• Title/Summary/Keyword: victim cell

Search Result 14, Processing Time 0.018 seconds

A 3-cell CCI(Cell-to-Cell Interference) model and error correction algorithm for Multi-level cell NAND Flash Memories (다중셀 낸드 플래시 메모리의 3셀 CCI 모델과 이를 이용한 에러 정정 알고리듬)

  • Jung, Jin-Ho;Kim, Shi-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.10
    • /
    • pp.25-32
    • /
    • 2011
  • We have analyzed adjacent cell dependency of threshold voltage shift caused by the cell to cell interference, and we proposed a 3-adjacent-cell model to model the pattern dependency of the threshold voltage shift. The proposed algorithm is verified by using MATLAB simulation and measurement results. In the experimental results, we found that accuracy of the proposed simple 3-adjacient-cell model is comparable to the widely used conventional 8-adjacient-cell model. The Bit Error Rate (BER) of LSB and of MSB is improved by 28.9% and 19.8%, respectively, by applying the proposed algorithm based on 3-adjacent-cell model to 20nm-class 2-bit MLC NAND flash memories.

A Cognitive Beamforming Scheme for Cross-Tier Interference Mitigation in Heterogeneous Cellular Networks (이종 셀룰러 망에서 계층 간 간섭완화를 위한 인지 빔형성 기법)

  • Seo, Ju-yeol;Park, Seungyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1387-1401
    • /
    • 2016
  • When a closed access policy in which only an authorized user is allowed to access to a given base station (BS) has been employed in heterogeneous cellular networks, a macro-cell user is used to experience strong cross-tier interference from its adjacent small-cell BSs to which the user is not allowed to access. To mitigate this problem, it has been proposed that a small-cell BS employs a beamforming vector which is orthogonal to the channel of the victim user. However, this technique requires considerable mutual exchange of information among the macro-cell BS, the macro-cell user, and the small-cell BS. In this paper, we propose a cognitive beamforming scheme, in which a small-cell BS employs the beamforming orthogonal to the victim users' channel without any explicit mutual information exchange. Particularly, the small-cell BS finds small- and macro-cell users experiencing the co-tier and cross-tier interferences from it, respectively. Then, it employs a beamforming which is orthogonal to the victim users' channels to mitigate the co-tier and cross-tier interferences. Using the system-level simulation, we demonstrate that the proposed scheme effectively mitigates the cross-tier interference problem.

Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Jong-Geun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • In this paper, the possibility of a UE (User Equipment) incarceration attack using RRCRejecet and RRCRelease in 5G SNPN (Standalone Non-Public Network) is analyzed based on the 3GPP standard document. First, the cell selection and reselection procedures of the UE are analyzed, and then the processing process of the false base station and the UE before and after transmission of RRCReject and RRCRelease is analyzed. As a result of the analysis, it is possible that the false base station that transmits a strong signal causes the victim UE to establish an RRC connection to the false base station itself. In addition, if the false base station transmits an RRCReject message without integrity protection in response to the victim UE's attempt to establish an RRC connection, it is determined that the victim UE can continue to stay in the RRC connection attempt process. On the other hand, it is determined that it is impossible to incarcerate the victim UE by inducing an attempt to establish an RRC connection to another false base station using RRCRelease.

A CMOS Cell Driver Model to Capture the Effects of Coupling Capacitances (결합 커패시턴스의 영향을 고려한 CMOS 셀 구동 모델)

  • Cho, Kyeong-Soon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.11
    • /
    • pp.41-48
    • /
    • 2005
  • The crosstalk effects that can be observed in the very dee submicron semiconductor chips are due to the coupling capacitances between interconnect lines. The accuracy of the full-chip timing analysis is determined by the accuracy of the estimated propagation delays of cells and interconnects within the chip. This paper presents a CMOS cell driver model and delay calculation algerian capturing the crosstalk effects due to the coupling capacitances. The proposed model and algorithm were implemented in a delay calculation program and used to estimate the propagation delays of the benchmark circuits extracted from a chip layout. We observed that the average discrepancy from HSPICE simulation results is within $1\%$ for the circuits with a victim affected by $0\~10$ aggressors.

Lifetime Extension Method for Non-Volatile Memory based Deep Learning System by analyzing Data Write Pattern (데이터 쓰기 패턴 분석을 통한 비휘발성 메모리 기반 딥러닝 시스템의 수명 연장 기법)

  • Choi, Juhee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.1-6
    • /
    • 2022
  • Modern computer systems usually have special hardware for operations used in deep learning workload even edge computing environment. Non-volatile memories (NVMs) have been considered for alternative memory storage because they consume little static energy and occupy small area. However, there is a problem for NVMs to be directly adopted. An NVM cell has limited write endurance, so that the lifetime of NVM-based memory system is much shorter than that of conventional memory system. To overcome this problem for the deep learning system, this paper proposes a novel method to extend the lifetime based on the analysis of the deep learning workloads. If an incoming block has more than a predefined number of frequently used values, the cacheline is defined as write friendly block. During the victim selection, the cacheline has lower possibility to be chosen as victim. The experimental results show that the lifetime is increased by about 50% and energy consumption is decreased by 3% with a little performance hurt.

