• Title/Summary/Keyword: information and communication systems

Search Result 8,517, Processing Time 0.039 seconds

Green Cooperative Sensing Scheme in Heterogeneous Networks

  • Shen, Lifei;Liu, Jian;Tan, Xinxin;Wang, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.550-565
    • /
    • 2018
  • Cognitive radio technology is still the key technology of future mobile communication systems. Previous studies have focused on improving spectrum utilization and less energy consumption. In this paper, we propose an Overhead Reduced Scheme (ORS) for green cooperative spectrum sensing. Compared to traditional cooperative sensing scheme, ORS scheme divides the sensing time into three time slots and selects the best multi-mode user to report decisions. In consideration of reporting channel deviation, we derive closed-form expressions for detection probability and false alarm probability of ORS scheme based on Rayleigh fading channel. Simulation results show that ORS scheme can improve the perception accuracy while reducing the perceived delay and energy consumption in the process of perception, so as to realize the green communication.

Robust observer-based $H_{\infty}$ controller design for descriptor systems using an LMI

  • Kim, Jong-Hae;Lee, Joong-Jae;Ahn, Seong-Joon;Ahn, Seung-Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1843-1846
    • /
    • 2004
  • This paper considers a robust observer-based $H_{\infty}$ controller design method for descriptor systems with parameter uncertainties using just one LMI condition. The sufficient condition for the existence of controller and the controller design method are presented by a perfect LMI condition in terms of all variables using singular value decomposition, Schur complement, and change of variables. Therefore, one of the main advantages is that a robust observer-based $H_{\infty}$ controller is found by solving one LMI condition compared with existing results. Numerical example is given to illustrate the effectiveness of the proposed controller design method.

  • PDF

Two-Way Relaying-Based Two-Hop Two-User Multiple-Input Multiple-Output System

  • Cho, Young Seek;Choi, Seyeong
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.2
    • /
    • pp.67-74
    • /
    • 2014
  • In multi-hop communication systems, two-way relaying is one of the solutions to mitigate the spectral efficiency loss caused by a half-duplex transmission. In this paper, a simple two-way relaying scheme is proposed for two-hop two-user multiple input multiple output (MIMO) systems. In the proposed system, a base station and a relay station (RS), both equipped with two antennas, form a point-to-point MIMO channel, while the RS and two single-antenna mobile users form a point-to-multipoint multiuser (MU)-MIMO channel. Numerical examples show that the proposed system achieves a significant sum rate gain as compared to a one-way relaying system as the distance between a relay and the two users decreases. We also show that although we can expand the proposed scheme to more than two users, its performance gain as compared to that of one-way relaying decreases with an increase in the number of users.

A PROCESSOR SHARING MODEL FOR COMMUNICATION SYSTEMS

  • Lim, Jong Seul;Park, Chul Guen;Ahn, Seong Joon;Lee, Seoyoung
    • Journal of applied mathematics & informatics
    • /
    • v.15 no.1_2
    • /
    • pp.511-525
    • /
    • 2004
  • we model communication and computer systems that process interactive and several and several types of background jobs. The scheduling policy in use is to share the processor among all interactive jobs and, at most, one background job of each type at a time according to the process sharing discipline. Background jobs of each type are served on a first-come-first-served basis. Such scheduling policy is called Processor Sharing with Background jobs (PSBJ). In fact, the PSBJ policy is commonly used on many communication and computer systems that allow interactive usage of the systems and process certain jobs in a background mode. In this paper, the stability conditions for the PSBJ policy are given and proved. Since an exact analysis of the policy seems to be very difficult, an approximate analytic model is proposed to obtain the average job sojourn times. The model requires the solution of a set of nonlinear equations, for which an iterative algorithm is given and its convergence is proved. Our results reveal that the model provides excellent estimates of average sojourn times for both interactive and background jobs with a few percent of errors in most of the cases considered.

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems

  • Lee, Poong-Up;Jeong, Jang-Keun;Saxena, Navrati;Shin, Ji-Tae
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.207-220
    • /
    • 2009
  • A large number of phone calls and data services will take place in indoor environments. In Long Term Evolution (LTE), femtocell, as a home base station for indoor coverage extension and wideband data service, has recently gained significant interests from operators and consumers. Since femtocell is frequently turned on and off by a personal owner, not by a network operator, one of the key issues is that femtocell should be identified autonomously without system information to support handover from macrocell to femtocell. In this paper, we propose a dynamic reservation scheme of Physical Cell Identities (PCI) for 3GPP LTE femtocell systems. There are several reserving types, and each type reserves a different number of PCIs for femtocell. The transition among the types depends on the deployed number of femtocells, or the number of PCI confusion events. Accordingly, flexible use of PCIs can decrease PCI confusion. This reduces searching time for femtocell, and it is helpful for the quick handover from macrocell to femtocell. Simulation results show that our proposed scheme reduces average delay for identifying detected cells, and increases network capacity within equal delay constraints.

Adaptive Interference Estimation For Cellular Mobile Communication Systems Using Directional Transmission and Performance Evaluation Based on System-Level Simulations (방향성 전송을 사용하는 셀룰러 이동 통신 시스템을 위한 간섭량 예측 방안 및 시스템 레벨 시뮬레이션을 통한 성능 분석)

  • Lee, Woongsup;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2117-2123
    • /
    • 2014
  • To cope with the explosive growth of traffic which is considered as one of the most biggest threat to current mobile communication systems, various solutions such as small cell and device-to-device communication have been exploited. Directional transmission in which transmission power of base station is focused onto the direction where the mobile station is located, can be used to increase throughput of the system. In this work, we develop a system-level simulator for cellular mobile communication systems using directional transmission and adaptive interference estimation scheme for directional transmission has been proposed. By using the developed simulator, the performance of cellular mobile communication systems with directional transmission is examined. Moreover, it is shown that the overall throughput of cellular system can be improved by utilizing directional transmission.

Packet Discrimination Method Using Artificial Frequency Offsets for Low Decoding Power Consumption in Heterogeneous Cooperative Communication Systems (이기종 협력 통신시스템에서 디코딩 전력소모 감소를 위한 인위적인 주파수 오프셋을 이용한 패킷 구별 기법)

  • Chae, Seungyeob;Yeo, Gyuhak;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.372-379
    • /
    • 2014
  • When a hand-held device with limited battery transmits and receives data using short-range wireless communication systems, such as WLAN(Wireless Local Area Network) or high speed WPAN(Wireless Personal Area Network), instead of mobile communication systems, the device is able to reduce the power consumption due to the reduced transmission distance. However, if there are many WLAN or high speed WPAN systems around the device, non-negligible power may be consumed by receiving and decoding the packets which have nothing to do with the device. In this paper, we propose a scheme reducing the power consumption by including physical-layer ID in WLAN or WPAN packets and avoiding unnecessary packet receptions. Also, we describe a method to determine the optimum number of physical-layer IDs.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures (주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구)

  • Choi, Woong Gyu
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.43-48
    • /
    • 2012
  • As the major information communication infrastructure had been getting more important, 'Act on the Protection of Information and Communications Infrastructure'(APICI) was legislated in Korea 2001. Consequently, the major information system, nationwide monitering service systems and government administration operation & management systems have been registered and managed under the APICI. The authorized organizations related to above service and system, perform vulnerability analysis and evaluation for chief communication infrastructures by themselves or registered agencies. In this research, we propose an advanced model for vulnerability analysis and evaluation and apply it to the main information and communication infrastructures through the case study. We hope each related organization could apply this model for analysis and evaluation of vulnerability in these infrastructures.