• Title/Summary/Keyword: non-user

Search Result 1,486, Processing Time 0.029 seconds

Simultaneous Information and Power Transfer for Multi-antenna Primary-Secondary Cooperation in Cognitive Radio Networks

  • Liu, Zhi Hui;Xu, Wen Jun;Li, Sheng Yu;Long, Cheng Zhi;Lin, Jia Ru
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.941-951
    • /
    • 2016
  • In this paper, cognitive radio and simultaneous wireless information and power transfer (SWIPT) are effectively combined to design a spectrum-efficient and energy-efficient transmission paradigm. Specifically, a novel SWIPT-based primary-secondary cooperation model is proposed to increase the transmission rate of energy/spectrum constrained users. In the proposed model, a multi-antenna secondary user conducts simultaneous energy harvesting and information forwarding by means of power splitting (PS), and tries to maximize its own transmission rate under the premise of successfully assisting the data delivery of the primary user. After the problem formulation, joint power splitting and beamforming optimization algorithms for decode-and-forward and amplify-and-forward modes are presented, in which we obtain the optimal PS factor and beamforming vectors using a golden search method and dual methods. Simulation results show that the proposed SWIPTbased primary-secondary cooperation schemes can obtain a much higher level of performance than that of non-SWIPT cooperation and non-cooperation schemes.

ARM: Adaptive Resource Management for Wireless Network Reliability (무선 네트워크의 신뢰성 보장을 위한 적응적 자원 관리 기법)

  • Lee, Kisong;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2382-2388
    • /
    • 2014
  • To provide network reliability in indoor wireless communication systems, we should resolve the problem of unexpected network failure rapidly. In this paper, we propose an adaptive resource management (ARM) scheme to support seamless connectivity to users. In consideration of system throughput and user fairness simultaneously, the ARM scheme adaptively determines the set of healing channels, and performs scheduling and power allocation iteratively based on a constrained non-convex optimization technique. Through intensive simulations, we demonstrate the superior performance results of the proposed ARM scheme in terms of the average cell capacity and user fairness.

Performance Analysis Based on RAU Selection and Cooperation in Distributed Antenna Systems

  • Wang, Gang;Meng, Chao;Heng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5898-5916
    • /
    • 2018
  • In this paper, the downlink performance of multi-cell distributed antenna systems (DAS) with a single user in each cell is investigated. Assuming the channel state information is available at the transmitter, four transmission modes are formulated as combinations of remote antenna units (RAUs) selection and cooperative transmission, namely, non-cooperative transmission without RAU selection (NCT), cooperative transmission without RAU selection (CT), non-cooperative transmission with RAU selection (NCT_RAUS), and cooperative transmission with RAU selection (CT_RAUS). By using probability theory, the cumulative distribution function (CDF) of a user's signal to interference plus noise ratio (SINR) and the system ergodic capacity under the above four modes are determined, and their closed-form expressions are obtained. Furthermore, the system energy efficiency (EE) is studied by introducing a realistic power consumption model of DAS. An expression for determining EE is formulated, and the closed-form tradeoff relationship between spectral efficiency (SE) and EE is derived as well. Simulation results demonstrate their consistency with the theoretical analysis and reveal the factors constraining system EE, which provide a scientific basis for future design and optimization of DAS.

Achievable Sum Rate of NOMA with Negatively-Correlated Information Sources

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.75-81
    • /
    • 2021
  • As the number of connected smart devices and applications increases explosively, the existing orthogonal multiple access (OMA) techniques have become insufficient to accommodate mobile traffic, such as artificial intelligence (AI) and the internet of things (IoT). Fortunately, non-orthogonal multiple access (NOMA) in the fifth generation (5G) mobile networks has been regarded as a promising solution, owing to increased spectral efficiency and massive connectivity. In this paper, we investigate the achievable data rate for non-orthogonal multiple access (NOMA) with negatively-correlated information sources (CIS). For this, based on the linear transformation of independent random variables (RV), we derive the closed-form expressions for the achievable data rates of NOMA with negatively-CIS. Then it is shown that the achievable data rate of the negatively-CIS NOMA increases for the stronger channel user, whereas the achievable data rate of the negatively-CIS NOMA decreases for the weaker channel user, compared to that of the positively-CIS NOMA for the stronger or weaker channel users, respectively. We also show that the sum rate of the negatively-CIS NOMA is larger than that of the positively-CIS NOMA. As a result, the negatively-CIS could be more efficient than the positively-CIS, when we transmit CIS over 5G NOMA networks.

