• Title/Summary/Keyword: Transmission probability

Search Result 689, Processing Time 0.022 seconds

Prediction of Galloping Accidents in Power Transmission Line Using Logistic Regression Analysis

  • Lee, Junghoon;Jung, Ho-Yeon;Koo, J.R.;Yoon, Yoonjin;Jung, Hyung-Jo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.969-980
    • /
    • 2017
  • Galloping is one of the most serious vibration problems in transmission lines. Power lines can be extensively damaged owing to aerodynamic instabilities caused by ice accretion. In this study, the accident probability induced by galloping phenomenon was analyzed using logistic regression analysis. As former studies have generally concluded, main factors considered were local weather factors and physical factors of power delivery systems. Since the number of transmission towers outnumbers the number of weather observatories, interpolation of weather factors, Kriging to be more specific, has been conducted in prior to forming galloping accident estimation model. Physical factors have been provided by Korea Electric Power Corporation, however because of the large number of explanatory variables, variable selection has been conducted, leaving total 11 variables. Before forming estimation model, with 84 provided galloping cases, 840 non-galloped cases were chosen out of 13 billion cases. Prediction model for accidents by galloping has been formed with logistic regression model and validated with 4-fold validation method, corresponding AUC value of ROC curve has been used to assess the discrimination level of estimation models. As the result, logistic regression analysis effectively discriminated the power lines that experienced galloping accidents from those that did not.

Delay analysis for a discretionary-priority packet-switching system

  • Hong, Sung-Jo;Takagi, Hideaki
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.729-738
    • /
    • 1995
  • We consider a priority-based packet-switching system with three phases of the packet transmission time. Each packet belongs to one of several priority classes, and the packets of each class arrive at a switch in a Poison process. The switch transmits queued packets on a priority basis with three phases of preemption mechanism. Namely, the transmission time of each packet consists of a preemptive-repeat part for the header, a preemptive-resume part for the information field, and a nonpreemptive part for the trailer. By an exact analysis of the associated queueing model, we obtain the Laplace-Stieltjes transform of the distribution function for the delay, i.e., the time from arrival to transmission completion, of a packet for each class. We derive a set of equations that calculates the mean response time for each class recursively. Based on this result, we plot the numerical values of the mean response times for several parameter settings. The probability generating function and the mean for the number of packets of each class present in the system at an arbitrary time are also given.

  • PDF

Performance analysis of EY-NPMA protocol in the infinite population model of HIPERLAN (HIPERLAN의 무한 가입자 모델에서 EY-NPMA 프로토콜의 성능분석)

  • 조광오;이정규;조병학;김호섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1425-1433
    • /
    • 1999
  • In this Paper, we analyzed the HIPERLAN(Hlgh PErformance Radio LAN) MAC(Medium Access Control) protocol, which was a standard for Wireless LANs defined by ETSI. We analyzed mathematically the elimination phase and the yield phase of the channel contention phase of CAC(Channel Access Control) layer in the infinite population model of the HIPERLAN using EY-NPMA(Elimination Yield-Nonpreemptive Priority Multiple Access)protocol. Also we analyzed the probability of successful transmission in the transmission phase. And, we proved results of a mathematical analysis by the simulation of HIPERLAN MAC protocol.

  • PDF

A study on improving TCP performance in mobile communication systems with a high transmission error (전송오류가 큰 이동통신 환경에서 TCP 성능 개선에 관한 연구)

  • 장재신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.813-822
    • /
    • 2003
  • Conventional TCPs are designed to work efficiently on wired network where any transmission errors rarely take place. However, the probability of transmission error in a wireless network is much higher than in a wired network, due to pass loss, multipath fading, and many kinds of interference. There were many researches on preventing the degradation of TCP performance in these wireless networks with bad channel condition. One of these researches is the SNOOP protocol which is link-layer solution for achieving high throughput of TCP. However, this SNOOP protocol is apt to retransmit some TCP segments unnecessarily, which could cause some increased traffic loads in a wireless network. In this paper, we propose a new algorithm to prevent the unnecessary retransmission of TCP segments and to achieve increased performance of TCP.

A Study on Security System of Document Image using Mixing Algorithm (합성 방식을 이용한 문서 화상의 보안 체계 연구)

  • 허윤석;김일경;박일남
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.89-105
    • /
    • 1999
  • In this paper, we present a countermeasure for a various trouble occurred in secure communication of document image. We Propose a security system for transmission of document image using mixing algorithm that the third party cannot conceive secure transmission of information instead of existing scheme which depend on crypto-degree of security algorithm, itself. For this, RM, DM and RDM algorithm for mixing of secure bits are proposed and applied to digital signature for mixing for secure document and mixing for non-secure document by secure document. Security system for document image involves not only security scheme for document image transmission itself, but also digital signature scheme. The transmitter embeds secretly the signatures onto secure document, embeds it to non-secure document and transfers it to the receiver. The receiver makes a check of any forgery on the signature and the document. Because the total amount of transmitted data and the image quality are about the same to those of the original document image, respectively, the third party cannot notice the fact that signatures and secure document are embedded on the document image. Thus, the probability of attack will be reduced.

