• Title/Summary/Keyword: Primary Users

Search Result 651, Processing Time 0.03 seconds

Fast and Reliable Dynamic Common Channel Setup and Reconstruction Method for the Point-to-Point Communications in Military CR Networks (군용 인지 무선 네트워크 환경에서 점대점 통신을 위한 신속하고 신뢰성 있는 동적 공통 채널 설정 및 복원 방법)

  • Kim, Min-Gyu;Choi, Jae-Kark;Yoo, Sang-Jo;Jang, Young-Up;Jeong, Kilsoo;Lee, Kwang-Eog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1112-1128
    • /
    • 2012
  • In cognitive radio networks, secondary users are allowed to utilize the channels currently not occupied by primary users opportunistically. Secondary users can communicate with each other using the commonly available channels (common channels) which may change dynamically based on the activity of the primary users. Even though many studies have dealt with cognitive radio behaviors, the detailed procedures for common channel configuration have not been paid much attention. In this paper, the fast and reliable dynamic common channel setup and reconstruction method for the point-to-point communications in military cognitive radio networks is proposed. The detailed time parameters are considered for common channel setup and reconstruction, such as the packet exchange time, channel request waiting time, and rendezvous time. Through numerical analyses, the delay and throughput performance of the proposed method is derived and evaluated.

On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

  • Saad, Wasan Kadhim;Ismail, Mahamod;Nordin, Rosdiadee;El-Saleh, Ayman A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1754-1769
    • /
    • 2013
  • For the purpose of enhancing the spectrum efficiency, cognitive radio (CR) technology has been recently proposed as a promising dynamic spectrum allocation paradigm. In CR, spectrum sensing is the key capability of secondary users in a cognitive radio network that aims for reducing the probability of harmful interference with primary users. However, the individual CRs might not be able to carry out reliable detection of the presence of a primary radio due to the impact of channel fading or shadowing. This paper studies the cooperative spectrum sensing scheme as means of optimizing the sensing performance in AWGN and Rayleigh channels. Results generated from simulation provide evidence of the impact of channel condition on the complementary receiver operating characteristic (ROC). Based on the results, it was found that with constant local SNRs at the secondary users, the probability of missed detection ($P_m$) of cooperative spectrum sensing in a cognitive radio network, calculated using a closed form expression, can be significantly minimized. Thus, the paper illustrates that improvement of the detection performance of the CR network can be achieved by establishing a centralized cooperation among neighboring cognitive radio users. Finally, verification of the validity of the fusion schemes utilized for combining the individual CR decisions is provided.

A Development of the Service Evaluation Criteria for the Expressway Service Areas on the Side of Users (이용자측면의 고속도로 휴게소 서비스 평가지표 개발)

  • Won, Jaimu;Jin, Wonyoung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.5D
    • /
    • pp.421-427
    • /
    • 2012
  • This study develops the evaluation model which is for assessing on the side of users in expressway service areas, and researchers apply this study for monitoring expressway service areas by routes. The direction of development on Evaluation Criteria is all about on the side of necessity of rest area users, the reflection of current conditions, the construction of total evaluation criteria, and the examination of connecting study with current study. After that, this study examines previous evaluation criterias and researchers will select the primary provision of evaluation through FGI, and they derive the final evaluation criteria throughout the verification of suitability on Evaluation Criteria. Throughout AHP analysis which is a professional survey system of users, researchers dereive on the side of facilities, on the side of environments facilities, on the side of position, and on the side of services in order by the weightings. As you can see in this study, this study also considers quantitative and qualitative factors together, and it allows to evaluate conditions of rest areas. In addition, this study can be a primary study for suggesting the ways of improvements of rest areas by using Spider Map and for monitoring future study.

A Method of Efficient Conference Event Package Processing in Distributed Conference Environment (분산형 컨퍼런스 환경에서의 효율적인 컨퍼런스 이벤트 패키지 처리 방식)

  • Jang, Choon-Seo;Jo, Hyun-Gyu;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.199-205
    • /
    • 2008
  • The centralized conference model has advantage of conference management and control. however it's scalability has been limited as performance degrades largely with increasing number of conference users. So new distributed conference models which improve scalability of centralized conference model have been suggested recently. In the distributed conference model. as conference users exceed a predefined maximum number, a new conference server is added to the conference dynamically. In this paper, We have proposed a new method which increases efficiency of conference event package processing that primary conference server should charge in the distributed conference environment. The primary conference server exchanges informations with each secondary conference servers and conference users by using conference event package. And from the conference information database it selects SIP(Session Initiation Protocol) UA(User Agent) which will share notification to the conference users, and transfers lists to each conference servers. The conference servers make the selected UAs share processing of conference event package, so loads of SIP signal processing decrease, and improve scalability of distributed conference model. The performance of our proposed model is evaluated by experiments.

