scanning malicious NFC tags and limited protection once a tag is scanned.&lt;br /&gt;
&lt;br /&gt;
3. Analyse designed solution and identify strengths and weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is NFC? ==&lt;br /&gt;
NFC or Near Field Communications is a set of wireless communication protocols, mainly used in mobile devices. It is a derivation of RFID technology in the sense that it uses electromagnetic induction to power NFC compatible objects and transmit data to devices[1]. It transmits data at 13.56MHz and very short ranges (around 4-10cm)[4] and can transmit from device to device or via passive NFC objects (called tags) to device simply by placing the appropriate device or object within range of each other. Because of this short range, NFC uses very little power and does not require any pairing code[4]. Thus primary uses of NFC are for very quick transmissions of data from devices, normally for user convenience in replacing mundane actions.&lt;br /&gt;
&lt;br /&gt;
==NFC Tags==&lt;br /&gt;
Among the many functions of NFC, many utilise objects called NFC tags. NFC tags are passive objects that contain a computer chip which allows for interaction with NFC compatible devices. Their general purpose is simply to store instructions which (if compatible) are executed by the device that scans it via NFC. These instructions can be simple as ``call a phone number&amp;quot;, ``access a URL&amp;quot;, ``open an application&amp;quot;, or as complicated as ``open this electronic lock&amp;quot;, ``deduct payment from my funds&amp;quot;[5]. &lt;br /&gt;
&lt;br /&gt;
NFC tags contain no power source, thus are deemed ``passive&amp;quot;[5]. They are powered exclusively by electromagnetic induction from the scanning device and are automatically scanned when within range of an NFC enabled device. Specifically speaking, one only needs to place their phone within close proximity of a tag, and if compatible, whatever instructions it contains will be scanned executed without need of input. This convenience is a major driving point in the implementation of NFC in consumer electronics. &lt;br /&gt;
&lt;br /&gt;
However, it is important to note that of the major mobile brands, only Android devices have the capability of scanning NFC tags. Apple devices, while they do possess peer to peer capabilities for services such as apple pay, do NOT possess the ability to scan tags at will[6]. This is likely to do with the security issues that come associated with the ``convenience&amp;quot; of having tag instructions being executed automatically with no user interaction. Apple having a very user friendly and secure public image likely does not want to implement NFC in its full form due to these security issues. &lt;br /&gt;
&lt;br /&gt;
==Security Flaws==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Phishing attacks&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
This is the most commonly encountered attack type for NFC tags. The basic definition of such an attack is the NFC tag containing a URL link to a website that has the possibility of compromising the victim&amp;#039;s device. Such attacks are normally carried out by convincing the victim that they website they are accessing is legitimate and trustworthy [7]&lt;br /&gt;
&lt;br /&gt;
A defining aspect of a phishing attack is the victim willingly inputting sensitive information, believing the source to be a reputable and secure party [7]. Such attacks can easily be executed via NFC. Taking the smart poster example from stage 1, an attacker can mimic a smart poster but program the embedded tag for malicious purposes. For example the poster can advertise a promotion which is accessible via a social media website, which the embedded tag links to. However, unknown to the victim is that the linked social media website is counterfeit and the data they are inputting is being received by the hacker&amp;#039;s database[8]. In other words, the attacker has essentially created a website that ``looks&amp;quot; like the legitimate version and storing personal and sensitive information from the user, which can then be used by the hacker for nefarious purposes. After the victim has successfully entered their personal information (such as login credentials and/or name), they are then redirected to the legitimate website and thus unaware of what has transpired[8].&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Malware Infection&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Malware infection via NFC is done by using the wireless connection to instruct the phone to access an outside piece of software which infects the device.&lt;br /&gt;
&lt;br /&gt;
