• Title/Summary/Keyword: User relay

Search Result 206, Processing Time 0.02 seconds

D2D Advertisement Dissemination Algorism based on User Proximity and Density (인접성과 사용자 밀집도 정보 기반 D2D 광고 확산 알고리즘)

  • Kim, JunSeon;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2403-2408
    • /
    • 2014
  • We designate multiple target areas for the advertisement disseminations in order to resolve the problem of advertisement transmission efficiency degradation due to overlapped device-to-device (D2D) transmissions and unnecessary advertisement transmissions. We here propose an efficient advertisement dissemination algorithm based on pre-selected target areas considering user density. In our proposed algorithm, relay nodes are gradually selected according to the locations of the target areas. We mathematically analyze D2D advertisement coverages of our proposed algorithm, and compare the various simulation results of the proposed algorithm with those of the conventional algorithm according to the several simulation scenarios via intensive simulations.

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Cluster-based Delay-adaptive Sensor Scheduling for Energy-saving in Wireless Sensor Networks (센서네트워크에서 클러스터기반의 에너지 효율형 센서 스케쥴링 연구)

  • Choi, Wook;Lee, Yong;Chung, Yoo-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.47-59
    • /
    • 2009
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we propose a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC). The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to the application-dependent and time-varying delay requirements. The TPC requests sensors to construct two types of links: direct and relay links. The direct links are used for control and forwarding time critical sensed data. On the other hand, the relay links are used only for data forwarding based on the user delay constraints, thus allowing the sensors to opportunistically use the most energy-saving links and forming a multi-hop path. Simulation results demonstrate that cluster-based delay-adaptive data gathering strategy (CD-DGS) saves a significant amount of energy for dense sensor networks by adapting to the user delay constraints.

Uplink Relaying Scheme for Efficient Frequency Usage in Cognitive Radio Networks (인지 무선 네트워크 환경에서 효율적인 주파수 활용을 위한 상향링크 릴레이 기법)

  • Kim, Se-Woong;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.356-368
    • /
    • 2011
  • While most of the public radio spectrum bands are allocated to licensed users, cognitive radio has been considered as a promising technology for the efficient spectrum utilization. In this new technology, secondary users opportunistically use the temporally underutilized licensed bands as long as they do not give the harmful interference to primary users. In this paper, we focus on the infra-structured network condition in which the cognitive radio network consists of a cognitive radio base station and multiple secondary users. Upon detecting a primary user, the entire cognitive radio network generally switches to another available channel, even if most of the on-going communications still does not interfere with the primary user. Moreover, the network re-entry process on a new channel causes the service disruption of the on-going communications. For this reason, in this paper, we propose a relaying scheme for efficient frequency usage, in which the secondary user out of the interference range of a primary user performs as a relaying node for the secondary user possibly interfering with a primary user. The entire spectrum switching is not required, and thus, we can avoid the service disruption of the on-going communications as much as possible.

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan;Zhu, Changping;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.890-910
    • /
    • 2014
  • This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

Performance of Opportunistic Incremental Relaying Systems with Random Relays in Rayleigh Fading Channels (Rayleigh 페이딩 채널에서 랜덤한 릴레이를 갖는 기회전송 증가 릴레이 시스템의 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.61-67
    • /
    • 2016
  • Opportunistic incremental relaying (OIR) system effectively overcomes the degradations caused by the fading of the wireless channel, and efficiently utilizes the wireless resources. Most of the OIR studies, however, assume spatially fixed relays. The user terminals which are usually served as relays move continuously, the assumption that the relays are fixed is not realistic. In this paper, the location of the spatially random user terminals are modeled by the Poisson point process, and the performance of an OIR system is derived. We noticed that the performance of the OIR system improves with the spatially random relays as well as with the fixed relays. Also the intensity of the relays and the transmitting directions toward the destination affect the performances. The performances of the maximal ratio combining (MRC) and the selection combining (SC) at the destination are compared.

Cooperative spectrum leasing using parallel communication of secondary users

  • Xie, Ping;Li, Lihua;Zhu, Junlong;Jin, Jin;Liu, Yijing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1770-1785
    • /
    • 2013
  • In this paper, a multi-hop transmission protocol based on parallel communication of secondary users (SUs) is proposed. The primary multi-hop network coexists with a set of SUs by cooperative spectrum sharing. The main optimization target of our protocol is the overall performance of the secondary system with the guarantee of the primary outage performance. The energy consumption of the primary system is reduced by the cooperation of SUs. The aim of the primary source is to communicate with the primary destination via a number of primary relays. SUs may serve as extra decode-and-forward relays for the primary network. When an SU acts as a relay for a primary user (PU), some other SUs that satisfy the condition for parallel communication are selected to simultaneously access the primary spectrum for secondary transmissions. For the proposed protocol, two opportunistic routing strategies are proposed, and a search algorithm to select the SUs for parallel communication is described. The throughput of the SUs and the PU is illustrated. Numerical results demonstrate that the average throughput of the SUs is greatly improved, and the end-to-end throughput of the PU is slightly increased in the proposed protocol when there are more than seven SUs.

HeNB-Aided Virtual-Handover for Range Expansion in LTE Femtocell Networks

  • Tang, Hao;Hong, Peilin;Xue, Kaiping
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.312-320
    • /
    • 2013
  • Home evolved Node-B (HeNB), also called a femtocell or a femto base station, is introduced to provide high data rate to indoor users. However, two main problems arise in femtocell networks: (1) Small coverage area of HeNB, which results in limited cell-splitting gain and ping-pong handover (HO) problems and (2) high inter-femtocell interference because HeNBs may be densely deployed in a small region. In this study, an efficient cooperation mechanism called an HeNB-aided virtual-HO (HaVHO) scheme is proposed to expand the coverage area of femtocells and to reduce inter-femtocell interference. The cooperation among neighbor HeNBs is exploited in HaVHO by enabling an HeNB to relay the data of its neighbor HeNB without an HO. The HaVHO procedure is compatible with the existing long term evolution specification, and the information exchange overhead in HaVHO is relatively low. To estimate the signal to interference plus noise ratio improvement, the area average channel state metric is proposed, and the amount of user throughput enhancement by HaVHO is derived. System-level simulation shows that HaVHO has a better performance than the other four schemes, such as lesser radio link failure, lesser ping-pong handover, lesser short-stay handover, and higher user throughput.

A Efficient Key Distribution Scheme for Individual/Group Communication on TRS (TRS 상의 개별/그룹 통신을 위한 효율적인 키 분배 기법)

  • Lee, Deok-Gyu;Park, Yong-Suk;Ahn, Jong-Chul;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.913-922
    • /
    • 2006
  • It used exclusively the radio communication where is the TRS(Trunked Radio Service) at frequency where the person whom it does is specific with hitherto radio communication method differently frequency of the decimal which is allocated to the relay station it talks the at the room which the multiple user uses with commonness. The TRS system the most big feature is the region multiple group and order communication method. The TRS the composition of system is composed of the multi mind group, the each group is composed of the terminal of the users who have the objective which is similar relates in business contents. With above it follows in same multi objective and the connection of the form which is various or group communication accomplishes and quality case, a possibility a or of having many problem point in key distribution for a large scale communication there is it could be exposed to attack of the form which is various. There is a place where it accomplishes the communication which is safe at the TRS from research which it sees it investigates group key distribution method which is an essential element. The method which it sees when it reduces a communication frequency, it stands but is the user, it proposes the efficient group key distribution method it will be able to accomplish.