  • PDF

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Connectivity Analysis of Cognitive Radio Ad-hoc Networks with Shadow Fading

  • Dung, Le The;An, Beongku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3335-3356
    • /
    • 2015
  • In this paper, we analyze the connectivity of cognitive radio ad-hoc networks in a log-normal shadow fading environment. Considering secondary user and primary user's locations and primary user's active state are randomly distributed according to a homogeneous Poisson process and taking into account the spectrum sensing efficiency of secondary user, we derive mathematical models to investigate the connectivity of cognitive radio ad-hoc networks in three aspects and compare with the connectivity of ad-hoc networks. First, from the viewpoint of a secondary user, we study the communication probability of that secondary user. Second, we examine the possibility that two secondary users can establish a direct communication link between them. Finally, we extend to the case of finding the probability that two arbitrary secondary users can communicate via multi-hop path. We verify the correctness of our analytical approach by comparing with simulations. The numerical results show that in cognitive radio ad-hoc networks, high fading variance helps to remarkably improve connectivity behavior in the same condition of secondary user's density and primary user's average active rate. Furthermore, the impact of shadowing on wireless connection probability dominates that of primary user's average active rate. Finally, the spectrum sensing efficiency of secondary user significantly impacts the connectivity features. The analysis in this paper provides an efficient way for system designers to characterize and optimize the connectivity of cognitive radio ad-hoc networks in practical wireless environment.

Resource Allocation with Proportional Rate In Cognitive Wireless Network: An Immune Clonal Optimization Scheme

  • Chai, Zheng-Yi;Zhang, De-Xian;Zhu, Si-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1286-1302
    • /
    • 2012
  • In this paper, the resource allocation problem with proportional fairness rate in cognitive OFDM-based wireless network is studied. It aims to maximize the total system throughput subject to constraints that include total transmit power for secondary users, maximum tolerable interferences of primary users, bit error rate, and proportional fairness rate among secondary users. It is a nonlinear optimization problem, for which obtaining the optimal solution is known to be NP-hard. An efficient bio-inspired suboptimal algorithm called immune clonal optimization is proposed to solve the resource allocation problem in two steps. That is, subcarriers are firstly allocated to secondary users assuming equal power assignment and then the power allocation is performed with an improved immune clonal algorithm. Suitable immune operators such as matrix encoding and adaptive mutation are designed for resource allocation problem. Simulation results show that the proposed algorithm achieves near-optimal throughput and more satisfying proportional fairness rate among secondary users with lower computational complexity.

Users' Reactions to Rape News Shared on Social Media: An Analysis of Five Facebook Reaction Buttons

  • Al-Zaman, Md. Sayeed;Ahona, Tasnuva Alam
    • Asian Journal for Public Opinion Research
    • /
    • v.10 no.1
    • /
    • pp.51-73
    • /
    • 2022
  • This study investigated 3.50 million Facebook reactions collected from 9,429 Bangladeshi news items about rape shared on social media from 2016 to 2021. The primary aim of this study was to understand users' different reaction patterns based on the five major Facebook reactions (i.e., love, haha, wow, sad, and angry). Based on the theories of emotion, we quantitatively answer one research question: How do social media users react to rape with the five major Facebook reactions? The results suggest that users are more likely to express disdain toward rape and sympathy toward the victims using Facebook reactions by using the angry button, along with the sad button. In rape news, both reactions are consistent and maintain a strong positive correlation, meaning they increase and decrease together. Although many users tend to mock and laugh at rape incidents and the victims, trend lines suggest that such expressions may not be consistent with time. Despite contextual relevance, we presume that in socially and morally unacceptable events like rape and war, the valences of reactions alter to some extent: angry and sad usually become positive, while love, wow, and haha become negative. Some strengths and limitations of the study are discussed as well.

Quantifying Energy Consumption to the Level of Service Pressure in Water Distribution Network

  • Marlim, Malvin S.;Choi, Jeongwook;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.458-458
    • /
    • 2022
  • It is essential to reduce global carbon emissions, mainly from energy use. The water supply and distribution sector is a vital part of human society and is one of the primary energy consumers. The procurement and distribution of water require electricity to operate the pump to deliver water to users with sufficient pressure. As the water users are spatially distributed over a wide area, the energy required to deliver water to each user differs depending on the corresponding supplying element (reservoir, tank, pipe, pump, and valve). This difference in energy required for each user also comes with a difference in pressure availability which affects the level of service for individual users and the whole network. Typically, there is a disproportion where users close to the source experience excessively high pressure with low energy consumption. In contrast, remote users need more energy to get the minimum pressure. This study proposes the Energy Return Index (ERI) to quantify the pressure return from particular energy consumption to supply water to each node. The disproportionality can be quantified and identified in the network using the proposed ERI. The index can be applied to optimize the network elements such as pump operation and tank location/size to reach a balanced energy consumption with the appropriate level of service.

  • PDF

A Comparative Study of Printed versus Digital Index and Abstract Users' Behaviour Patterns (인쇄형 색인초록과 전자형 색인초록의 이용행태에 관한 비교연구)

  • Hoang Gum-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.169-187
    • /
    • 1998
  • The primary purpose of this study is to compare printed index and abstract user's behaviours with digital index and abstract user's behaviours, and to verify of structured characteristics of a printed index and abstract. The major findings are as follows: (1) When the research topic is not specified enough, users tend to rely on printed indexes and abstracts search, whereas they utilize digital form in order to do retrospective search in the stage of research when the topic is determined. (2) Printed index and abstract users are expecting small number of literatures in search, whereas digital index and abstract users are expecting large number of literatures to be found The former are more satisfied with the result of search than the latter. (3) Digital index and abstract users experience more search failure than printed Index and abstract users. When they fail to find wanted materials, both users turn to the other form of indexes and abstracts. (4) Printed index and abstract users shows significantly less knowledge on online searching than digital index and abstract users.

  • PDF