The end goal of such an attack is to infect a device with malware. However this normally can&amp;#039;t be done by directly sending software over via the NFC tag, as they contain too little memory to store large files. Thus, the most common form of malware infection via NFC is to store a link to a website on the tag. The website then downloads a piece of malware to the device via an internet connection, thus infecting it[8]. &lt;br /&gt;
	&lt;br /&gt;
But why? Malware is software designed to damage or disrupt a device. The type of malware depends on the intention of the hacker. In cases of infecting mobile devices, these are some common types of malware the hacker can employ:&lt;br /&gt;
&lt;br /&gt;
-Spyware: which records user activity on the phone. This gives sensitive information to the hacker such as login credentials, identity credentials or financial credentials [9]&lt;br /&gt;
&lt;br /&gt;
-Bots: which can give the hacker remote access to he device and the ability to control it [9]&lt;br /&gt;
&lt;br /&gt;
-Worm: which is the most commonly used type of malware. Worms can replicate themselves and then attempt to spread to other devices in the victim&amp;#039;s connected network [9]. It&amp;#039;s very possible that a worm infecting a mobile device via NFC is only using it as a mode of transportation until the phone connects to a home network to which the worm can spread to the victim&amp;#039;s personal computer. &lt;br /&gt;
&lt;br /&gt;
==Proposed Solution==&lt;br /&gt;
&lt;br /&gt;
Overall security design will have 2 components. A ``front end&amp;quot;, which prevents unwanted tags from being scanned in the first place at the user&amp;#039;s discretion, and a ``back end&amp;quot; that analyses a scanned tag&amp;#039;s contents and determines if it is harmful to the device, blocking it if so&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Front End&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The chosen design incorporates a combination of the Proximity Detector and Accelerometer methods. The reason for this is they both are non intrusive additions to the NFC protocol by only requiring the user to hold a device a certain distance or move it a certain way. As well as this, using both these methods covers a wide range of attack methods. The requirement for phone movement when scanning the tag provides an input which only the user can make when they wish to scan the tag, preventing most attacks. The proximity sensor then provides a nice backup requirement for when there is unwanted movement on the device (such as when it&amp;#039;s in the user&amp;#039;s pocket). Thus, the combination of both provides a secure front-end protection ensuring that if a tag is scanned, the user was the one who initiated it.&lt;br /&gt;
&lt;br /&gt;
[[File:FrontEnd.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Back End&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
When considering the above options as to how to organise the Back-End Security layer, the design can be divided into 3 possible sub-layers of protection:&lt;br /&gt;
&lt;br /&gt;
1. Browser Level&lt;br /&gt;
&lt;br /&gt;
2. File Level&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Browser Level&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The browser-level protection focusses on stopping a scanned tag from linking malicious URLs. In this design, browser protection is implemented much like Browser protection seen in most Desktop security suits: with a Blacklist of untrustworthy and malicious URLs. When a new tag is scanned, and its NDEF message is detected as a URL, the user device will scan through the blacklist to see if it matches a known malicious site. If so, then the execution of this instruction is halted and the user is presented a pop-up message which states ``This URL links to a harmful website. Do you still wish to proceed?&amp;quot;. The use now has a final choice in continuing on (ideally, then should press ``no&amp;quot;), if so the URL proceeds to open as normal. If the user pressed ``no&amp;quot; on the prompt then the execution of the tag&amp;#039;s instructions stops. It is important to note that this ``final warning&amp;quot; is a pop-up prompt. Whilst it was discussed that such messages detract from the convenience of NFC and are seen as an annoyance, in this case, where the device is CONFIRMED to be in real danger, such a warning is necessary. As well as this, such prompts will not occur often unless the user is seeking out malicious tags on purpose. &lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
Along with the blacklist, there will also be a whitelist to work in conjunction with it. What this does is allow for the possible detection of several different types of malicious URLs that were not found in the blacklist. So if the URL in question:&lt;br /&gt;
	&lt;br /&gt;
1. Links to a phishing website: The website in question will not be whitelisted, thus a message/icon is shown to the user, stating that this website is not secure/confirmed. If the phishing site in question is attempting to mimic a legitimate site that IS whitelisted, then the user will be able to know that the URL liked by the tag is fake.&lt;br /&gt;
