• Title/Summary/Keyword: improved scheme

Search Result 2,127, Processing Time 0.025 seconds

Error Rate Performance of DS-CDMA/DQPSK Signal in Indoor Radio Channel Adopting ARQ Scheme (실내 무선 채널에서 ARQ 기법을 채용하는 DS-CDMA/DQPSK 신호의 오율특성)

  • 오창헌;고봉진;조성준
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.4
    • /
    • pp.11-20
    • /
    • 1994
  • The error rate equation of DS-CDMA/DQPSK skgnal adopting ARQ scheme has been derived in indoor radio channel which is characterized by AWGN, multi-user interference (MUI) and Rician fading, Using the derived equation the error performance has been evaluated and shown in figures as a function of direct to diffuse signal power ratio(KS1rT), the number of active users (K), PN code sequence length (N), the number of parity bit of linear code (b), forward channel BER, and ES1bT/NS1OT. From the results it is known that in severe fading environments (KS1rT=6) the performance of DS-CDMA/DQPSK system is not reliable so it is needed to adopt techniques for improvement. When an ARQ scheme is adopted, as a method for improving error performance, the performance improves compared with that of non-ARQ scheme and the degree of improvement is proportional to the number of parity bits of linear code. As increasing the number of parity bits, system performance is improved vut system throughput efficiency must be considered. In severe fading channel Hybrid ARQ scheme is more effective than ARQ scheme. As a result, ARQ scheme is appropriate for the high-reliability data communication systems over the radio channel in which the real time processing is not required.

  • PDF

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

An Improved Link Access Scheme Using Carrier Sensing Mechanism In DSRC. (단거리전용통신에서 반송파 감지기법을 이용한 개선된 링크접근 방식)

  • 박정수;조동호;오종택;이병태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1453-1461
    • /
    • 1999
  • In this paper, we propose a new scheme that improve the performance of the conventional link access scheme in DSRC MAC and evaluate the performance of the proposed scheme. By using carrier sensing mechanism in random access channels, the proposed scheme can reduce the probability that the collisions among the link access traffics with different priorities may occur in random access channels, and provide differentiated link access delays according to the priorities. Furthermore, the proposed scheme can improve the performance of link access by using modified reservation mode. According to simulation results, it is shown that the proposed scheme is better than conventional method in view of the mean access delay and throughput in random access channels.

  • PDF

Added Resistance and 2DOF Motion Analysis of KVLCC2 in Regular Head Waves using Dynamic Overset Scheme (동적 중첩격자 기법을 이용한 KVLCC2의 파랑중 부가저항 및 2자유도 운동 해석)

  • Kim, Yoo-Chul;Kim, Yoonsik;Kim, Jin;Kim, Kwang-Soo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.5
    • /
    • pp.385-393
    • /
    • 2018
  • In this study, the analysis of 2DOF (2 Degree Of Freedom) motion and added resistance of a ship in regular head waves is carried out using RANS (Reynolds Averaged Navier-Stokes) approach. In order to improve the accuracy for large amplitude motions, the dynamic overset scheme is adopted. One of the dynamic overset schemes, Suggar++ is applied to WAVIS which is the in-house RANS code of KRISO (Korea Research Institute of Ships and Ocean Engineering). The grid convergence test is carried out using the present scheme before the analysis. The target hull form is KRISO VLCC tanker (KVLCC2) and 13 wave length conditions are applied. The present scheme shows the improved results comparing with the results of WAVIS2 in the non-inertial reference frame. The dynamic overset scheme is confirmed to give the comparatively better results for the large amplitude motion cases than the non-inertial frame based scheme.

Improved Blind Signal Separation Based on Canonical Correlation Analysis (개선된 정준상관분석을 이용한 신호 분리 알고리듬)

  • Kang, Dong-Hoon;Lee, Yong-Wook;Oh, Wang-Rok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.4
    • /
    • pp.105-110
    • /
    • 2012
  • The CCA (canonical correlation analysis) is a well known analysis tool that measures the linear relationship between two variable sets and it can be used for blind source separation (BSS). In previous works, a blind source separation scheme based on the CCA and auto regression was proposed. Unfortunately, the proposed scheme requires high signal-to-noise ratio for successful source separation. In this paper, we propose an improved BSS scheme based on the CCA and auto regression by eliminating the main diagonal elements of auto covariance matrix. Compared to the previously proposed BSS scheme, the proposed BSS scheme not only offers better source separation performance but also requires low computational complexity.