Types and Characteristics of Digital Anthropometric Methods (디지털 인체 계측 방법의 유형 및 특성)

  • Kim, Rira
    • Journal of Fashion Business
    • /
    • v.25 no.5
    • /
    • pp.88-98
    • /
    • 2021
  • In this study, the characteristics of digital anthropometric methods were determined with case studies. These methods were broadly classified into two categories: non-wearable and wearable. Then, these categories were further classified into four types: 3D Scanning, mobile app, smart clothing, and smart tool Among the non-wearable types, the "3D scanning" technique was based on the use of 3D hardware equipment. With this technique, the body shape was measured and the internal body information was obtained. Therefore, it is used in fields of healthcare and fitness. Among the wearable types, "Smart clothing" involves a special clothing that measures human body and a smartphone application. Both the components are linked to a fashion platform, which is based on the measured sizes that help shoppers. The "Smart tool" has the characteristic of measuring only with smart tools and smartphone applications; it does not involve the measurement of images. The common advantage of digital anthropometric methods are as follows: they reduce the time and cost of measurement by enabling self-measurement. Moreover, simple measurements are used to determine the size of anthropometry. Thereafter, it accumulates this data to track the continuous changes in size. From an industrial point of view, digital anthropometric technology should be used to increase sales. The on-demand market can be expanded as global consumers would throng the Korean fashion market. For the consumer, an avatar should be created to fit the user's size. This would provide a fun experience to the user.

Examining User Perception about Airline Untact Service Quality (항공사 비대면 서비스 품질에 대한 이용자 인식 연구)

  • Lee, Sojeong;An, Jaeyoung;Yun, Haejung
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.3
    • /
    • pp.545-570
    • /
    • 2022
  • Purpose: The purpose of this study was to explore dimensions to improve airline non-face-to-face(untact) service quality and identify shadow work dimensions in the digital environment among them. Methods: This study conducted mixed method. First of all, For finding out the dimensions of airline untact service quality, in-depth interviews were conducted from passengers. The collected data through the survey were analyzed using improved importance-performance analysis(IPA). Second, An online survey was conducted to quantitatively analyze user perception about airline untact service quality, and the importance performance of service quality at each dimension was identified through the revised IPA method. Results: The results of this study are as follows; Through in-depth interviews, 11 dimensions found out and 32 measurement items were developed. and then, through the revised IPA analysis, passengers were highly satisfied with "Cleanliness of in-flight service" and "Reliability of self check-in". Also, We found 3 shadow work dimensions such as "Ease of use of self check-in", "Usefulness of self check-in", and "Responsiveness of self check-in". Conclusion: Airline service providers have to keep high-satisfaction services and urgently improve less satisfied services. In particular, the dimensions related to shadow work have to be improved.

The Reward Program Effect: A Strategic Framework for Acquiring New Customers (고객 보상프로그램의 효과성에 관한 연구: 신규 고객 유치를 위한 전략적 프레임웤)

  • Lee, Sukekyu;Kim, Kyoungsik
    • Asia Marketing Journal
    • /
    • v.7 no.2
    • /
    • pp.123-139
    • /
    • 2005
  • Until now, There are many studies of reward program effect about retaining current customers. But main goal of this study is acquiring new customer in competitive environment. We also reveal strategic framework for maximizing acquisition of new customer. For increasing customer loyalty of non-use brand, we'd better to give Out My Own reward non-user immediately and for increasing customer loyalty of use brand we'd better to give In My own Brand user accumulatively. Implication of the results for markets and future research are discussed

  • PDF

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.

Surveillance System Using Person Tracking in Mobile Platform (모바일 플랫폼 기반의 사람 추적 감시시스템)

  • Lee, Kyoung-Mi;Lee, Youn-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.94-101
    • /
    • 2007
  • In this paper, we propose a surveillance system using multi-person tracking in a WIPI based mobile system, which is the standard wireless internet platform. The proposed system consists of two subsystems: the person tracking system and the mobile information transmission system. The person tracking system tracks persons who invade security and the mobile information transmission system sends the tracking results from the person tracking system to the user's mobile phone. In this paper, the person tracking system tracks persons who appear on many cameras with non-overlapping views in order to achieve a wider view. The mobile information transmission system saves automatically tracked data to the owner's web server and transmits the saved data to the user's WIPI mobile phone. Therefore, whenever the user wishes to view tracked data later, the mobile system can provide the user with the tracking results by either the user selecting particular cameras or the time on the owner's mobile phone. The proposed system is a new surveillance system that transfers tracked data among cameras to the user's mobile phone in order to overcome space limitations in tracking areas and monitoring areas and spatial limitations in monitoring hours.

Cooperative Sensing Clustering Game for Efficient Channel Exploitation in Cognitive Radio Network (인지무선 네트워크에서 효율적인 채널 사용을 위한 협력센싱 클러스터링 게임)

  • Jang, Sungjeen;Yun, Heesuk;Bae, Insan;Kim, JaeMoung
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.1
    • /
    • pp.49-55
    • /
    • 2015
  • In cognitive radio network (CRN), spectrum sensing is an elementary level of technology for non-interfering to licensed user. Required sample number for spectrum sensing is directly related to the throughput of secondary user and makes the tradeoff between the throughput of secondary user and interference to primary user. Required spectrum sensing sample is derived from required false alarm, detection probability and minimum required SNR of primary user (PU). If we make clustering and minimize the required transmission boundary of secondary user (SU), we can relax the required PU SNR for spectrum sensing because the required SNR for PU signal sensing is related to transmission range of SU. Therefore we can achieve efficient throughput of CRN by minimizing spectrum sensing sample. For this, we design the tradeoff between gain and loss could be obtained from clustering, according to the size of cluster members through game theory and simulation results confirm the effectiveness of the proposed method.