		&lt;br /&gt;
2. Links to a site that downloads malware: In this case, the browser security cannot check if a piece of software is legitimate, thus if software is downloaded, then it is passed onto the File-Level sub-layer for a security scan. &lt;br /&gt;
&lt;br /&gt;
In either case the user has some form protection against the URL in question which is vastly more secure than the current form of the technology. It is also important to note that the lists themselves must be frequently updated to keep up with new sites being created, and come from a trustworthy source. For Android devices, it is in the best interests of the developer/manufacturer to ensure this list comes directly from them as they can have confidence in their device security, thus guarantee safety to the consumer.&lt;br /&gt;
&lt;br /&gt;
[[File:BackEndURL.png]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;File Level Protection&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The design on protecting the device at a File-Level will mimic the structure of a desktop Anti-Virus program in the sense that it shall use Signature, Heuristic and Behavioural detection methods. The combination of these 3 security checks on a file should be sufficient to detect malicious behaviour and successfully flag it as malware.&lt;br /&gt;
	&lt;br /&gt;
When a file is detected via NFC tag or NFC linked URL, the system shall first check a whitelist of file signatures to see if the file in question has been deemed ``safe to execute&amp;quot;. If the system finds a match in the list, then the file is immediately executed with no check. This list is initially created by the 1st party developer (e.g Google), but after which it will be added to by the security system as files are deemed ``safe&amp;quot; by the subsequent detection systems. The reason for this is to save processing power, particularly in the behaviour based detection which shall use sandboxing, which is computationally intensive. Thus, to avoid long wait times, the whitelist shall be used to allow previously scanned files to execute normally. &lt;br /&gt;
	&lt;br /&gt;
If a match is not found, then the file first undergoes Signature based detection. The signature based detection shall once again, utilise a blacklist of known malware to compare the tag&amp;#039;s contents&amp;#039; signature with. A file, whose signature matches a known malware shall be blocked and the user shall be notified with a pop-up notification. The user is then given an option to either delete the file (recommended), or proceed at their discretion, at which point the file is executed as normal. Like the whitelist, the blacklist shall also be developed initially by the 1st party developer, but as well as this, any detections in the later methods will add the detected file&amp;#039;s signature to the blacklist for quicker detection in the future. &lt;br /&gt;
	&lt;br /&gt;
If the file passes the signature based detection, it shall undergo heuristic based detection. If possible, the contents of the file in question are accessed and analysed. The code of the file in question is analysed by the system with the intention of locating common instructions associated with malicious behaviour. These actions can include (but are not limited to):&lt;br /&gt;
&lt;br /&gt;
-Excessive amounts of copying of the file to different locations on the device&lt;br /&gt;
&lt;br /&gt;
-A program that attempts to access, modify or replace core system files&lt;br /&gt;
&lt;br /&gt;
-A program that seeks to write to restricted device memory without permission&lt;br /&gt;
&lt;br /&gt;
-A program that remains in memory after execution&lt;br /&gt;
&lt;br /&gt;
-A program that remains dormant but behaves differently after a certain period of time&lt;br /&gt;
&lt;br /&gt;
-A program that creates a back door by monitoring wifi connections for a specific signal (I.e Malware awaiting remote instructions from an outside source via WiFi. Most common in bots)&lt;br /&gt;
&lt;br /&gt;
-A program whose code is noticeably similar to that of known Blacklisted malware&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the analysed program&amp;#039;s code exhibits any of these features, the program is flagged as malware and a pop-up notification is presented to the user where they can decide how to proceed. As well as this, the file&amp;#039;s signature is added to the blacklist for faster detection in the future.&lt;br /&gt;
	&lt;br /&gt;