A Scheme of VoIP Spam Detection Using Improved Multi Gray-Leveling (향상된 Multi Gray-Leveling을 통한 VoIP 스팸 탐지 기법)

  • Chae, Kang-Suk;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.630-636
    • /
    • 2012
  • In this paper, we propose an improved Multi Gray-Leveling scheme which reduces the problems of the existing Multi Gray-Leveling scheme suggested as a way of prevention against call spam in VoIP environment. The existing scheme having two different time period distinguishes the possibility of call spam by checking the call interval, so that it prevents the spammer's avoidance controlling the call interval. This is the strength of the existing one but it can misunderstand the normal user as a spammer due to taking long term time period. To solve this problem, this paper proposes the upgrade scheme which utilizes the receiver's action pattern as well as the caller's action pattern. It has such a good strength that can do gray leveling via the collected information in the database of VoIP service provider without user's direct involvement. Hence it can be a very effective way of VoIP spam detection.

A Self-Deployment Scheme Using Improved Potential Field in Mobile Sensor Networks (이동 센서 네트워크에서 개선된 포텐셜 필드를 사용한 자율 배치 방법)

  • Lee, Heon-Jong;Kim, Yong-Hwan;Han, Youn-Hee;Jeong, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.106-116
    • /
    • 2010
  • Sensor deployment makes an effect on not only covering of the interesting area but also reliable data acquisition and efficient resource management of sensor, so that sensors must be deployed at their better place. In traditional static wireless sensor networks, however, it is impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. Therefore, if each sensor has locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon is efficient for extending the coverage area. In this paper, we present an improved potential-field-based sensor self-deployment scheme by combining the centroid of Voronoi polygon with the traditional potential-field scheme. Simulation results show that our scheme can achieve higher coverage in shorter time and less movement than the traditional potential-field scheme.

Target Birth Intensity Estimation Using Measurement-Driven PHD Filter

  • Zhang, Huanqing;Ge, Hongwei;Yang, Jinlong
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.1019-1029
    • /
    • 2016
  • The probability hypothesis density (PHD) filter is an effective means to track multiple targets in that it avoids explicit data associations between the measurements and targets. However, the target birth intensity as a prior is assumed to be known before tracking in a traditional target-tracking algorithm; otherwise, the performance of a conventional PHD filter will decline sharply. Aiming at this problem, a novel target birth intensity scheme and an improved measurement-driven scheme are incorporated into the PHD filter. The target birth intensity estimation scheme, composed of both PHD pre-filter technology and a target velocity extent method, is introduced to recursively estimate the target birth intensity by using the latest measurements at each time step. Second, based on the improved measurement-driven scheme, the measurement set at each time step is divided into the survival target measurement set, birth target measurement set, and clutter set, and meanwhile, the survival and birth target measurement sets are used to update the survival and birth targets, respectively. Lastly, a Gaussian mixture implementation of the PHD filter is presented under a linear Gaussian model assumption. The results of numerical experiments demonstrate that the proposed approach can achieve a better performance in tracking systems with an unknown newborn target intensity.

An Improved TDoA Localization with Particle Swarm Optimization in UWB Systems (UWB 시스템에서 Particle Swarm Optimization을 이용하는 향상된 TDoA 무선측위)

  • Le, Tan N.;Kim, Jae-Woon;Shin, Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1C
    • /
    • pp.87-95
    • /
    • 2010
  • In this paper, we propose an improved TDoA (Time Difference of Arrival) localization scheme using PSO (Particle Swarm Optimization) in UWB (Ultra Wide Band) systems. The proposed scheme is composed of two steps: re-estimation of TDoA parameters and re-localization of a tag position. In both steps, the PSO algorithm is employed to improve the performance. In the first step, the proposed scheme re-estimates the TDoA parameters obtained by traditional TDoA localization to reduce the TDoA estimation error. In the second step, the proposed scheme with the TDoA parameters estimated in the first step, re-localizes the tag to minimize the location error. The simulation results show that the proposed scheme achieves a more superior location performance to the traditional TDoA localization in both LoS (Line-of-Sight) and NLoS (Non-Line-of-Sight) channel environments.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.