• 제목/요약/키워드: cooperative transmission

검색결과 353건 처리시간 0.021초

Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems

  • Pappas, Nikolaos;Kountouris, Marios;Jeon, Jeongho;Ephremides, Anthony;Traganitis, Apostolos
    • Journal of Communications and Networks
    • /
    • 제18권2호
    • /
    • pp.261-269
    • /
    • 2016
  • In this paper, the impact of energy constraints on a two-hop network with a source, a relay and a destination under random medium access is studied. A collision channel with erasures is considered, and the source and the relay nodes have energy harvesting capabilities and an unlimited battery to store the harvested energy. Additionally, the source and the relay node have external traffic arrivals and the relay forwards a fraction of the source node's traffic to the destination; the cooperation is performed at the network level. An inner and an outer bound of the stability region for a given transmission probability vector are obtained. Then, the closure of the inner and the outer bound is obtained separately and they turn out to be identical. This work is not only a step in connecting information theory and networking, by studying the maximum stable throughput region metric but also it taps the relatively unexplored and important domain of energy harvesting and assesses the effect of that on this important measure.

Photonic Aspects of MB Degradation on Fe-carbon/TiO2 Composites under UV Light Irradiation

  • Zhang, Kan;Meng, Ze-Da;Oh, Won-Chun
    • 한국세라믹학회지
    • /
    • 제47권5호
    • /
    • pp.433-438
    • /
    • 2010
  • Fe-carbon/$TiO_2$ composites were prepared by a sol-gel method using AC, ACF, CNT and $C_{60}$ as carbon precursors and were characterized by means of BET surface area, X-ray diffraction (XRD), scanning electron microscopy (SEM), Transmission Electron Microscopy (TEM) and energy dispersive X-ray spectroscopy (EDX). The activity of the prepared photocatalysts was investigated by degradation reaction of methylene blue (MB) irradiated with UV lamp. Effects of different carbon sources and irradiation time on photocatalytic activity were also investigated. The results showed that the photocatalytic activity of the Fe-carbon/$TiO_2$ composites was much higher than that of pristine $TiO_2$ and Fe/$TiO_2$ composites. The prominent photocatalytic activity of Fecarbon/$TiO_2$ composites could be attributed to both the effects of photo-adsorption and electron transfer by carbon substrate. In addition, the higher photocatalytic activity of Fe-carbon/$TiO_2$ composites can be compared with that of carbon/$TiO_2$ and Fe /$TiO_2$ composites due to cooperative effects between Fe and carbon.

전력시스템 안전도 향상을 위한 다기 UPFC의 최적 운전점 결정 (The Optimal Operating Points of Multiple UPFCs for Enhancing Power System Security Level)

  • 임정욱;문승일
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제50권8호
    • /
    • pp.388-394
    • /
    • 2001
  • This paper presents how to determine the optimal operating points of Unified Power Flow controllers (UPFC) the line flow control of which can enhance system security level. In order to analyze the effect of these devices on the power system, the decoupled model has been employed as a mathematical model of UPFC for power flow analysis. The security index that indicates the level of congestion of transmission line has been proposed and minimized by iterative method. The sensitivity of objective function for control variables of and UPFC has been derived, and it represents the change in the security index for a given set of changes in real power outputs of UPFC. The proposed algorithm with sensitivity analysis gives the optimal set of operating points of multiple UPECs that reduces the index or increases the security margin and Marquart method has been adopted as an optimization method because of stable convergence. The algorithm is verified by the 10-unit 39-bus New England system that includes multiple FACTS devices. The simulation results show that the power flow congestion can be relieved in normal state and the security margin can be guaranteed even in a fault condition by the cooperative operation of multiple UPECs.

  • PDF

A Brief Review of κ-Carbide in Fe-Mn-Al-C Model Alloys

  • Seol, Jae Bok
    • Applied Microscopy
    • /
    • 제48권4호
    • /
    • pp.117-121
    • /
    • 2018
  • The multiple length scale analysis of previously designed Fe-Mn-Al-C based low-density model alloys reveals the difference in ordered ${\kappa}-carbide$, $(Fe,Mn)_3AlC_x$, between Fe-25Mn-16Al-5.2C (at%) alloy and Fe-3Mn-10Al-1.2C (at%) alloy. For the former alloy composition consisting of fully austenite grains, ${\kappa}-carbide$ showed majorly cuboidal and minorly pancake morphology and its chemical composition was not changed through aging for 24 h and 168 h at $600^{\circ}C$. Meanwhile, for the isothermally annealed ferritic alloy system for 1 hr at 500 and $600^{\circ}C$, the dramatic change in the chemical composition of needle-shape ${\kappa}-carbide$, $(Fe,Mn)_3(Fe,Al)C_x$, was found. Here we address that the compositional fluctuations in the vicinity of the carbides are significantly controlled by abutting phase, either austenite or ferrite. Namely, the cooperative ordering of carbon and Al is an important factor contributing to carbide formation in the high-Mn and high-Al alloyed austenitic steel, while the carbon and Mn for the low-Mn and high Al alloyed ferritic steel.

