• Title/Summary/Keyword: Opportunistic

Search Result 713, Processing Time 0.02 seconds

Self-jamming based opportunistic relaying for a cooperative network (협력 네트워크를 위한 자가 전파방해 기반 기회적 중계 기법)

  • Kim, Jinsu;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.371-372
    • /
    • 2012
  • 본 논문은 협력 네트워크(cooperative network)에서 무선 채널의 보안성(security) 강화를 위한 자가 전파방해(self-jamming) 기반 기회적 중계(opportunistic relaying) 기법을 제안한다. 단일 송신 단말 (source)과 단일 수신 단말(destination)이 다중 중계 단말(relay)의 협력을 통해 송수신하는 이중 홉(dualhop) 네트워크에서 도청 단말(eavesdropper)에 의한 정보 절취를 최소화하기 위해 자가 전파방해 기법과 기회적 중계 기법을 결합한다. 이를 통해 무선 채널의 방송(broadcasting) 특성에 기인한 도청 용이성을 저하 시키고, 다중 중계 단말의 송신 전력을 최소화하여 협력 네트워크의 수명(lifetime)을 연장한다. 컴퓨터 모의실험 결과를 통해 제안된 기법이 다중 중계기가 있는 이중 홉 협력 네트워크에서 보안 전송률(secrecy rate)의 불능확률(outage probability) 성능을 제고함을 보인다.

  • PDF

Outage Probability and Throughput Analysis of Hybrid-ARQ Based Opportunistic Relaying with Outdated CSI (지연된 채널 정보를 가진 하이브리드 ARQ 기반 기회적 중계 기법의 불능 확률 및 처리율 분석)

  • Park, Jinhyun;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.125-128
    • /
    • 2011
  • 기회적 중계 기술(opportunistic relaying)은 중계기를 사용하여 다이버시티 이득을 얻을 수 있는 효율적인 기술로 평가되고 있다. 기회적 중계 기술에서는 가장 좋은 중계기를 선택하여 송신기의 전송 신호를 재전송하게 되는데, 중계기 선택은 채널 정보(channel state information)를 이용하여 이루어진다. 본 논문에서는 하이브리드 ARQ 기반 기회적 중계 기술에서 중계기를 선택할 때 사용하는 채널 정보(channel state information)가 지연된 정보일 때, 시스템의 불능 확률(outage probability) 및 처리량(throughput)을 분석한다. 컴퓨터 시뮬레이션을 통해 분석이 정확한지 검증한다.

  • PDF

A Dynamic QoS Model for improving the throughput of Wideband Spectrum Sharing in Cognitive Radio Networks

  • Manivannan, K.;Ravichandran, C.G.;Durai, B. Sakthi Karthi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3731-3750
    • /
    • 2014
  • This paper considers a wideband cognitive radio network (WCRN) which can simultaneously sense multiple narrowband channels and thus aggregate the detected available channels for transmission and studies the ergodic throughput of the WCRN that operated under: the wideband sensing-based spectrum sharing (WSSS) scheme and the wideband opportunistic spectrum access (WOSA) scheme. In our analysis, besides the average interference power constraint at PU, the average transmit power constraint of SU is also considered for the two schemes and a novel cognitive radio sensing frame that allows data transmission and spectrum sensing at the same time is utilized, and then the maximization throughput problem is solved by developing a gradient projection method. Finally, numerical simulations are presented to verify the performance of the two proposed schemes.

Safety Investigation of Tap Water and Biofilm by Isolated Bacteria (수돗물과 생물막의 세균분포를 통한 안전성 조사)

  • Lee, Dong-Geun
    • Journal of Environmental Health Sciences
    • /
    • v.30 no.3
    • /
    • pp.207-213
    • /
    • 2004
  • For investigation of the food safety and influence of biofilm on the bacterial quality of tap water, it was detected by selective media, and identified by API kit and MIDI system. Biofilm and effluent showed much more colonies than influent. Although there were many presumptive positive colonies, no pathogenic bacterium detected. However opportunistic pathogens, such as Pseudomonas aeruginosa and Aeromonas species, and members of family Enterobacteriaceae were detected. Compared to influent, biofilm and effluent showed more diverse bacteria. This study implies that there would be the negative influence of biofilm on the bacterial qualities of tap water.

Dual-Hop Amplify-and-Forward Multi-Relay Maximum Ratio Transmission

  • Erdogan, Eylem;Gucluoglu, Tansal
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.19-26
    • /
    • 2016
  • In this paper, the performance of dual-hop multi-relay maximum ratio transmission (MRT) over Rayleigh flat fading channels is studied with both conventional (all relays participate the transmission) and opportunistic (best relay is selected to maximize the received signal-to-noise ratio (SNR)) relaying. Performance analysis starts with the derivation of the probability density function, cumulative distribution function and moment generating function of the SNR. Then, both approximate and asymptotic expressions of symbol error rate (SER) and outage probability are derived for arbitrary numbers of antennas and relays. With the help of asymptotic SER and outage probability, diversity and array gains are obtained. In addition, impact of imperfect channel estimations is investigated and optimum power allocation factors for source and relay are calculated. Our analytical findings are validated by numerical examples which indicate that multi-relay MRT can be a low complexity and reliable option in cooperative networks.

