• Title/Summary/Keyword: Access and evaluation

Search Result 1,118, Processing Time 0.025 seconds

A General Method for Error Probability Computation of UWB Systems for Indoor Multiuser Communications

  • Durisi, Giuseppe;Tarable, Alberto;Romme, Jac;Benedetto, Sergio
    • Journal of Communications and Networks
    • /
    • 제5권4호
    • /
    • pp.354-364
    • /
    • 2003
  • A general method for the evaluation of the symbol error probability (SER) of ultra wideband (UWB) systems with various kind of modulation schemes (N-PAM, M-PPM, Bi-Orthogonal), in presence of multipath channel, multiuser and strong narrowband interference, is presented. This method is shown to be able to include all the principal multiaccess techniques proposed so far for UWB, time hopping (TH), direct sequence (DS) and optical orthogonal codes (OOC). A comparison between the performance of these multiple access and modulation techniques is given, for both ideal Rake receiver and minimum mean square error (MMSE) equalizer. It is shown that for all the analyzed multiple access schemes, a Rake receiver exhibits a high error floor in presence of narrowband interference (NBI) and that the value of the error floor is in-fluenced by the spectral characteristics of the spreading code. As expected, an MMSE receiver offers better performance, representing a promising candidate for UWB systems. When the multiuser interference is dominant, all multiple access techniques exhibit similar performance under high-load conditions. If the number of users is significantly lower than the spreading factor, then DS outperforms both TH and OOC. Finally 2PPM is shown to offer better performance than the other modulation schemes in presence of multiuser interference; increasing the spreading factor is proposed as a more effective strategy for SER reduction than the use of time diversity.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

Comprehensive Evaluation of Impacts of Connecting Distributed Generation to the Distribution Network

  • Jin, Wei;Shi, Xuemei;Ge, Fei;Zhang, Wei;Wu, Hongbin;Zhong, Chengyuan
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권2호
    • /
    • pp.621-631
    • /
    • 2017
  • In this paper, we study the various impacts of connecting distributed generation (DG) to the distribution network. The comprehensive evaluation index system (CEIS) of four hierarchies is established, considering economy, reliability and voltage quality, and the calculation methods of different indexes are presented. This paper puts forward an improved triangular fuzzy number analytic hierarchy process (ITFNAHP) to weight the second level indexes (SLI) and the third level indexes (TLI), and calculates the variation coefficient to weight the fourth level indexes (FLI). We calculate the comprehensive weight coefficients based on the weight coefficients of the SLI, TLI and FLI, and then calculate the comprehensive evaluation of satisfaction (CES) of different access schemes. On the basis of the IEEE 33-bus example system, simulations of the calculation methods and the comprehensive evaluation method are carried out under different DG access schemes according to the same total investment cost and the same permeability, respectively, and the simulation results are analyzed and discussed.

Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network

  • Xu, Fangcheng;Yu, Xiangbin;Xu, Weiye;Cai, Jiali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1174-1192
    • /
    • 2021
  • With the assistance of non-orthogonal multiple access (NOMA), the spectrum efficiency and the number of users in cloud radio access network (CRAN) can be greatly improved. In this paper, the system performance of NOMA-assisted CRAN is investigated. Specially, the outage probability (OP) and ergodic sum rate (ESR), are derived for performance evaluation of the system, respectively. Based on this, by minimizing the OP of the system, a suboptimal power allocation (PA) scheme with closed-form PA coefficients is proposed. Numerical simulations validate the accuracy of the theoretical results, where the derived OP has more accuracy than the existing one. Moreover, the developed PA scheme has superior performance over the conventional fixed PA scheme but has smaller performance loss than the optimal PA scheme using the exhaustive search method.

이중 모드 스윗칭 억세스 프로토콜을 이용한 고속 근거리 통신망의 성능평가 (Performance Evaluation of a High-Speed LAN using a Dual Mode Switching Access Protocol)

  • 주기호
    • 한국통신학회논문지
    • /
    • 제21권10호
    • /
    • pp.2620-2633
    • /
    • 1996
  • In this paper, a new high-speed local area network using a dual mode switching access (DMSA) protocol implemented on a dual unidirectional bus is described. By utilizing the implicit positionalordering of stations on a unidirectional bus, the proposed system switches between random access mode and the token access model withoug unnecessary delay. Therefore, unlike other hybrid systems such as Buzz-net and Z-net, DMSA does not show a rapid degradation in performance as the load increases. We obtain the average channel utilization and the average access delay by using a simplified analytic model. The numerical results obtained via analysis are compared to the simulation resuls for a partial validation of the approximate model. The performance characteristics of DMSA are superior delay-throughput characteristics at light and medium loads, compared to compared to other LAN systems, and the capability of providing a single active station with full capabity of the channel.

