• Title/Summary/Keyword: Multi-users

Search Result 1,454, Processing Time 0.022 seconds

A Multi-Channel MAC Protocol for Cognitive Radio

  • Gao, Xiang;Zhu, Wen-Min;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.728-729
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel utilization information and selecting appropriate spectrum hole for multi-channel data transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access.

  • PDF

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Multi-Channel Allocation Scheme for Multi-Hop Transmission in Ad-hoc Cognitive Radio Networks (애드혹 인지 무선네트워크에서 멀티 홉 전송을 위한 멀티채널할당기법)

  • Kwon, Young-Min;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.35-41
    • /
    • 2017
  • To solve the shortage of radio spectrum and utilize spectrum resource more efficiently, cognitive radio technologies are proposed, and many studies on cognitive radio have been conducted. Multi-hop routing is one of the important technologies to enable the nodes to transmit data further with lower power in ad-hoc cognitive radio networks. In a multi-channel cognitive radio networks, each channel should be allocated to minimize interference to primary users. In the multi-hop routing, channel allocation should consider the inter-channel interference to maximize network throughput. In this paper, we propose multi-channel scheduling scheme which minimizes inter-channel interferences and avoids collision with primary users for the multi-hop multi-channel cognitive radio networks. The proposed scheduling is designed to determine both of routing path and channel selection. The performance of proposed channel allocation scheme is evaluated by the computer simulation in the aspect of capacity and collision rate.

Optimization of Multi-reservoir Operation considering Water Demand Uncertainty in the Han River Basin (수요의 불확실성을 고려한 한강수계 댐 연계 운영 최적화)

  • Chung, Gun-Hui;Ryu, Gwan-Hyeong;Kim, Joong-Hoon
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.1
    • /
    • pp.89-102
    • /
    • 2010
  • Future uncertainty on water demand caused by future climate condition and water consumption leads a difficulty to determine the reservoir operation rule for supplying sufficient water to users. It is, thus, important to operate reservoirs not only for distributing enough water to users using the limited water resources but also for preventing floods and drought under the unknown future condition. In this study, the reservoir storage is determined in the first stage when future condition is unknown, and then, water distribution to users and river stream is optimized using the available water resources from the first stage decision using 2-stage stochastic linear programming (2-SLP). The objective function is to minimize the difference between target and actual water storage in reservoirs and the water shortage in users and river stream. Hedging rule defined by a precaution against severe drought by restricting outflow when reservoir storage decreases below a target, is also applied in the reservoir operation rule for improving the model applicability to the real system. The developed model is applied in a system with five reservoirs in the Han River basin, Korea to optimize the multi-reservoir system under various future water demand scenarios. Three multi-purposed dams - Chungju, Hoengseong, and Soyanggang - are considered in the model. Gwangdong and Hwacheon dams are also considered in the system due to the large capacity of the reservoirs, but they are primarily for water supply and power generation, respectively. As a result, the water demand of users and river stream are satisfied in most cases. The reservoirs are operated successfully to store enough water during the wet season for preparing the coming drought and also for reducing downstream flood risk. The developed model can provide an effective guideline of multi-reservoir operation rules in the basin.

Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users (SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.199-223
    • /
    • 2016
  • As social networking services (SNS) become widely used tools for maintaining social relationships, people use SNS to express themselves online. Users are free to form multiple characters in SNS because of online anonymity. This phenomenon causes SNS users to easily demonstrate multiple personas that are different from their identities in the real world. Therefore, this study focuses on online multi-personas that establish multiple fake identities in the SNS environment. The main objective of this study is to investigate factors that affect online multi-personas. Fake online identities can have various negative consequences such as cyber bullying, cyber vandalism, or antisocial behavior. Since the boundary between the online and offline worlds is fading fast, these negative aspects of online behavior may influence offline behaviors as well. This study focuses on teenagers who often create multi-personas online. According to previous studies, personal identities are usually established during a person's youth. Based on data on 664 teenage users, this study identifies four emotional factors, namely, closeness with others, relative deprivation, peer pressure and social norms. According to data analysis results, three factors (except closeness with others) have positive correlations with users' multi-personas. This study contributes to the literature by identifying the factors that cause young people to form online multi-personas, an issue that has not been fully discussed in previous studies. From a practical perspective, this study provides a basis for a safe online environment by explaining the reasons for creating fake SNS identities.