Finally, if the file in question, passes the heuristic detection, it undergoes behaviour based detection. To test a program&amp;#039;s absolute behaviour, it must first be executed. Obviously, doing this on the device itself is counter-intuitive as the goal is to protect it from possible malware. So to counteract this, the ability for the system to create a sandbox environment to test the program shall be added. The methodology used for behaviour analysis is the approach of using machine learning to establish a model of how software interacts with the system. This allows the sandbox to safety predict and evaluate which interactions are safe and which are malicious as the program executes in real-time based off previous data obtained. This model will likely include interactions such as those described in the heuristic detection and categorise them as malicious. If the system determines the executing file as displaying malicious tenancies, it is flagged as malware and the same pop-up notification mentioned before is displayed. To ensure trust in the system, the model used should come from a trusted developer (e.g. Google directly) to ensure the data used in system predictions is trustworthy.&lt;br /&gt;
	&lt;br /&gt;
However, if after all these security checks, the file has not been flagged as malware, it is free to execute as normal. As well as this, the signature of the file is added to the whitelist, to allow for faster execution in the future. The primary reason for this is that behaviour monitoring methods (particularly the sandbox) are computationally intensive, thus take a noticeable amount of time to perform. To preserve the convenience of NFC, it is desirable to keep functions that slow down the use of the protocol to a minimum. Thus, whitelisting established ``safe&amp;quot; files avoids unnecessary repetition of the malware scanning processes.&lt;br /&gt;
&lt;br /&gt;
[[File:BackEndFile.png]]&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
The proposed design addressed the security flaws in NFC by implementing 2 security layers, which each addresses specific security flaws in the NFC protocol. The Front End layer adds more control to the user on when NFC is active on their device. This is done by putting in a distance and movement requirement on the device which the user must first perform, signifying their input in order for NFC to be active. This stops a wide variety of attacks that seek to forcible initiate a NFC scan without the user&amp;#039;s knowledge. The main downside to such an attack is using the user&amp;#039;s consent against them, by tricking them into scanning malicious tags.&lt;br /&gt;
	&lt;br /&gt;
This is addressed in the Back-End layer, which implements an automated system to check if the contents of the tag are malicious before executing, and stopping execution if so. This is implemented by first checking if the tag links to a URL or sends a file. In the case of a URL, the system employs blacklisting to determine if the site is confirmed malicious (blocking if so), and whitelisting to determine if it is trustworthy. In they case of a file being sent via NFC or downloaded via URL link, the Back-End layer employs an Anti-Virus architecture by utilising Signature based detection, Heuristic based Detection and Behavioural based detection via sandboxing to determine if the file is malware, and blocking it if so. This layer is successful in detecting a wide variety of malware, but does experience some difficulties. It can&amp;#039;t detect content beyond URLs/Files, prone to false positive detections depending on the precision of the behaviour detection model, and is susceptible to malware that can detect sandboxes and change it&amp;#039;s behaviour. However, such files are rare to encounter and can still be detected by the other 2 detection styles.&lt;br /&gt;
	&lt;br /&gt;
Overall, despite some weaknesses in that can be improved in future work, the design covers a wide variety of attacks and is vastly more secure than the existing state of NFC. &lt;br /&gt;
&lt;br /&gt;
==Future Work==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Implement Design&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
With a basic design outlined, the next step is to test its effectiveness by implementing it in a test environment. As tag scanning are primarily aimed at Android-based devices, the logical first step is implementing an Android app to implement the security layers. Google offers the Android Software Development kit for free use. This offers a software package to program apps and a testbed for emulating android device, or the ability to download and execute to a real device, thus testing it.&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Add Malicious Instruction Detection&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
As explained, a weakness in the Back-End layer is the inability to detect tag content outside of URLs and Files. NFC tags can send instructions to the mobile advice, opening the internet browser and executing the file are just one of many. An attacker can easily add an instruction to connect their device to the victim device via another form of wireless communication (e.g. Bluetooth), and exploit this to send malware. As such, an issue that must be addressed is researching methods of detecting these malicious instructions as a whole, instead of focussing on just the two most common ones&lt;br /&gt;