Hiker Mobility Model and Mountain Distress Simulator for Location Estimation of Mountain Distress Victim (산악 조난자의 위치추정을 위한 이동성 모델 및 조난 시뮬레이터)

  • Kim, Hansol;Cho, Yongkyu;Jo, Changhyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.55-61
    • /
    • 2022
  • Currently police and fire departments use a Network/Wifi/GPS based emergency location positioning system established by mobile carriers to directly link with the device of the people who request the rescue to accurately position the expected location in the call area. However in the case of mountain rescue it is difficult to rescue the victim in golden time because the location of the search area cannot be limited when the victim is located in a radio shadow area of the mountain or the device power is off and this situation become worse if victim fail to report 911 by himself due to the injury. In this paper, we are expected to solve the previous problem by propose the mobile telecommunication forensic simulator consist of time series of cell information, human mobility model which include some general and specific features (age, gender, behavioral characteristics of victim, etc.) and intelligent infer system. The results of analysis appear in heatmap of polygons on the map based on the probability of the expected location information of the victim. With this technology we are expected to contribute to rapid and accurate lifesaving by reducing the search area of rescue team.

Study on Compatibility Analysis between Radio Services (무선통신 업무간 양립성 분석에 관한 연구)

  • Kang, Jeong-Yong;Kim, Jin-Young;Kim, Eun-Cheol;Kim, Jong-Heon;Ryu, Chung-Sang;Oh, Seong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.122-137
    • /
    • 2007
  • In this paper, compatibility between different radio services or systems is analyzed when they are in adjacent band or co-channel. The first step of the compatibility analysis is establishing an interference scenario. And an interference pobability from an interfering transmitter to a victim receiver is calculated by means of Monte-Carlo simulation techniques. Then the calculated result is compared with the predefined interference criteria, maximum permissible interference probability and we can determine compatibility in accordance with the active interferer density, channel bandwidth, cell radius, distance between interfering transmitter and victim receiver, and duty cycle. It is assumed that Propagation modes are the free space model and extened Hata model.

  • PDF

Analysis on Coexistence between Unlicensed Wireless Device based on 802.11ah and LTE User Equipment (802.11ah 기반 비면허 무선기기와 LTE 단말기 간 공존 분석)

  • Lee, Il-Kyoo;Park, Yeon-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2015-2021
    • /
    • 2017
  • Recently, a lot of attention is fallen to IoT(Internet of Things) for hyper-connected society and the number of unlicensed wireless device has been increasing. Thus, this paper analyzed the impact of unlicensed wireless device on the basis of 802.11ah on licensed LTE user equipment in 900 MHz frequency band for efficient frequency use. As the interference analysis method, Minimum Coupling Loss (MCL) method and Monte Carlo (MC) method were used. In case of one interferer, minimum separation distance between interferer and victim was calculated as about 22 m through the MCL method under the assumption of the worst case. The maximum number of interferer to meet the interference probability of 5% below within a cell radius of the victim was computed as about 3000 by using MC method based on statistical technique. The analysis method and results in this paper are expected to be used for the coexistence between unlicensed wireless device and licensed wireless device.

Application of Adaptive Neuro-Fuzzy Inference System for Interference Management in Heterogeneous Network

  • Palanisamy, Padmaloshani;Sivaraj, Nirmala
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.318-329
    • /
    • 2018
  • Femtocell (FC) technology envisaged as a cost-effective approach to attain better indoor coverage of mobile voice and data service. Deployment of FCs over macrocell forms a heterogeneous network. In urban areas, the key factor limits the successful deployment of FCs is inter-cell interference (ICI), which severely affects the performance of victim users. Autonomous FC transmission power setting is one straightforward way for coordinating ICI in the downlink. Application of intelligent control using soft computing techniques has not yet explored well for wireless networks. In this work, autonomous FC transmission power setting strategy using Adaptive Neuro Fuzzy Inference System is proposed. The main advantage of the proposed method is zero signaling overhead, reduced computational complexity and bare minimum delay in performing power setting of FC base station because only the periodic channel measurement reports fed back by the user equipment are needed. System level simulation results validate the effectiveness of the proposed method by providing much better throughput, even under high interference activation scenario and cell edge users can be prevented from going outage.

Study on the Concept of Medical Supplies in the Product Liability Law (제조물책임법상 제조물로서의 의약품의 개념)

  • Jeon, Byeong-Nam
    • The Korean Society of Law and Medicine
    • /
    • v.7 no.2
    • /
    • pp.331-364
    • /
    • 2006
  • Medical supplies have contradiction of efficacy and side effect to the various diseases together. Therefore, people have tried to reduce the side effects and also provide various methods to cope with any damages from the medicine quickly. In the case of accidents by medical supplies, the victim can be protected with advantage by the Product Liability Law rather than the Torts. The limit of Product Liability Law's application depends on whether medical supplies belong to the product or not. According to Product Liability Law, the product should be processed. Therefore, medical supplied should be processed to be the category of product. It can be said that the medical supplies in pharmacy, Chinese medicine, medical herbs, biological medicine manufactures, blood manufactured medicine, cord blood, hemopoietic progenitior cell and stem cell belongs to the manufactured products. The mixture by the prescription of doctor or preparation of pharmacist can be recognized as the product because prescription or preparation is a manufacturing act. Therefore, applying Product Liability Law to manufacturer, doctor or pharmacist would achieve the goal which is protecting the victims extensively.

  • PDF