• Title/Summary/Keyword: Multiple scenarios

Search Result 394, Processing Time 0.02 seconds

Efficient detectors for MIMO-OFDM systems under spatial correlation antenna arrays

  • Guerra, David William Marques;Fukuda, Rafael Masashi;Kobayashi, Ricardo Tadashi;Abrao, Taufik
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.570-581
    • /
    • 2018
  • This work analyzes the performance of implementable detectors for the multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) technique under specific and realistic operation system conditions, including antenna correlation and array configuration. A time-domain channel model was used to evaluate the system performance under realistic communication channel and system scenarios, including different channel correlation, modulation order, and antenna array configurations. Several MIMO-OFDM detectors were analyzed for the purpose of achieving high performance combined with high capacity systems and manageable computational complexity. Numerical Monte Carlo simulations demonstrate the channel selectivity effect, while the impact of the number of antennas, adoption of linear against heuristic-based detection schemes, and the spatial correlation effect under linear and planar antenna arrays are analyzed in the MIMO-OFDM context.

Implementation of Fire Risk Estimation System for various Fire Situations using Multiple Sensors (다중 센서들을 이용한 다양한 화재 상황의 위험도 추정 시스템 개발)

  • Lee, Kwangjae;Lee, Youn-Sung
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.394-398
    • /
    • 2016
  • In this paper, a fire detection system based on quantitative risk estimation is presented. Multiple sensors are used to build a comprehensive indicator that represents the risk of fire quantitatively. The proposed fire risk estimation method consists of two stages which determines the occurrence of fire and estimates the toxicity of the surveillance area. In the first stage, fire is reliably detected under diverse fire scenarios. The risk of fire is estimated in the second stage. Applying Purser's Fractional Effective Dose (FED) model which quantitates harmfulness of toxic gases, the risk of the surveillance area and evacuation time are calculated. A fire experiment conducted using four different types of combustion materials for the verification of the system resulted in a maximum error rate of 12.5%. By using FED calculation and risk estimation methods, the proposed system can detect various signs of fire faster than conventional systems.

Mining Highly Reliable Dense Subgraphs from Uncertain Graphs

  • LU, Yihong;HUANG, Ruizhi;HUANG, Decai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2986-2999
    • /
    • 2019
  • The uncertainties of the uncertain graph make the traditional definition and algorithms on mining dense graph for certain graph not applicable. The subgraph obtained by maximizing expected density from an uncertain graph always has many low edge-probability data, which makes it low reliable and low expected edge density. Based on the concept of ${\beta}$-subgraph, to overcome the low reliability of the densest subgraph, the concept of optimal ${\beta}$-subgraph is proposed. An efficient greedy algorithm is also developed to find the optimal ${\beta}$-subgraph. Simulation experiments of multiple sets of datasets show that the average edge-possibility of optimal ${\beta}$-subgraph is improved by nearly 40%, and the expected edge density reaches 0.9 on average. The parameter ${\beta}$ is scalable and applicable to multiple scenarios.

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels

  • Huang, Boyang;Kong, Zhengmin;Fang, Yanjun;Jin, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1904-1921
    • /
    • 2019
  • In this paper, we investigate the problem of secure communications in multiple-input-multiple-output interference networks from the perspective of physical layer security. Specifically, the legitimate transmitter-receiver pairs are divided into different categories of active and inactive. To enhance the security performances of active pairs, inactive pairs serve as cooperative jammers and broadcast artificial noises to interfere with the eavesdropper. Besides, active pairs improve their own security by using joint transceivers. The encoding of active pairs and inactive pairs are designed by maximizing the difference of mean-squared errors between active pairs and the eavesdropper. In detail, the transmit precoder matrices of active pairs and inactive pairs are solved according to game theory and linear programming respectively. Experimental results show that the proposed algorithm has fast convergence speed, and the security performances in different scenarios are effectively improved.

Performance Evaluation of Tree Routing in Large-Scale Wireless Sensor Networks (대규모 센서네트워크에서의 트리라우팅 성능평가)

  • Beom-Kyu Suh;Ki-Il Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.2
    • /
    • pp.67-73
    • /
    • 2023
  • Tree routing is one of appropriate routing schemes in wireless sensor network because the complexity of this approach is relatively low. But, congestion at a specific node may happen because a parent node toward a sink node is usually selected in one hop way, specially where large number of node are deployed. As feasible solution for this problem, multiple paths and sinks schemes can be applied. However, the performance of these schemes are not proved and analyzed yet. In this paper, we conduct diverse simulaton scenarios performance evaluation for these cases to identify the improvement and analyze the impact of schemes. The performance is measured in the aspects of packet transmission rate, throughput, and end-to-end delay as a function of amount of network traffic.

