• Title/Summary/Keyword: combined users

Search Result 345, Processing Time 0.027 seconds

Power Allocation in Heterogeneous Networks: Limited Spectrum-Sensing Ability and Combined Protection

  • Ma, Yuehuai;Xu, Youyun;Zhang, Dongmei
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.360-366
    • /
    • 2011
  • In this paper, we investigate the problem of power allocation in a heterogeneous network that is composed of a pair of cognitive users (CUs) and an infrastructure-based primary network. Since CUs have only limited effective spectrum-sensing ability and primary users (PUs) are not active all the time in all locations and licensed bands, we set up a new multi-area model to characterize the heterogeneous network. A novel combined interference-avoidance policy corresponding to different PU-appearance situations is introduced to protect the primary network from unacceptable disturbance and to increase the spectrum secondary-reuse efficiency. We use dual decomposition to transform the original power allocation problem into a two-layer optimization problem. We propose a low-complexity joint power-optimizing method to maximize the transmission rate between CUs, taking into account both the individual power-transmission constraints and the combined interference power constraint of the PUs. Numerical results show that for various values of the system parameters, the proposed joint optimization method with combined PU protection is significantly better than the opportunistic spectrum access mode and other heuristic approaches.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

Evaluation of Navigation System Performance of GPS/GLONASS/Galileo/BeiDou/QZSS System using High Performance GNSS Receiver

  • Park, Yong-Hui;Jeong, Jin-Ho;Park, Jin-Mo;Park, Sung-Hyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.333-339
    • /
    • 2022
  • The satellite navigation system was developed for the purpose of calculating the location of local users, starting with the Global Positioning System (GPS) in the 1980s. Advanced countries in the space industry are operating Global Navigation Satellite System (GNSS) that covers the entire earth, such as GPS, GLONASS, Galileo, and BeiDou, by establishing satellite navigation systems for each country. Regional Navigation Satellite Systems (RNSS) such as QZSS and NavIC are also in operation. In the early 2010s, only GPS and GLONASS could calculate location using a single system for location determination. After 2016, the EU and China also completed the establishment of GNSS such as Galileo and BeiDou. As a result, satellite navigation users can benefit from improved availability of GNSS. In addition, before Galileo and BeiDou's Full Operational Capability (FOC) declaration, they used combined navigation algorithms to calculate the user's location by adding another satellite navigation system to the GPS satellites. Recently, it may be possible to calculate a user's location for each navigation system using the resources of a single system. In this paper, we evaluated the performance of single system navigation and combined navigation solutions of GPS, GLONASS, Galileo, BeiDou and QZSS individual navigation systems using high-performance GNSS receivers.

Dynamic Equivalents Program combined with Graphic Environments (그래픽환경을 갖춘 동태등가프로그램)

  • 임성정;윤용한;김재철
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 1992.11a
    • /
    • pp.32-36
    • /
    • 1992
  • This paper develops the dynamic equivalents program combined with graphic user interface(GUI), to solve the stability of large power system. The p개posed method is coherency-based dynamic equivalents for transient stability studies. The program also provides with pull-down menu and Hangout help information for users. The developed dynamic equivalents program is suitable for the transient stability studies of a large power system with lots of data. The dynamic equivalents demonstrated over the New England system with 39 buses and 10 generators.

  • PDF

Interoperability Analysis of GPS and Galileo on Time (GPS와 Galileo 시각의 상호운용성 분석)

  • Shin, Mi-Young;Song, Se-Phil;Ko, Jae-Young;Yang, Sung-Hoon;Lee, Sang-Jeong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.10
    • /
    • pp.979-984
    • /
    • 2010
  • The users who use a combined GPS/Galileo receiver will benefit from an improved availability of the combined system and a reduced dependence on one particular positioning system. However, these users must solve the problem of an offset between the time scales of GPS and Galileo (GGTO). GGTO must be analyzed for not only a navigation system but also a timing system requesting precise time service. This paper analyzes the interoperability problem in a combined GPS/Galileo timing receiver and estimates the timing performance under various assumptions. The GPS real measurements were collected by using the commercial timing receiver from Ashtech Ltd. and the Galileo measurements were generated by a simulation software. A suitable test scenario set-up and the performance in a point of timing stability was evaluated.

An Efficient Adaptive Modulation Scheme for Wireless OFDM Systems

  • Lee, Chang-Wook;Jeon, Gi-Joon
    • ETRI Journal
    • /
    • v.29 no.4
    • /
    • pp.445-451
    • /
    • 2007
  • An adaptive modulation scheme is presented for multiuser orthogonal frequency-division multiplexing systems. The aim of the scheme is to minimize the total transmit power with a constraint on the transmission rate for users, assuming knowledge of the instantaneous channel gains for all users using a combined bit-loading and subcarrier allocation algorithm. The subcarrier allocation algorithm identifies the appropriate assignment of subcarriers to the users, while the bit-loading algorithm determines the number of bits given to each subcarrier. The proposed bit-loading algorithm is derived from the geometric progression of the additional transmission power required by the subcarriers and the arithmetic-geometric means inequality. This algorithm has a simple procedure and low computational complexity. A heuristic approach is also used for the subcarrier allocation algorithm, providing a trade-off between complexity and performance. Numerical results demonstrate that the proposed algorithms provide comparable performance with existing algorithms with low computational cost.

  • PDF

Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol

  • Kim, Kang Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.405-412
    • /
    • 2014
  • Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.

Selfie Stick & Tripod Combined Redesign Model with FEM and Reverse Engineering (역설계 및 FEM을 통한 셀카봉과 삼각대를 겸한 재설계)

  • Lim, Chae(u)-Hyun;Kim, Jin-Hyun
    • Proceeding of EDISON Challenge
    • /
    • 2015.03a
    • /
    • pp.442-451
    • /
    • 2015
  • Smartphone users are 15 billion in all round the world, and Korean smartphone users are estimated at 40million people to 83% of the Korean population. Selfie stick is most popular item among 20, 30's age users. And they use smartphones more than 90%. In survey they express inconvenience of using selfie stick. Inconveniences are as follows. * Heavy * Handle is inconvenient. * Mistiming during taking pictures * the range of shooting is not enough. In this paper the first improvement was that rod strength is slightly stronger. The second we divide a grip into 3 parts. If 3 parts are unfolded, these can use for tripod. We use deflection Interpretation for main Finite Elements Method program.

  • PDF

The Analysis of Injury Risk for the Type of Accident by Personal Mobility (퍼스널 모빌리티 사고 유형별 상해 위험성 분석)

  • Kim, Gyuhyun
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.1
    • /
    • pp.6-14
    • /
    • 2020
  • Personal mobility, which was used exclusively for leisure activities, has recently been used as a means of transportation, and it is expected to increase its role as the next generation transportation. Sales of personal mobility are increasing rapidly, but the problem is that traffic accidents are also increasing. In this study, human body injury caused by various collisions between electric wheel users and road users that occur on bicycle or pedestrian roads mainly used by personal mobility is analyzed through collision analysis and collision risk analysis. In the case of the collision accident for electric wheel, it is analyzed that the road users are more likely to be injured on the pedestrian road than the bicycle road. In addition, the head hit each other or fall and hit the floor caused severe head injury.