• Title/Summary/Keyword: 모의데이터

Search Result 1,576, Processing Time 0.03 seconds

Power Control Scheme for Effective Serving Cell Selection in Relay Environment of 3GPP LTE-Advanced System (3GPP LTE-Advanced 시스템의 Relay 환경에서 효율적인 Serving Cell 선택을 위한 Power Control 기법)

  • Min, Young-Il;Jang, Jun-Hee;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3A
    • /
    • pp.215-222
    • /
    • 2011
  • In this paper, we propose a power control scheme for effective serving cell selection in Relay environment of 3GPP (3rd Generation Partnership Project) LTE (Long Tenn Evolution)-Advanced system. A conventional serving cell selection scheme which does not use channel states of backhaul link has a problem that this scheme does not select serving cell supporting maximum throughput. Also, conventional proposed serving cell selection schemes that eNB or RN transmits channel states of backhaul link have problems that conventional schemes need to additional data transmission, serving cell selection process complexity is increased because UE considers channel states of backhaul link, and received signal is degraded because strong interference which is transmission signal from RN. Therefore, for solve these problems, we propose power control scheme that RN control transmission power according to received SINR (Signal to Interference plus Noise Ratio) of backhaul link. By extensive computer simulation, we verify that the power control Relay scheme is attractive and suitable for the Relay environment.

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

Approximation of π by financial historical data (금융시계열자료를 이용한 원주율값 π의 추정)

  • Jang, Dae-Heung;Uhm, TaeWoong;Yi, Seongbaek
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.4
    • /
    • pp.831-841
    • /
    • 2017
  • The irrational number ${\pi}$ is defined as the ratio of circumference of a circle to its radius and always becomes constant. This article does Monte Carlo approximation of its value using the famous Buffon's needle experiment and shows that its convergence is not always proportional to the sample size. We also do Monte Carlo simulations to see the convergence of the computed ${\pi}$ values from the random walk series with independent normal increment. Finally we apply the theoretical derivation to various financial time series data such as KOSPI, stock prices of Korean big firms, global stock indices and major foreign exchange rates. The historical data shows that log transformed data random walk process but most of their first lagged data don't follow a normal distribution. More importantly the computed value from the ratio of the regression coefficient ${\pi}$ tend to converge a constant, unfortunately not ${\pi}$. Using this result we could doubt on the efficient market hypothesis, and relate the degree of the hypothesis with the amount of deviation of the estimated ${\pi}$ values.

A Study on the Implementation of the Multi-Process Structured ISDN Terminal Adaptor for Sending the Ultra Sound Medical Images (다중처리 구조를 갖는 초음파 의료영상 전송용 ISDN(Integrated Services Digital Network) TA(Terminal Adaptor) 구현에 관한 연구)

  • 남상규;이영후
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.317-324
    • /
    • 1994
  • This paper proposed a new method in the implementation of ISDN (integrated services digital network) LAPD (link access procedure on the D-channel) and LAPB (link access procedure on the B-channel) protocols. The proposed method in this paper implement ISDW LAPD protocol through multi-tasking operating system and adopt a kernel part that is changed operating system to target board. The features of implemented system are (1) the para.llel processing of the events generated at each layer, as follows (2) the supporting necessary timers for the implementation of ISDW LAPD protocol from the kernel part by using software, (3) the recommanded SAP (Service Access Point) from CCITT was composed by using port function in the operating system. With the proposed method, the protocols of ISDH layerl, layer2 and layer3 (call control) were implemented by using the kernel part and related tests were carried out by connecting the ISDH terminal simulator to ISDN S-interface system using the ISDN LAPD protocol The results showed that ISDW S-interface terminals could be discriminated by TEI (Terminal Equipment Identifier) assignment in layer 2 (LAPD) and the message transmission of layer 3 was verified by establishing the multi-frame transmission and then through the path established by the LAPD protocol, a user data was tranfered and received on B-channel with LAPB protocol Thererfore, as new efficient ISDN S-interface environment was implemented in the thesis, it was verified that the implemented system can be utilized by connecting ISDW in the future to transfer a medical image data.

  • PDF

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.

Group-Based Frequency Hopping Scheme for Improving Multi-Net Performance of Link-16 Waveform with Limited Frequency Band (제한된 주파수 대역에서 Link-16 웨이브폼의 멀티넷 성능 향상을 위한 그룹 기반의 주파수 도약 방식)

  • Yu, Jepung;Lee, Kyuman;Baek, Hoki;Lim, Jaesung;Kim, Jongsung;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.110-121
    • /
    • 2016
  • Link-16 is a representative TDL operated by US air force and NATO and supports structure of Multi-net. Under Multi-net, military operation can be conducted effectively since terminal nodes in Link-16 hop over total frequency band simultaneously. As air traffic is rapidly increasing, new aeronautical system is introduced or existing system should be expanded to accommodate increasing air traffic and frequency band assigned for operating this system is scarce. It is scheduled to implement frequency remapping to solve frequency scarcity. With limited frequency band for operating Link-16, as frequency remapping is implemented, degradation of Multi-net performance can happen since multiple access interference in Link-16 is increasing so it is difficult to conduct multiple military operations. Thus, Group-based frequency hopping scheme is proposed to solve this problem. We verified the performance of the proposed scheme is improved.