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • 제42권6호
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

A New Approach Towards Aggregation in VANET

  • Hussain, Rasheed;Abbas, Fizza;Son, Junggab;Kim, Sangjin;Oh, Heekuck
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.214-217
    • /
    • 2013
  • Advancements in automobile industries and the communication technologies caused VANET (Vehicular Ad Hoc NETwork) to evolve to VANET-based clouds before its deployment. It is more likely that VANET clouds will replace the traditional VANET in the deployment phase. It is to be noted that an abrupt deployment is out of question because it would require mass of resources and money to do so; instead incremental deployment is more ideal. In this paper, we aim at the incremental deployment phase of VANET clouds and focus on the well-established public transport networks. Data aggregation is one of the essential aspects in traditional VANET and has been researched for quite long time. However the previously proposed schemes are still controversial. Keeping in mind the time and space prediction of public buses, we leverage these buses as potential aggregators and MG (Mobile Gateways) in VANET clouds. Buses gather cooperative whereabouts information from neighbors, aggregate that information, disseminate it to the neighbor MGs and also send it to the cloud for storage and for services exchange. In our proposed scheme, we believe that the dissemination will be effective and cover most of the urban area since at any instant of time; buses cover most part of the urban areas. Besides, the effective transmission range is higher due to tall buses.

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

LTE-Advanced 시스템의 다중 사용자 MIMO Relay 네트워크에서 간섭 제거를 위한 Joint Precoding 기술 (Joint Precoding Technique for Interference Cancellation in Multiuser MIMO Relay Networks for LTE-Advanced System)

  • 사란쉬 말리크;문상미;김보라;김철성;황인태
    • 대한전자공학회논문지TC
    • /
    • 제49권6호
    • /
    • pp.15-26
    • /
    • 2012
  • 본 논문에서는 개선된 AF(Amplify-and-Forward)와 DF(Decode-and-Forward) Relay 프로토콜을 결합한 다중 사용자 MIMO (Multiple Input Multiple Output) Relay 네트워크에서 간섭 제거 기술을 논의 한다. 간섭 제거 기술은 Relay 노드가 적용된 전체 전송 시스템의 오류 성능을 향상시키기 위해 eNB(evolved NodeB), Relay 노드(RN: Relay Node)와 UE(User Equipment)에 의해 이루어진다. 간섭 제거를 수행하기 위해 ZF(Zero Forcing), MMSE(Minimum Mean Square Error), SIC(Successive Interference Cancellation)와 OSIC(Ordered Successive Interference Cancellation)가 적용된 DPC(Dirty Paper Coding)와 THP(Thomilson Harashima Precoding)를 사용하였다. 이러한 기본적인 기술이 적용된 Relay 노드 기능들이 연구되고 개선된다. 협력 Relay 노드에서 두 계층 간의 간섭 제거를 강화한 DF는 성능을 향상시킨다. eNB와 RN간의 가중치 벡터를 사용하여 간섭 제거가 수행된다. 연구 최종 결과, 기존의 알고리즘과 비교하여 제안된 알고리즘이 낮은 SNR에서 더 좋은 성능을 나타냈다. 모의실험 결과 LTE-Advanced 시스템에서 제안된 기법이 오류 성능 면에서 상당한 향상을 나타냈다.

멀티 홉 군통신 시스템을 위한 간섭 제거 기법 성능 분석 (Performance of Interference Cancellation Scheme for Multihop Military Communication Systems)

  • 김요철;김진영
    • 한국인터넷방송통신학회논문지
    • /
    • 제11권3호
    • /
    • pp.17-22
    • /
    • 2011
  • 본 논문에서는 멀티 홉 군통신 시스템에서 발생할 수 있는 동일채널 간섭 (CCI : Co-Channel Interference) 제거 성능을 분석하였다. 간섭 제거 기법으로 먼저 Zero Forcing (ZF)과 Minimum Mean Square Error (MMSE) 기법을 적용하여 간섭을 제거한 후, 연속 간섭 제거 (SIC : Successive Interference Cancellation) 알고리즘을 이용하여 추가적인 다이버시티 이득을 얻고 간섭 제거 성능을 향상시킨다. 무선 채널은 레일레이 (Rayleigh) 페이딩 채널을 고려하여 모의 실험을 하였으며, 시스템 성능은 비트 오류 확률 (Bit Error Probability) 측면에서 분석되었다. 모의실험 결과로부터, 멀티 홉 무선 네트워크 환경에서 MMSE가 ZF보다 BER 성능을 현저하게 향상시킴을 확인하였으며, 각각 기법에 연속 간섭 제거 알고리즘을 적용한 경우, 그 성능이 더욱 좋아지는 것을 알 수 있었다. 따라서 MMSE-SIC 방식은 멀티 홉 군통신 시스템에서 보다 신뢰성 있는 신호의 전송을 제공할 수 있다.