• Title/Summary/Keyword: primary information

Search Result 3,575, Processing Time 0.036 seconds

Performance study of propensity score methods against regression with covariate adjustment

  • Park, Jincheol
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.1
    • /
    • pp.217-227
    • /
    • 2015
  • In observational study, handling confounders is a primary issue in measuring treatment effect of interest. Historically, a regression with covariate adjustment (covariate-adjusted regression) has been the typical approach to estimate treatment effect incorporating potential confounders into model. However, ever since the introduction of the propensity score, covariate-adjusted regression has been gradually replaced in medical literatures with various balancing methods based on propensity score. On the other hand, there is only a paucity of researches assessing propensity score methods compared with the covariate-adjusted regression. This paper examined the performance of propensity score methods in estimating risk difference and compare their performance with the covariate-adjusted regression by a Monte Carlo study. The study demonstrated in general the covariate-adjusted regression with variable selection procedure outperformed propensity-score-based methods in terms both of bias and MSE, suggesting that the classical regression method needs to be considered, rather than the propensity score methods, if a performance is a primary concern.

An Enhanced Energy Detector for WRAN Systems Using Maximum-to-Mean Power Ratio

  • Zheng, Guanbo;Han, Ning;Sohn, Sung-Hwan;Kim, Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.458-466
    • /
    • 2008
  • Spectrum sensing is the key challenge in implementing cognitive radio system, which enables unlicensed users to identify "white holes" in the spectrum allocated to primary users and utilize them efficiently. Recent studies have proposed three major sensing methods for WRAN systems, including matched filter, energy and feature detector. However, there are some drawbacks along with them. In this paper, we propose an enhanced energy detector that extends the ability of conventional one, which can differentiate the primary users from each other as well as the noise with different maximum-to-mean power ratio. Furthermore, a novel structure of cognitive radio detector employing the proposed algorithm is also analyzed to implement spectrum sensing. The simulation result shows that our proposed scheme performs well in the individual sensing environment and can satisfy the requirement with high detection probability.

A Study on the MTF Analysis for the Three Primary Colors of Light within Diffraction-Limitted System (회절제한시스템에 속한 빛의 3원색의 변조전달함수 해석에 관한 연구)

  • Che, Kyu-Shik;Chang, Won-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.863-866
    • /
    • 2012
  • The optical system develops remarkably as well as the development of civilization. The modulation transfer function(MTF) was introduced as one of the important estimation methods to estimate the performance of optical systems. The calculation of MTF is very boring and tiresome. We express the MTF curves three primary colors of light in the diffraction-limitted systems.

  • PDF

Outage Analysis of CRNs with SC Diversity Over Nakagami-m Fading Environment

  • Zhang, Zongsheng;Wu, Qihui;Zheng, Xueqiang;Wang, Jinlong;Li, Lianbao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3003-3017
    • /
    • 2013
  • In this paper, we investigate the outage performance of a cognitive relay network. We consider mutual interference in an independent, non-identically distributed Nakagmai-m fading environment. We first derive the close-form outage probability expression, which provides an efficient means to evaluate the effects of several parameters. This allows us to study the impact of several parameters on the network's performance. We then derive the asymptotic expression and reveal that the diversity order is strictly determined by the fading severity of the cognitive system. It is not affected by the primary network. Moreover, the primary network only affects the coding gain of the cognitive system. Finally, Monte Carlo simulations are provided, which corroborate the analytical results.

Novel User Selection Algorithm for MU-MIMO Downlink System with Block Diagonalization (Block Diagonalization을 사용하는 하향링크 시스템에서의 MU-MIMO 사용자 스케쥴링 기법)

  • Kim, Kyunghoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • Multi-User Multiple-Input Multiple-Output (MU-MIMO) is the core technology for improving the channel capacity compared to Single-User MIMO (SU-MIMO) by using multiuser gain and spatial diversity. Key problem for the MU-MIMO is the user selection which is the grouping the users optimally. To solve this problem, we adopt Extreme Value Theory (EVT) at the beginning of the proposed algorithm, which defines a primary user set instead of a single user that has maximum channel power according to a predetermined threshold. Each user in the primary set is then paired with all of the users in the system to define user groups. By comparing these user groups, the group that produces a maximum sum rate can be determined. Through computer simulations, we have found that the proposed method outperforms the conventional technique yielding a sum rate that is 0.81 bps/Hz higher when the transmit signal to noise ratio (SNR) is 30 dB and the total number of users is 100.