On Performance Analysis of Position Based Routing Algorithms in Wireless Networks

  • Xuyen, Tran Thi;Kong, Hyung-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.538-546
    • /
    • 2010
  • This paper presents an overview of position-based routing algorithms. We analyze performances of routing algorithms such as Hybrid Opportunistic Forwarding (HOF), Opportunistic multi-hop routing (ExOR), Location based Geocasting and Forwarding (LGF), and Greedy Forwarding in nearest with forward Progress (GFP) routing algorithms to find the best one in terms of packet error rate and throughput efficiency over effects of fading and noise variance in wireless networks. The analyses in closed form expressions are confirmed by the simulation results, which fully agree to analysis results. Additionally, the simulation results indicate significant differences among algorithms when varying the average SNR or the number of relays.

An Analysis of Aircraft Lessor Business Model Based on Financing Structure (항공기 리스사 자금조달 구조에 따른 사업모델 분석)

  • Jie Yong Park;Woon-Kyung Song
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.4
    • /
    • pp.28-44
    • /
    • 2023
  • This study investigates aircraft lessor business models by studying cases and interviewing experts to analyze investors and business strategies of aircraft lessor. The results confirm that there is a wide range of investors including institutional investors, financial institutions, insurance companies, corporations, and wealthy individuals for aircraft lessor. Aircraft lessors can be categorized based on its required rate of return (cost of capital) into bank-investing core, institutional investor-investing value-added, and hedge fund-investing opportunistic. Aircraft lessor decides leasing rate by aircraft purchasing price and lessee's credit rating. Core aircraft lessors invest in new aircrafts for new placement or sale-and-leaseback strategy requiring little technical risk in aircraft, value-added lessors invest in middle-aged aircrafts for re-leasing, opportunistic lessors invest in old aircrafts for freighter conversion or part-out strategy requiring high level of expertise. This study provides insights for future Korean aircraft lessor establishment and investment.

Effect of the Black-Hole Attack in Vehicular Ad-Hoc Networks

  • Mohamed Anis Mastouri;Salem Hasnaoui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.139-144
    • /
    • 2024
  • VANETs have become one of the most attractive research areas in the world of wireless networks in recent years. Indeed, vehicular networks have become capable of optimizing road traffic, which significantly reduces the number of accidents through notifications exchanged between nearby vehicles. The routing function based on the opportunistic algorithm is a critical part of the vehicle's communication system and will therefore be an ideal target for attacks that could aim to prevent alert messages from reaching their destination, and thus endanger human lives. The black hole attack is a major threat to the security of VANETs. The main idea of this paper focuses on the analysis of this type of attack in VANETs using Discrete-Time Markov Chains (DTMC). and deduce at the end the effect of the number of malicious nodes on the delivery rate in the network.

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

Cancer Detection Rates in a Population-Based, Opportunistic Screening Model, New Delhi, India

  • Shridhar, Krithiga;Dey, Subhojit;Bhan, Chandra Mohan;Bumb, Dipika;Govil, Jyostna;Dhillon, Preet K
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.5
    • /
    • pp.1953-1958
    • /
    • 2015
  • Background: In India, cancer accounts for 7.3% of DALY's, 14.3% of mortality with an age-standardized incident rate of 92.4/100,000 in men and 97.4/100,000 in women and yet there are no nationwide screening programs. Materials and Methods: We calculated age-standardized and age-truncated (30-69 years) detection rates for men and women who attended the Indian Cancer Society detection centre, New Delhi from 2011-12. All participants were registered with socio-demographic, medical, family and risk factors history questionnaires, administered clinical examinations to screen for breast, oral, gynecological and other cancers through a comprehensive physical examination and complete blood count. Patients with an abnormal clinical exam or blood result were referred to collaborating institutes for further investigations and follow-up. Results: A total of n=3503 were screened during 2011-12 (47.8% men, 51.6% women and 0.6% children <15 years) with a mean age of 47.8 yrs (${\pm}15.1yrs$); 80.5% were aged 30-69 years and 77.1% had at least a secondary education. Tobacco use was reported by 15.8%, alcohol consumption by 11.9% and family history of cancer by 9.9% of participants. Follow-up of suspicious cases yielded 45 incident cancers (51.1% in men, 48.9% in women), consisting of 55.5% head and neck (72.0% oral), 28.9% breast, 6.7% gynecological and 8.9% other cancer sites. The age-standardized detection rate for all cancer sites was 340.8/100,000 men and 329.8/100,000 women. Conclusions: Cancer screening centres are an effective means of attracting high-risk persons in low-resource settings. Opportunistic screening is one feasible pathway to address the rising cancer burden in urban India through early detection.