User Selection Method of Subspace Interference Alignment in Multi-cell Uplink Systems (다중 셀 상향링크에서 부분공간 간섭 정렬의 사용자 선택 방법)

  • Seo, Jong-Pil;Kim, Hyun-Soo;Ahn, Jae-Jin;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.238-244
    • /
    • 2010
  • We propose a user selection method in multi-cell multiuser uplink system with the subspace interference alignment to maintain the high sum-rate capacity. The proposed method selects users whose interference to adjacent cells are strong and apply the subspace interference alignment to the users. The proposed method provides that the number of users performing the interference alignment reduces and the high total sum-rate is maintained. Simulation results exhibit the proposed method reduces the number of users who would decompose the channel for the subspace interference alignment by 50% when the required sum-rate is 90% of the maximal achievable sum-rate.

Joint Transmitter and Receiver Design Based on SPPLNR for Multi-user MIMO Channel with Channel Estimation Error (채널 추정 오차가 있는 다중사용자 다중안테나 채널에서 신호 대 포스트-프로세싱 리키지 및 잡음비 기반 송신기와 수신기 결합 설계)

  • Seo, Dong-Joon;Lee, Pan-Hyung;Lee, Jae-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.53-59
    • /
    • 2009
  • In multi-user MIMO systems, a base station transmits multiple data to multi-user simultaneously in order to improve performance and bandwidth efficiency. When the base station transmits multiple data to multi-user simultaneously, multi-user interference occurs severely. In this paper, we define a post-processing leakage as the total power leaked from desired user to all other users after combining at the output of each user. Using concept of the post-processing leakage, we also define a performance metric, the so called signal-to-post-processing-leakage-plus-noise ratio (SPPLNR). Assuming that the receiver is the minimum mean square error (MMSE) receiver, we propose an iterative SPPLNR-based beamforming that determines beamforming vectors and combining vectors by using an iterative method. The proposed scheme does not impose a condition on the relation between the number of transmit antennas for the base station and the number of receive antennas for users. Simulation results show that the proposed scheme outperforms a beamforming scheme perfectly eliminating the multi-user interference when channel estimation error exists.

A MU-MIMO User Scheduling Mechanism based on Active CSI Exchange (능동적 CSI 교환을 기반으로 한 MU-MIMO 유저 스케줄링 기법)

  • Lee, Kyu-Haeng;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.192-201
    • /
    • 2014
  • User scheduling boosts the Multi-User Multi-Input Multi-Output (MU-MIMO) gain by selecting an optimal set of users to increase the 802.11 Wi-Fi system capacities. Many kinds of user scheduling algorithms, however, fail to realize the advantages of MU-MIMO due to formidable Channel State Information (CSI) overhead. In this paper, we propose a user scheduling method considering such CSI exchange overhead and its MAC protocol, called ACE (Active CSI Exchange based User Scheduling for MU-MIMO Transmission). Unlike most proposals, where user scheduling is performed after an Access Point (AP) receives CSI from all users, ACE determines the best user set during the CSI exchange phase. In particular, the AP broadcasts a channel hint about previously scheduled users, and the remaining users actively send CSI reports according to their Effective Channel Gains (ECGs) calculated from the hint. Through trace-driven MATLAB simulations, we prove that the proposed scheme improves the throughput gain significantly.

Study on composite images through Augmented Reality over old images tagged location data (위치 정보가 기록된 과거 이미지와 현재 이미지 간 증강현실 기술 기반 합성 결과물 의미 고찰)

  • Park, Hyung-Woong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.221-229
    • /
    • 2014
  • The study considers the meaning of the composite images created when users capture present images over past images tagged location data in using the mobile augmented reality technology. The composite image through the location-based augmented reality technology is the result of matching the same location data between present images users are capturing and past images captured already. It is the new composite images that contain two different narratives-current and past in the same space and in real-time. We developed the mobile application implemented augmented reality technology and analysed the process that users create multi-layered narrative in the middle of capturing present image through augmented reality module. In addition, through the comparison with similar studies and applications of the augmented reality, we found that the key to give the multi-narrative in the composite images is the user's participation to put its personal intentions in real-time capturing process. In further development, we'll be able to utilize the application in order that users easily create multi-layered narrative composite image using cultural and personal records.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.