• Title/Summary/Keyword: 커버리지 확률

Search Result 34, Processing Time 0.027 seconds

Analysis on the Cell Capacity and Coverage of 3GPP systems (3GPP 시스템의 용량과 셀 커버리지 분석)

  • 양하영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1461-1472
    • /
    • 2000
  • Recently, the mobile users seem to be rapidly increasing and then the capacity limit will be reached at close hand. In these situations, to provide them with good quality of service in the coming future, newly planned cell design is needed. In the next generation mobile communication systems, namely IMT-2000, good quality services will be possible only by designing the cell structure hierarchically with the help of appropriate cell planning. In the research process, the standardization reports on the future mobile cellular IMT-2000 system (3GPP) are investigated and the parameters, that are essential to cell planning, are also researched. Modeling of IMT-2000 radio link and the numerical analysis on that make it possible to calculate the forward/reverse link budget, system capacity call blocking probability Erlang capacity and cell coverage. In planning the cell of IMT-2000 system, various parameters are considered, such as hierarchical cell structure, number of users, data service forms and propagation area environments. From the results, efficient cell planning methods are proposed. Through this thesis efficient cell planning and maximum capacity will be achieved in the beginning of commercial IMT-2000 service.

  • PDF

Cooperative Spectrum Sensing in Cognitive Radio Systems with Weight Value Applied (인지무선 시스템에서 부사용자의 거리에 따른 가중치가 적용된 협력 스펙트럼 센싱)

  • Yun, Heesuk;Yun, Jaesoon;Bae, Insan;Jang, Sunjeen;Kim, Jaemoung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.91-97
    • /
    • 2014
  • In this paper, we propose weighted detection probability with distance between primary user and secondary users by using cooperative spectrum sensing based on energy detection. And we analysis and simulate the result. We suggest different distance between primary user and secondary users and the wireless channel between primary user and secondary users is modeled as Gaussian channel. From the simulation results of the cooperative spectrum sensing with weighted method make coverage bigger compared with non-weight, and We show higher sensing efficiency when we put weight detection probability than before method.

Energy Efficiency Enhancement of Macro-Femto Cell Tier (매크로-펨토셀의 에너지 효율 향상)

  • Kim, Jeong-Su;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.47-58
    • /
    • 2018
  • The heterogeneous cellular network (HCN) is most significant as a key technology for future fifth generation (5G) wireless networks. The heterogeneous network considered consists of randomly macrocell base stations (MBSs) overlaid with femtocell base stations (BSs). The stochastic geometry has been shown to be a very powerful tool to model, analyze, and design networks with random topologies such as wireless ad hoc, sensor networks, and multi- tier cellular networks. The HCNs can be energy-efficiently designed by deploying various BSs belonging to different networks, which has drawn significant attention to one of the technologies for future 5G wireless networks. In this paper, we propose switching off/on systems enabling the BSs in the cellular networks to efficiently consume the power by introducing active/sleep modes, which is able to reduce the interference and power consumption in the MBSs and FBSs on an individual basis as well as improve the energy efficiency of the cellular networks. We formulate the minimization of the power onsumption for the MBSs and FBSs as well as an optimization problem to maximize the energy efficiency subject to throughput outage constraints, which can be solved the Karush Kuhn Tucker (KKT) conditions according to the femto tier BS density. We also formulate and compare the coverage probability and the energy efficiency in HCNs scenarios with and without coordinated multi-point (CoMP) to avoid coverage holes.

Distributed Subchannel ON/OFF Scheduling by using Load Distribution for Cellular Femto Systems (셀룰러 펨토 시스템에서 부하 분산을 통한 분산적 부채널 ON/OFF 스케쥴링 기법)

  • Yoon, Kang-Jin;Kim, Young-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.471-479
    • /
    • 2012
  • In cellular femto systems, femto Base stations(f-BSs) can be installed unnecessarily and overcrowded in small areas. This will cause an interference problem and it can impact on the capacity, blocking probability, and coverage of femtocells in the shared channel systems. In this paper, we propose a load distribution scheme by using forced handover and probabilistic subchannel scheduling policy to resolve the problem. The proposed scheme operates in distributed manner though communication with neighboring f-BSs, and includes self-detection of overcrowded area and radio resource management based on measurements. We evaluate the performance of the proposed scheme in terms of average cell throughput and average throughput per users.

Analysis of Infiltration Route using Optimal Path Finding Methods and Geospatial Information (지형공간정보 및 최적탐색기법을 이용한 최적침투경로 분석)

  • Bang, Soo Nam;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.195-202
    • /
    • 2006
  • The infiltration route analysis is a military application using geospatial information technology. The result of the analysis would present vulnerable routes for potential enemy infiltration. In order to find the susceptible routes, optimal path search algorithms (Dijkstra's and $A^*$) were used to minimize the cost function, summation of detection probability. The cost function was produced by capability of TOD (Thermal Observation Device), results of viewshed analysis using DEM (Digital Elevation Model) and two related geospatial information coverages (obstacle and vegetation) extracted from VITD (Vector product Interim Terrain Data). With respect to 50m by 50m cells, the individual cost was computed and recorded, and then the optimal infiltration routes was found while minimizing summation of the costs on the routes. The proposed algorithm was experimented in Daejeon region in South Korea. The test results show that Dijkstra's and $A^*$ algorithms do not present significant differences, but A* algorithm shows a better efficiency. This application can be used for both infiltration and surveillance. Using simulation of moving TOD, the most vulnerable routes can be detected for infiltration purpose. On the other hands, it can be inversely used for selection of the best locations of TOD. This is an example of powerful geospatial solution for military application.