  • PDF

도시 비오톱의 자연체험 가치 평가모형의 개발과 적용 (Development and Application of an Evaluation Model for Urban Biotope Appraisal)

  • 나정화;류연수
    • 한국조경학회지
    • /
    • 제30권3호
    • /
    • pp.1-11
    • /
    • 2002
  • The purpose of this study is to construct an evaluation criteria based on the relative importance and various combinations of each evaluation index and then to appraise urban biotope in terms of nature experience and recreation. After the standard of evaluation had been developed through the review of existing literature, the relative importance of the evaluation index through expert survey was determined, and the evaluation model to assess biotope value was established. The results of this study are as follows; 1) We have constructed the seventeen evaluation criteria through literature reviews, and have provided relative importance to each evaluation index of the natural in biotope, the diversity of landscape patterns, the appearance-existence of water space, the special landscape elements, and the access based on the results of expert survey. and then we have constructed an evaluation system using the relative importance criteria. 2) To evaluate urban biotope using the evaluation system constructed, we selected 14 sites. The final evaluation results of each site is as follows; The first grade areas are the water space with semi-natural style in front of Gangchon Woobang apartments, the forest zone near Page Temple at Mt. Palgong, the edge area of Jisan and Gosan and the tendril yard against Anshim middle school. The second grade areas are Hyomyung elementary school, the farm land behind the third Anshim Jugong apartment, Ehyun put and the swampy land in front of the Kangchon and Anshim construction site. The third grade areas are Seohan and Hwasung high-rise apartments at Beummul-Dong, the Korea Manpower Agency in the Sungseo industrial zone, and the adjacent area of St. Tongil. The only fourth grade area is the commercial zone near Taegu Department Store. 3) It is highly useful to evaluate urban biotope using the evaluation criteria constructed for this research, the evaluation criteria we developed may be difficult to encompass all expert opinion and the period of space-formation is difficult to estimate urban biotopes. In the future, it is necessary to gather the basic data suitable to estimate biotope and it is necessary to develop detailed evaluation criteria applicable to estimate every biotope that has specific property.

AIS용 SOTDMA 알고리즘 성능평가 시스템 (A Performance Evaluation System of the SOTDMA Algorithm for AIS)

  • 김승범;임용곤;이상정
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2001년도 추계종합학술대회
    • /
    • pp.765-768
    • /
    • 2001
  • AIS(automatic identification system)는 충돌 방지를 위해 선박의 위치 정보를 전달하는 시스템으로, 핵심기법으로서 SOTDMA(seH-o.ganired time division multiple access)알고리즘을 구현해야 한다. 따라서 SOTDMA 알고리즘을 효과적으로 구현하기 위해서 성능 분석을 위한 평가 시스템의 개발이 필요하다. AIS용 SOTDMA 알고리즘 성능평가 시스템은 무선 통신 채널에 의한 선박들간의 통신 방식을 여러 선박 객체들이 공유 메모리에 독립적으로 접근하는 방식으로 모사 했다. 각각의 선박을 하나의 객체로 모사하고 무선 통신 채널을 공유메모리로 모사 했다. 여러 선박들의 보고주기와 메시지를 입력으로 주어 SOTDMA 알고리즘에 파라 각 선박들의 슬롯 할당이 이루어지며, 그 결과분석을 통해 성능분석이 가능하다. AIS용 SOTDMA 알고리즘 성능평가 시스템을 개발함으로써, AIS 개발에 사용할 프로토콜 구현시 시행 착오를 줄일 수 있으며 AIS 채널 접속 프로토콜의 충돌 횟수, Capacity와 Throughput을 예측할 수 있다.

  • PDF

Performance Characteristic of the β-Human Chorionic Gonadotropin Assay on the Access 2 for Its Use in Doping Control

  • Kang, Min-Jung;Lee, Hye-Im;Shin, Sang-Mi;Yoo, Hye-Hyun;Kwon, Oh-Seung;Jin, Chang-Bae;Chung, Bong-Chul
    • Bulletin of the Korean Chemical Society
    • /
    • 제31권10호
    • /
    • pp.2889-2892
    • /
    • 2010
  • The objective of this study was to validate performance characteristics of the Access 2 (Beckman coulter) system for hCG assays for use as a confirmation test for doping control. The Access 2 assay was linear up to 500 IU/L. The correlation coefficient was higher than 0.999, and the sensitivity of the linearity was 0.82. There were no false positive or false negative cases. LOD was 0.59 IU/L. The method was robust when performed by different people. Repeatability and reproducibility were below 7%. We compared reproducibility and recoveries of Access 2 and Elecsys 2010. Access 2 demonstrated higher reproducibility than Elecsys 2010. Recoveries (accuracy) of Access 2 were between 85 and 105%. Recoveries for Elecsys 2010 were between 91 and 104%.

Access Control for D2D Systems in 5G Wireless Networks

  • Kim, Seog-Gyu;Kim, Jae-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권1호
    • /
    • pp.103-110
    • /
    • 2021
  • 본 논문에서는 5G 무선 네트워크 D2D 시스템에서 수행될 수 있는 두 가지 액세스 제어 메커니즘들을 비교해 보고 효과적인 액세스 제어 기법을 제안한다. 현재 5G D2D 시스템에서는 액세스 제어 기법이 표준 규격에 제정 되어 있지 않고 있으나, 두 가지 액세스 제어 기법들이 가능하다. 하나의 방식으로는 UE-to-Network Relay 기반의 액세스 제어 기법이고, 다른 하나의 방식으로는 Remote UE 기반의 액세스 제어 기법이다. 전자의 경우는 UE-to-Network Relay가 액세스 제어 검사를 수행하는 것이며, 후자의 경우는 Remote UE가 액세스 제어 검사를 직접 수행하는 방식이다. 실험 평가 결과, 본 논문에서는 5G 무선 네트워크 D2D 시스템에서 효율적인 액세스 제어 방안으로써 Remote UE 기반의 액세스 제어 기법을 최종 제안한다. Remote UE 기반의 액세스 제어 기법은 UE-to-Network Relay 기반의 액세스 제어 기법이 비하여, 신호 오버헤드를 최소화하고, 서로 액세스 제어 기능들이 다른 경우 보다 효율적인 액세스 제어 검사를 수행할 수 있다.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • 한국멀티미디어학회논문지
    • /
    • 제20권5호
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.