  • PDF

A Simple Model for TCP Loss Recovery Performance over Wireless Networks

  • Kim, Beomjoon;Lee, Jaiyong
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.235-244
    • /
    • 2004
  • There have been a lot of approaches to evaluate and predict transmission control protocol (TCP) performance in a numerical way. Especially, under the recent advance in wireless transmission technology, the issue of TCP performance over wireless links has come to surface. It is because TCP responds to all packet losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. By several previous works, although it has been already proved that overall TCP performance is largely dependent on its loss recovery performance, there have been few works to try to analyze TCP loss recovery performance with thoroughness. In this paper, therefore, we focus on analyzing TCP's loss recovery performance and have developed a simple model that facilitates to capture the TCP sender's behaviors during loss recovery period. Based on the developed model, we can derive the conditions that packet losses may be recovered without retransmission timeout (RTO). Especially, we have found that TCP Reno can retransmit three packet losses by fast retransmits in a specific situation. In addition, we have proved that successive three packet losses and more than four packet losses in a window always invoke RTO easily, which is not considered or approximated in the previous works. Through probabilistic works with the conditions derived, the loss recovery performance of TCP Reno can be quantified in terms of the number of packet losses in a window.

Multi-Relay Cooperative Diversity Protocol with Improved Spectral Efficiency

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.240-249
    • /
    • 2011
  • Cooperative diversity protocols have attracted a great deal of attention since they are thought to be capable of providing diversity multiplexing tradeoff among single antenna wireless devices. In the high signal-to-noise ratio (SNR) region, cooperation is rarely required; hence, the spectral efficiency of the cooperative protocol can be improved by applying a proper cooperation selection technique. In this paper, we present a simple "cooperation selection" technique based on instantaneous channel measurement to improve the spectral efficiency of cooperative protocols. We show that the same instantaneous channel measurement can also be used for relay selection. In this paper two protocols are proposed-proactive and reactive; the selection of one of these protocols depends on whether the decision of cooperation selection is made before or after the transmission of the source. These protocols can successfully select cooperation along with the best relay from a set of available M relays. If the instantaneous source-to-destination channel is strong enough to support the system requirements, then the source simply transmits to the destination as a noncooperative direct transmission; otherwise, a cooperative transmission with the help of the selected best relay is chosen by the system. Analysis and simulation results show that these protocols can achieve higher order diversity with improved spectral efficiency, i.e., a higher diversity-multiplexing tradeoff in a slow-fading environment.

Assessment of Possibility on the Human Risk for the Electromagnetic Field of Unbalanced Two Coupled Three-phase Transmission Line Using Fuzzy Theory (퍼지이론을 이용한 3상 2회선 불평형 송전선로에서의 전자계에 대한 인체 위험 가능성평가)

  • Kim, Sang-Chul;Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.2 s.74
    • /
    • pp.22-28
    • /
    • 2006
  • This paper presents assessment of possibility on the human risk for the electromagnetic field of unbalanced two coupled three-phase transmission line using fuzzy theory. Three phase load flow program was developed which employed a Newton-Raphson method as a tool to analyze system unbalanced. This research presents a method of handling two coupled three phase transmission system unbalance analysis and unbalanced power demand as a function of voltages. As the results of case study, in case of 345[kV] T/L, the electric field intensity was 10.9540[kV/m], magnetic field intensity was 0.2567[G] in severest case. The results showed that the membership of a proposition fuzzy '10.9540 [kV/m] is hazardous' is 0.6349. As the analytic results using the fuzzy qualifier term, the membership in case of very false is 0.1379 and fairly false is 0.6124, respectively. In assessment of fuzzy measure possibility for the electromagnetic field, this paper used probability of fuzzy arid measure of fuzziness technique.

LTE Mobility Enhancements for Evolution into 5G

  • Park, Hyun-Seo;Choi, Yong-Seouk;Kim, Byung-Chul;Lee, Jae-Yong
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1065-1076
    • /
    • 2015
  • Network densification is regarded as the dominant driver for wireless evolution into the era of 5G. However, in this context, interference-limited dense small cell deployments are facing technical challenges in mobility management. The recently announced results from an LTE field test conducted in a dense urban area show a handover failure (HOF) rate of over 21%. A major cause of HOFs is the transmission failure of handover command (HO CMD) messages. In this paper, we propose two enhancements to HO performance in LTE networks - radio link failure-proactive HO, which helps with the reliable transmission of HO CMD messages while the user equipment is under a poor radio link condition, and Early Handover Preparation with Ping-Pong Avoidance (EHOPPPA) HO, which assures reliable transmission of HO CMD under a good radio link condition. We analyze the HO performance of EHOPPPA HO theoretically, and perform simulations to compare the performance of the proposed schemes with that of standard LTE HO. We show that they can decrease the HOF rate to nearly zero through an analysis, and based on the simulation results, by over 70%, without increasing the ping-pong probability.

Call Admission Schemes for Multimedia Services in CDMA Cellular Systems (셀룰라 시스템에서 멀티미디어 서비스를 위한 호 수락제어 기법 연구)

  • Choi Sung-Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.232-238
    • /
    • 2006
  • We propose a novel call admission control scheme which improves the handoff drop and the new call block probabilities of high priority services, minimizing the negative impact on low priority services, in multimedia service cellular networks. This paper proposes three schemes to solve this problem; the packing scheme in which available channels of a cell distributed to each frequency channel are concentrated on one frequency channel and a high transmission rate service is assigned to the frequency channel; the queuing scheme in which the queue is used for high transmission rate calls; and the power reallocation scheme in which the power assigned to calls under service is temporarily reduced and a high transmission rate service is allowed. The simulation results revealed that our scheme improved the drop and the block probabilities of the high priority services compared with the conventional scheme.