A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability (소프트웨어 취약성 평가를 위한 길이기반 파일 퍼징 테스트 슈트 축약 알고리즘)

  • Lee, Jaeseo;Kim, Jong-Myong;Kim, SuYong;Yun, Young-Tae;Kim, Yong-Min;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.231-242
    • /
    • 2013
  • Recently, automated software testing methods such as fuzzing have been researched to find software vulnerabilities. The purpose of fuzzing is to disclose software vulnerabilities by providing a software with malformed data. In order to increase the probability of vulnerability discovery by fuzzing, we must solve the test suite reduction problem because the probability depends on the test case quality. In this paper, we propose a new method to solve the test suite reduction problem which is suitable for the long test case such as file. First, we suggested the length of test case as a measure in addition to old measures such as coverage and redundancy. Next we designed a test suite reduction algorithm using the new measure. In the experimental results, the proposed algorithm showed better performance in the size and length reduction ratio of the test suite than previous studies. Finally, results from an empirical study suggested the viability of our proposed measure and algorithm for file fuzzing.

Design and Performance of Low Complexity Multiple Antenna Relay Transmission Based on STBC-OFDM (시공간 부호화 직교 주파수분할 다중화 기반 저 복잡도 다중 안테나 릴레이 전송 방식 설계 및 성능)

  • Lee, Ji-Hye;Park, Jae-Cheol;Wang, Jin-Soo;Lee, Seong-Ro;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11C
    • /
    • pp.673-681
    • /
    • 2011
  • In this paper, we design multiple antenna relay transmission schemes of low complexity to enhance the spatial diversity in orthogonal frequency division multiplexing (OFDM) systems. The relay scheme underlined, can provide space time block coding (STBC) of OFDM signals in the time domain without IFFT and FFT operations with much reduced complexity. In this paper, we modify the conventional low-complexity STBC-OFDM relaying scheme to be compatible to the existing OFDM systems. In addition, we extend the proposed scheme for multiple antenna relays and provide performance enhancement strategies according to the channel quality information available at the relay. The proposed scheme is shown to improve the diversity and thereby to reduce the outage probability and coded bit error rate. Therefore, the proposed scheme will be promising for service quality improvement or coverage extension based on OFDM like wireless LANs and maritime communications.

Farthest-k relay selection algorithm for efficient D2D message dissemination (효율적인 D2D 메시지 확산을 위한 최외곽 k개의 릴레이 선택 알고리즘)

  • Han, Seho;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.543-548
    • /
    • 2017
  • In the conventional algorithm, the D2D message dissemination algorithm based on the Epidemic routing protocol frequently causes a problem of duplication of the received messages due to the overlaps of D2D transmission coverages. It is because all D2D devices that receive the messages perform relaying the message replicas to other D2D devices within their transmission range. Therefore, we herein propose the farthest-k relay selection algorithm to mitigate this message duplication problem. In the farthest-k relay selection algorithm, less than k devices within the D2D transmission range perform message relay. Furthermore, we perform comparative performance analysis between the conventional D2D data dissemination algorithm and our farthest-k relay selection algorithm. By using intensive MATLAB simulations we prove the performance excellency of our farthest-k relay algorithm compared with the conventional algorithm with respect to coverage probability, the total number of initially and duplicately received messages, and transmission efficiency.

Power Allocation and Performance Analysis for the Secondary User under Primary Outage Constraint in Cognitive Relay Network (Cognitive Relay 네트워크에서 일차 사용자의 Outage 제약 조건 하에서의 이차 사용자의 파워 할당 기법 및 성능 분석)

  • Kim, Hyung-Jong;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.46-51
    • /
    • 2012
  • In this paper, we investigate the power allocation for cognitive relay networks. Cognitive relay networks offer not only increasing spectral efficiency by spectrum sharing but also extending the coverage through the use of relays. For spectrum sharing, conventional works have assumed that secondary users know perfect channel information between the secondary and primary users. However, this channel information may be outdated at the secondary user because of the time-varying properties or feedback latency from the primary user. This causes the violation for interference constraint, and the secondary user cannot share the spectrum of the primary after all. To overcome this problem, we propose the power allocation scheme for the secondary user under the allowable primary user's outage probability constraint. Since the proposed power allocation scheme does not use the instantaneous channel information, the secondary users have lower feedback burden. In addition, the proposed scheme is also robust to the outdated channel environment.

Signal Interference of Neighboring Wi-Fi Networks on Data Throughput (Wi-Fi 네트워크간의 신호간섭 및 데이터 전송률 영향 분석)

  • Zhang, Jie;Lee, Goo Yeon;Kim, Hwa Jong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.17-23
    • /
    • 2012
  • Products of Wi-Fi devices in recent years offer higher throughput and have longer signal coverage which also bring unnecessary signal interference to neighboring wireless networks, and result in decrease of network throughput. Signal interference is an inevitable problem because of the broadcast nature of wireless transmissions. However it could be optimized by reducing signal coverage of wireless devices. On the other hand, smaller signal coverage also means lower transmission power and lower data throughput. Therefore, in this paper, we analyze the relationship among signal strength, coverage, interference and network throughput by simulation on various network topology.