• Title/Summary/Keyword: Transmission probability

Search Result 688, Processing Time 0.029 seconds

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

A Critique of Designing Resource Adequacy Markets to Meet Loss of Load Probability Criterion

  • Yoon, Yong T.;Felder, Frank A.
    • KIEE International Transactions on Power Engineering
    • /
    • v.3A no.1
    • /
    • pp.35-41
    • /
    • 2003
  • To ensure resource adequacy in restructured electricity markets, policymakers have adopted installed capacity (ICAP) markets in some regions of the United States. These markets ensure that adequate generation exists to satisfy regional Loss of Load Probability(LOLP) criterion. Since the incentives created through ICAP mechanisms directly impact new generation and transmission investment decisions we examine one important factor that links ICAP markets with LOLP calculations;, determining the amount of ICAP credit assigned to particular generation units. First, we review and critique the literature on electric power systems' market failure resulting from demand exceeding supply. We then summarize the method of computing (the LOLP) as a means of assessing reliability and relate this method to ICAP markets. We find that only the expected value of available generation is used In current ICAP markets while ignoring the second and higher order moments, which tends to mis-state the ICAP value of a specific resource. We then consider a proposal whose purpose is to avoid this ICAP assignment issue by switching from ICAP obligations to options. We find that such a proposal may fail to not provide the benefits claimed and suffers from several practical difficulties. Finally, we conclude with some policy recommendations and areas for future research.

Error Probability Expressions for Frame Synchronization Using Differential Correlation

  • Kim, Sang-Tae;Kim, Jae-Won;Shin, Dong-Joon;Chang, Dae-Ig;Sung, Won-Jin
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.582-591
    • /
    • 2010
  • Probabilistic modeling and analysis of correlation metrics have been receiving considerable interest for a long period of time because they can be used to evaluate the performance of communication receivers, including satellite broadcasting receivers. Although differential correlators have a simple structure and practical importance over channels with severe frequency offsets, closedform expressions for the output distribution of differential correlators do not exist. In this paper, we present detection error probability expressions for frame synchronization using differential correlation, and demonstrate their accuracy over channel parameters of practical interest. The derived formulas are presented in terms of the Marcum Q-function, and do not involve numerical integration, unlike the formulas derived in some previous studies. We first determine the distributions and error probabilities for single-span differential correlation metric, and then extend the result to multispan differential correlation metric with certain approximations. The results can be used for the performance analysis of various detection strategies that utilize the differential correlation structure.

Performance of All-Optical Multihop RoFSO Communication System over Gamma-Gamma Atmospheric Turbulence Channels

  • Zong, Kang;Zhu, Jiang
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.5
    • /
    • pp.437-443
    • /
    • 2015
  • In this paper, we analyze the performance of the all-optical multihop radio over a free space optical (RoFSO) communication system with amplify-and-forward (AF) relays under varying weather conditions. The proposed channel model considers the propagation loss, attenuation and atmospheric fading modeled by the Gamma-Gamma (GG) distribution. Both the amplified spontaneous emission (ASE) noise in the all-optical relays and the background noise projected onto receiver apertures have been considered in the analysis. The lower bound analytical expressions for the end-to-end bit error rate (BER) and outage probability are derived for the multihop system employing the all-optical relays with the full channel state information (CSI). Meanwhile, the exact results for BER and outage probability are obtained via Monte Carlo simulation. Results indicate the performance of the proposed system will be improved by the multihop transmission technology. For a fixed number of relays, the BER and outage probability will be increased with the deterioration of the weather conditions.

Robust Transmission Waveform Design for Distributed Multiple-Radar Systems Based on Low Probability of Intercept

  • Shi, Chenguang;Wang, Fei;Sellathurai, Mathini;Zhou, Jianjiang;Zhang, Huan
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.70-80
    • /
    • 2016
  • This paper addresses the problem of robust waveform design for distributed multiple-radar systems (DMRSs) based on low probability of intercept (LPI), where signal-to-interference-plus-noise ratio (SINR) and mutual information (MI) are utilized as the metrics for target detection and information extraction, respectively. Recognizing that a precise characterization of a target spectrum is impossible to capture in practice, we consider that a target spectrum lies in an uncertainty class bounded by known upper and lower bounds. Based on this model, robust waveform design approaches for the DMRS are developed based on LPI-SINR and LPI-MI criteria, where the total transmitting energy is minimized for a given system performance. Numerical results show the effectiveness of the proposed approaches.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems (한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발)

  • Cha S. T.;Jeon D. H.;Kim T. K.;Jeon M. R.;Choo J. B.;Kim J. O.;Lee S .H
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

Packet Error Probability of CDMA Packet Radio System with Puctured Convolutional Codes (Punctured 콘볼루션 코드 방식을 이용한 코드분할 다중통신에서 패킷 에러 확률)

  • 박형래;정호영;강창언
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.3 no.2
    • /
    • pp.22-29
    • /
    • 1992
  • In recent years there has been increased interest in a class of multiple-access techniques known as code division multiple-access(CDMA). As the trend for ever increasing data transmission rate and high error performance continues while conserving bandwidth, the needs arise for good highrate R=b/v convolu- tional codes such as punctured codes. In this paper, the packet error propability has been analyzed in code division multiple-access packet radio system which utilize punctured convolutional code and hard-decision Viterbi decoding.

  • PDF

Bit Error Probability Analysis for MPSK Modulation in the Suzuki Fading Channel (Suzuki 페이딩 채널에서 MPSK 변조 방식의 비트 오류 확률 분석)

  • 박태준;하구용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.1075-1084
    • /
    • 1994
  • In this paper we derive a closed-form approximate expression for the bit error probability of the MPSK modulation with diversity reception in the Suzuki fading channel which is a mixture of short term and long term fading. We showed that the proposed approximate expression was capable of efficient computation compared to the existing integral-form expression, and gives an quantitative insight how much the channel parameters degrade the system performance. Further more it is shown that an appropriate transmission power control is beneficial to the system through consideration of the approximate expression.

  • PDF