	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Detect Environment Aware Malware Behaviour&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Another weakness of the Back-End security layer was the file level sub-layer&amp;#039;s inability to detect malware with the capacity to recognise when it&amp;#039;s being executed within a sandbox, thus disguising its behaviour, avoiding detection. As of now, this type of malware is the biggest weakness the design has, and while it is possible to detect such files via Signature and Heuristic execution, there is still the possibility of avoiding detection. As such, adding another form of detection to the file level sub-layer specifically to detect this type of malware would be invaluable to the overall security of the system.  &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Olga Rodionova:&lt;br /&gt;
Medical Data Security in wearable fitness devices&lt;br /&gt;
&lt;br /&gt;
In the recent years, wearable fitness devices have been blurring the line between medical and personal Internet&lt;br /&gt;
of Things (IoT) devices. This project aims to explore security aspects of data storage on fitness devices by&lt;br /&gt;
building on existing research into smart band networks and data collection. The integration of wearable fitness&lt;br /&gt;
devices into the medical industry will be considered and possible avenues for obtaining unauthorised access to&lt;br /&gt;
private medical information will be outlined.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[1]	M. Mareli, S. Rimer, B. S. Paul, K. Ouahada, and A. Pitsillides, &amp;quot;Experimental evaluation of NFC reliability between an RFID tag and a smartphone,&amp;quot; in AFRICON, 2013, 2013, pp. 1-5.&lt;br /&gt;
&lt;br /&gt;
[2]	M. Roland, Security Issues in Mobile NFC Devices: Springer International Publishing, ISBN 978-3-319-15487-9, 2015.&lt;br /&gt;
&lt;br /&gt;
[3]	M. R. (2014, 2 April 2016). Taking “being connected” to the next level: Man implants NFC chip into his hand. Available: http://www.phonearena.com/news/Taking-being-connected-to-the-next-level-Man-implants-NFC-chip-into-his-hand_id62057&lt;br /&gt;
&lt;br /&gt;
[4] R. Triggs, ``What is NFC \&amp;amp; how does it work?&amp;quot;, Android Authority, 2013. [Online]. Available: http://www.androidauthority.com/what-is-nfc-270730/. [Accessed: 30- Mar- 2016].&lt;br /&gt;
&lt;br /&gt;
[5] R. Triggs, ``All you need to know about NFC Tags&amp;quot;, Android Authority, 2016. [Online]. Available: http://www.androidauthority.com/nfc-tags-explained-271872/. [Accessed: 30- Mar- 2016].&lt;br /&gt;
&lt;br /&gt;
[6] ``What Happens When iPhone NFC Opens Up ?&amp;quot;, Rapidnfc.com, 2016. [Online]. Available: http://rapidnfc.com/blog/121/what\_happens\_when\_iphone\_nfc\_opens\_up. [Accessed: 02- Apr- 2016].&lt;br /&gt;
&lt;br /&gt;
[7] R.  Dhamija, J.  Tygar and M.  Hearst, ``Why Phishing Works&amp;quot;, in SIGCHI Conference on Human Factors in Computing Systems, New York, 2006, pp. 581-590.&lt;br /&gt;
&lt;br /&gt;
[8] K. Gold, S. Shetty and T. Rogers, ``A testbed for modeling and detecting attacks on NFC enabled mobile devices&amp;quot;, in Military Communications Conference, MILCOM 2015, Tampa, FL, 2015, pp. 635 - 640.&lt;br /&gt;
&lt;br /&gt;
[9] N. Lord, ``Common Malware Types: Cybersecurity 101&amp;quot;, Veracode, 2012. [Online]. Available: https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101. [Accessed: 09- May- 2016].&lt;br /&gt;
&lt;br /&gt;
[10] Mike.m&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7239</id>
		<title>Projects:2016s1-132 RF Transceiver Design for a Portable Radar</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2016s1-132_RF_Transceiver_Design_for_a_Portable_Radar&amp;diff=7239"/>
		<updated>2016-10-26T09:16:44Z</updated>

		<summary type="html">&lt;p&gt;A1628585: /* Aim */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Brian Ng,&lt;br /&gt;
Dr Hong Gunn Chew&lt;br /&gt;
&lt;br /&gt;
== Students ==&lt;br /&gt;
Benjamin Arthur,&lt;br /&gt;
Nicholas Aspinall&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
This project aims to implement a portable Radar transceiver capable of measuring a target&amp;#039;s range and radial velocity. The transceiver shall be implemented into a PCB (Printed Circuit Board) containing RF and analogue subsystems and audio input/output to a computing system for processing and display. The system shall have a range resolution smaller than 2m and a range of approximately 100m for a target with a radar cross section of 1m squared.&lt;/div&gt;</summary>
		<author><name>A1628585</name></author>
		
	</entry>
</feed>