• Title/Summary/Keyword: cellular communications

Search Result 535, Processing Time 0.026 seconds

Dynamic Opportunistic Interference Alignment for Random-Access Small-Cell Networks (랜덤 엑세스 스몰셀 무선망에서의 실시간 기회적 간섭정렬 기법 연구)

  • Jeon, Sang-Woon;Shin, Won-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.675-681
    • /
    • 2014
  • As the recently soaring wireless traffic, small-cell techniques have been actively studied in order to support such a wireless demand for cellular wireless networks. This paper studies interference mitigation methods for random-access small-cell networks. Although inter-cell interference between small random-access cells is one of the main factors to degrade overall performance, most of the previous works focused on interference mitigation between users in each cell. To address such limitation, dynamic opportunistic interference alignment is proposed exploiting statistical characteristics of random-access. It is demonstrated by simulation that the proposed scheme outperforms the previous approach as the number of cells or the number of users in each cell increases.

A Combination of CS-CDMA and OFDM for Enhanced LTE on Downlink Channel

  • Jiao, Bingli;Ma, Meng;Lee, William C.Y.
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.8-14
    • /
    • 2013
  • For alleviating the low spectrum efficiency problem of orthogonal frequency division multiplexing (OFDM), due to the strong inter-cell-interference (ICI) at cell's edge, we introduce comb-spectrum code division multiple access (CS-CDMA) into broadband OFDM system at downlink channel for enabling the use of entire spectrum for seamless coverage. In addition, we develop a new method, called orthogonal cell code (OCC) scheme, to assist CS-CDMA for nullifying the ICI from contiguous cells. In system operation, each of the conventional cells is divided into an outer cell and an inner cell, and a mobile station (MS) should access to the CS-CDMA when it is in the outer cell and access to OFDM when it is in the inner cell. This study investigates the spectrum efficiency of using CS-CDMA and makes a comparison with that of long term evolution (LTE) in the following cases; (1) under an assumption of perfect channel state information and (2) based on channel estimates at a MS station. The results show the great advantage of utilizing the proposed system.

Data Dissemination in LTE-D2D Based Vehicular Network (LTE-D2D 차량 네트워크에서 정보 전달 방법)

  • Shim, Yong-Hui;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.602-612
    • /
    • 2015
  • Current IEEE 802.11p which is suggested for vehicle to vehicle communication supports one hop communication. Thus, it has a limitation to carry out efficient data dissemination. In this thesis, we suggest LTE-D2D based vehicle network to provide efficient data dissemination in the vehicle environment. In this network architecture, we use name based message with IP packet options and we put the intermediate vehicle node called 'super vehicle node' and each normal vehicle node in the cell requests data to the super vehicle node. The super vehicle node responses data to the normal vehicle node. Performance analysis is based mathematical modeling. We compare LTE cellular network to LTE-D2D based vehicle network about throughput according to packet delivery time.

Performance Analysis of Smart Antenna System in Mobile Terminals (빔 형성기를 적용한 단말기의 성능향상 연구)

  • Kim, Kye-Won;Lee, Seung-Goo;Kim, Min-Sang;Park, Byung-Hoon;Ko, Hak-Lim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9A
    • /
    • pp.889-895
    • /
    • 2010
  • In this paper, we have studied the implementation and adaptation of a smart antenna system for mobile terminals. We have designed a smart antenna system with switching beam structure in order to reduce the hardware and computational complexity. Additionally we have analyzed the reduction of the effect of multipath fading due to beamforming using real measurement data from commercial CDMA cellular channel environments. After analyzing the measurement data, we found out that the effect of fading reduces by ~3dB due to the effect of $2{\times}2$ beamforming in mobile terminals with 6dB beamforming gain.

Relationship Between the Resonance Frequency and QTS for Microspeaker (마이크로스피커에서 공명진동수와 QTS 사이의 연관성)

  • Oh, Sei-Jin
    • Korean Journal of Materials Research
    • /
    • v.21 no.7
    • /
    • pp.403-409
    • /
    • 2011
  • Micro speakers are used to reproduce sound in small electric and information and communications devices, such as cellular phones, PMPs, and MP3 players. The acoustical properties and sound quality, which are changed due to the decreased size of the speaker, are often adjusted varying the type and thickness of the diaphragm. The most widely used diaphragm material is thin polymer. It was previously reported by the author of this paper that the resonance frequency of a micro speaker is changed by the type and thickness of a polymer diaphragm. In this paper, the frequency response near the resonance frequency of a micro speaker was studied as functions of the type and thickness of the polymer diaphragm. While $R_{max}$ and $R_{DC}$ were affected by the type and thickness, an analysis of the electrical impedance curve revealed that $R_o(= R_{max}/R_{DC})$ and ${\Delta}f$ were not changed. Thus, $Q_{TS}$ which was function of $R_o$, ${\Delta}f$, and the resonance frequency, is only related to the resonance frequency. The increase of the resonance frequency led to a proportional rise of $Q_{TS}$. The change of the frequency response near the resonance frequency was not dependent on the type or thickness of the polymer diaphragm, but was affected by the resonance frequency.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Collaborative Technology of Intelligent Mobile Robots for Reliable Emergency Alert Broadcast (신뢰성 있는 재난경보 방송을 위한 지능형 이동 로봇의 협업 기법)

  • Chang, Sekchin;Lee, Yong-Tae
    • Journal of Broadcast Engineering
    • /
    • v.24 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The CBS and the AEAS functionalities are defined in cellular systems and T-DMB systems, respectively. In the case that communication facilities are disabled in indoor environments, it is impossible for the residents to receive the emergency messages. In this paper, a novel collaborative technology of intelligent mobile robots is proposed, which relies on cooperative communications among the intelligent mobile robots. In order to improve the performance, the intelligent mobile robots exploit their location information. Simulation results confirm that the proposed method is very suitable for reliable emergency alert broadcast.

ANALYSIS OF THE 90/150 CA GENERATED BY LINEAR RULE BLOCKS

  • CHO, SUNG-JIN;KIM, HAN-DOO;CHOI, UN-SOOK;KIM, JIN-GYOUNG;KANG, SUNG-WON
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.1_2
    • /
    • pp.23-35
    • /
    • 2019
  • Self-reciprocal polynomials are important because it is possible to specify only half of the coefficients. The special case of the self-reciprocal polynomial, the maximum weight polynomial, is particularly important. In this paper, we analyze even cell 90/150 cellular automata with linear rule blocks of the form < $a_1,{\cdots},a_n,d_1,d_2,b_n,{\cdots},b_1$ >. Also we show that there is no 90/150 CA of the form < $U_n{\mid}R_2{\mid}U^*_n$ > or < $\bar{U_n}{\mid}R_2{\mid}\bar{U^*_n}$ > whose characteristic polynomial is $f_{2n+2}(x)=x^{2n+2}+{\cdots}+x+1$ where $R_2$ =< $d_1,d_2$ > and $U_n$ =< $0,{\cdots},0$ >, and $\bar{U_n}$ =< $1,{\cdots},1$ >.

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.