Development of Walk-down Performance Procedures for Fire Modeling of Nuclear Power Plants based on Deterministic Fire Protection Requirements (결정론적 화재방호요건을 기반으로 한 원자력발전소 화재모델링 현장실사 수행절차 개발)

  • Moon, Jongseol;Lee, Jaiho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.43-52
    • /
    • 2019
  • A walk-down procedure for fire modeling of nuclear power plants, based on deterministic fire protection requirements, was developed. The walk-down procedure includes checking the locations of safety shutdown equipment and cables that are not correctly indicated on drawings and identifying the existence and location of combustibles and ignition sources. In order to verify the performance of the walk-down procedure developed in this study, a sample of important equipment and cables were selected for hypothetical multiple spurious operation (MSO) scenarios. In addition, the hypothetical fire modeling scenarios were derived from the selected safe shutdown equipment and cables and an actual walk-down was conducted. The plant information collected through the walk-down was compared to the information obtained from the drawings, so that the collected information may be used as input values for the fire modeling.

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

A Study on the Behaviour of Smoke Spread Caused by Vehicle Fire in a Road Tunnel (터널 내 차량 화재에 따른 연기 확산 거동에 관한 연구)

  • Yoon, Yong-Kyun;Ju, Eun-Hye
    • Tunnel and Underground Space
    • /
    • v.22 no.5
    • /
    • pp.365-372
    • /
    • 2012
  • This paper aims to evaluate the effects that presence, installation number and capacity of ventilation vent and presence of multiple fire sources have on the behaviour of smoke temperature induced by vehicle fire in road tunnel. Six types of scenarios were assumed and FDS was ran to simulate them. As the number of ventilation vents increases, the smoke temperature are calculated to be reduced, but it is shown that effects exerted by two ventilation vents are almost similar to ones by three ventilation vents. Capacity of ventilation vent has a greater impact on the reduction of smoke temperature than installation number of ventilation vents. Smoke temperatures computed for all scenarios except for scenario No. 1 (without ventilation vent) and scenario No. 6 (with multiple fire sources) above fire source are analyzed to be under $400^{\circ}C$ and it means that the radiation of smoke layer above fire source doesn't induce the ignition of materials around fire source.

Robust optimum design of MTMD for control of footbridges subjected to human-induced vibrations via the CIOA

  • Leticia Fleck Fadel Miguel;Otavio Augusto Peter de Souza
    • Structural Engineering and Mechanics
    • /
    • v.86 no.5
    • /
    • pp.647-661
    • /
    • 2023
  • It is recognized that the installation of energy dissipation devices, such as the tuned mass damper (TMD), decreases the dynamic response of structures, however, the best parameters of each device persist hard to determine. Unlike many works that perform only a deterministic optimization, this work proposes a complete methodology to minimize the dynamic response of footbridges by optimizing the parameters of multiple tuned mass dampers (MTMD) taking into account uncertainties present in the parameters of the structure and also of the human excitation. For application purposes, a steel footbridge, based on a real structure, is studied. Three different scenarios for the MTMD are simulated. The proposed robust optimization problem is solved via the Circle-Inspired Optimization Algorithm (CIOA), a novel and efficient metaheuristic algorithm recently developed by the authors. The objective function is to minimize the mean maximum vertical displacement of the footbridge, whereas the design variables are the stiffness and damping constants of the MTMD. The results showed the excellent capacity of the proposed methodology, reducing the mean maximum vertical displacement by more than 36% and in a computational time about 9% less than using a classical genetic algorithm. The results obtained by the proposed methodology are also compared with results obtained through traditional TMD design methods, showing again the best performance of the proposed optimization method. Finally, an analysis of the maximum vertical acceleration showed a reduction of more than 91% for the three scenarios, leading the footbridge to acceleration values below the recommended comfort limits. Hence, the proposed methodology could be employed to optimize MTMD, improving the design of footbridges.

Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies

  • Bassily, Raef;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.352-363
    • /
    • 2012
  • In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decodeand-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is to give an efficient cooperation paradigm based on the DF scheme to provide and improve secrecy in a multiple relay network. We first study the DF strategy for secrecy in a single relay network. We propose a suboptimal DF with zero forcing (DF/ZF) strategy for which we obtain the optimal power control policy. Next, we consider the multiple relay problem. We propose three different strategies based on DF/ZF and obtain their achievable secrecy rates. The first strategy is a single hop strategy whereas the other two strategies are multiple hop strategies. In the first strategy, we show that it is possible to eliminate all the relays' signals from the eavesdropper's observation (full ZF), however, the achievable secrecy rate is limited by the worst source-relay channel. Our second strategy overcomes the drawback of the first strategy, however, with the disadvantage of enabling partial ZF only. Our third strategy provides a reasonable compromise between the first two strategies. That is, in this strategy, full ZF is possible and the rate achieved does not suffer from the drawback of the first strategy. We conclude our study by a set of numerical results to illustrate the performance of each of the proposed strategies in terms of the achievable rates in different practical scenarios.