Spectrum Sensing Techniques for Cognitive radio-A Review

  • Matin, Mohammad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3638-3654
    • /
    • 2014
  • Cognitive Radio (CR) users need to sense the environment or channel at regular time interval for sharing the spectrum band of the primary users (PUs). Once find the spectrum idle, CR users start their transmission through it. Even while transmitting, they need to continue the sensing process so that they can leave the spectrum immediately whenever find a PU wanting to use the band. Therefore, detecting PUs is one of the main functions of cognitive radio before transmission and higher the detection probability ensures better protection to the primary users. However, it is not possible to attain a high detection probability (or a low miss detection probability) and low false alarm probability simultaneously as there is a tradeoff between false alarm probability ($P_{fa}$) and the probability of detection ($P_d$). In this paper, the author has provided a comprehensive study on different sensing techniques and discussed their advantages and disadvantages. Moreover, it is expected that, with this article, readers can have a through understanding of sensing techniques in CR and the current research trends in this area.

The Design of a Fault Tolerant Store Management System

  • Lee, Dongho;Park, Hansol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.1-5
    • /
    • 2015
  • Based on the dual hardware and software with distributed recovery blocks, the centralized type fault tolerant store management system(SMS) was proposed. As a result of trade off study related to mutiplex hardware system design, dual single board computer(SBC) was adapted. To verify redundancy function of the proposed structure, the prototype SMS and weapon simulator were used. The proposed SMS operated normally without being affected by a primary SBC failure. The switching time from primary SBC to shadow SBC was within 200 ms. The reliability of the proposed SMS was predicted and compared with the non fault tolerant SMS, thereby it was proved that the proposed SMS has a higher reliability than the non fault tolerant system within effective range.

Approximations to blocking probability in two-stage queueing model (이단계 대기모형에서 손실확률에 대한 근사)

  • 서정강;이계민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2644-2652
    • /
    • 1997
  • We ivestigate a two-stage queueing system which frequently arises in the study of overflow problems. A primary service facility consists of multiple primary queues where blocked calls are overflowed to a secondary queue. By approximating the input to the secondary queue with a two-state Markov Modulated Poisson Process (MMPP), we derive the blocking probability of the secondary queue. For the approximation, we employ the well-known Heffes' method and the SAM procedure.

  • PDF

Performance Analysis of Opportunistic Spectrum Access in Cognitive Radio networks (인지 무선 네트워크에서의 기회적 주파수 접근 방식에 관한 성능 분석)

  • Sim, Dong-Bo;Lee, Yu-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.141-144
    • /
    • 2010
  • OSA(Opportunistic Spectrum Access) allows secondary users not having a license for spectrum usage to opportunistically occupy an idle spectrum owned by a licensee named primary users. We propose two OSA schemes for un-slotted secondary users exploiting spectrum opportunities in un-slotted primary networks. We provide mathematical analysis and simulation results to reveal the impact of various system parameters.

  • PDF

Muti-Path Search Algorithm for Safe Movement of Swarm of Unmanned Systems (군집 무인체계의 안전한 이동을 위한 다중 경로 탐색 기법)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.160-163
    • /
    • 2021
  • In this paper, we present a path search scheme for the safe movement of the swarm of unmanned systems in unknown dangerous areas. Some of the swarm searches for the primary and secondary paths before the majority of swarm move through dangerous areas. In terms of rapid movement from the dangerous area and preparation for an accident, the primary path is searched first in the destination's direction. The secondary path is searched by considering the distance between the paths to guarantee a safe distance. The computer simulations show that the proposed scheme is suitable for the swarm of unmanned systems.