A Cell Selection Technique Considering MIMO Precoding (MIMO 프리코딩을 고려한 셀 탐색 기법)

  • Kim, Han Seong;Hong, Tae Howan;Cho, Yong Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1076-1084
    • /
    • 2012
  • In the CS/CB(Coordinated Scheduling/Beamforming) scheme, the cell edge user throughput is increased by selecting MIMO (Multiple Input Multiple Output) precoders which can minimize the interferences from adjacent base stations (BSs). However, in current LTE(Long Term Evolution) systems, the serving cell is selected in the initialization stage by using the synchronization signals and cell specific reference signals transmitted by adjacent BSs with a single antenna. The selected BS in the initialization stage may not be the best one since the MIMO precoding gain has not been considered in the cell selection stage. In this paper, a new cell selection technique is proposed for LTE systems with MIMO precoder by taking into account the effect of the precoder in the initialization stage. The proposed technique enables a user equipment (UE) in the cell boundary to select the serving BS by using the information (channel rank, effective channel capacity, and effective SINR(Signal to Interference plus Noise Ratio)) acquired from cell specific reference signals of candidate BSs. It is verified by computer simulation that the proposed technique can increase the channel capacity significantly in the multi-cell environments, compared with the conventional CS/CB scheme.

An Efficient Routing Algorithm Considering Packet Collisions in Cognitive Radio Ad-hoc Network (CR Ad-hoc Network에서 패킷 충돌을 고려한 효율적인 경로탐색 알고리즘)

  • Kim, Jin-Su;Choi, Jun-Ho;Shin, Myeong-Jin;Lee, Ji-Seon;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.751-764
    • /
    • 2013
  • In cognitive radio ad-hoc networks, common control channel overload and packet collisions are occured due to indiscriminate broadcasting of control packets. So that the path reliability is reduced and control channel is easily saturated. In this paper, we propose a new routing algorithm considering the probability of appearance of primary user and channel status of neighbor nodes. When the source node needs to transmit a data packet to the destination, it performs route discovery process by exchanging control messages using a control channel in ADOV CR Ad-hoc networks. If any intermediate node doesn't have common data channel with previous node to transmit data, it doesn't rebroadcast control packet. And if it has common data channels with previous node, each node determines channel contribution factor with the number of common channels. Based on the channel contribution factor, each node performs different back-off broadcasting. In addition, each node controls control packet flooding by applying to proposed advanced mode using such as number of available channels and channel stability. With the proposed method, the number of control packets to find the data transmission path and the probability of collision among control packets can be decreased. While the path reliability can be increased. Through simulation, we show that our proposed algorithm reduces packet collisions in comparison with the traditional algorithm.

Performance Analysis of Routing Protocols for WLAN Mesh Networks (WLAN Mesh 망을 위한 라우팅 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.417-424
    • /
    • 2007
  • Mesh networks using WLAN technology have been paid attention as a key wireless access technology. However, many technical issues still exist for its successful deployment. One of those issues is the routing problem that addresses the path setup through a WLAN mesh network for the data exchanges between a station and a wired network. Since the characteristics of a WLAN mesh network can be very dynamic, the use of single routing protocol would not fit for all environments whether it is reactive or proactive. Therefore, it is required to develop an adaptive routing protocol that modifies itself according to the changes in the network parameters. As a logical first step for the development, an analytical model considering all the dynamic features of a WLAN mesh network is required to evaluate the performance of a reactive and a proactive routing scheme. In this paper, we propose an analytical model that makes us scrutinize the impact of the network and station parameters on the performance of each routing protocol. Our model includes the size of a mesh network, the density of stations, mobility of stations. and the duration of network topology change. We applied our model to the AODV that is a representative reactive routing protocol and DSDV that is a representative proactive routing protocol to analyze the tradeoff between AODV and DSDV in dynamic network environments. Our model is expected to help developing an adaptive routing protocol for a WLAN mesh network.

Development of the HEMP Generation, Propagation Analysis, and Optimal Shelter Design Tool (고 고도 전자기파(HEMP) 발생과 전파해석 및 방호실 최적 설계 Tool 개발)

  • Kim, Dong Il;Min, Gyeong Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2331-2338
    • /
    • 2014
  • The HEMP threat may have acquired new, and urgent, relevance as the proliferation of nuclear weapons and missile technology accelerates of the North Korea, for example, is assessed as already having developed few atomic weapons, and is on the verge of North Korea already has missiles capable of delivering a nuclear warhead against South Korea. ITU K.78, K81 and IEC recommended its counter-measuring for the industrial facilities with navigation and sailing facilities in order to obviate the all of processor equipped system malfunctions from the EMP/HEMP but its simulation must only be done by the computer simulation which had studied on the 1960-1990 years USA/AFWL papers. This result has a significant activities to the South Korea being under the North Korea threat because all of HEMP related products was strongly limited for export. The HEMP cord which was developed newly by the KTI including the HEMP generation & propagation analysis, optimal shelter design tool, essential EM energy attenuation in multi-layered various soils and rocks and HEMP filter design tool. Especially, the least square fitting method was adopted to analysis for the EM energy attenuation in the soils and rocks because it has a various characteristics based on the many times field test reports.