• Title/Summary/Keyword: Approach Channel

Search Result 970, Processing Time 0.022 seconds

A Low Complicate Reverse Rake Beamforming Algorithm Based On Simplex Downhill Optimization Method For DS/CDMA Communication (Simplex Downhill 최적화 기법을 기반으로 하는 간략화 된 DS/CDMA 역방향 링크 Rake Beamforming Method)

  • Lee Sang-Keun;Lee Yoon-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.249-253
    • /
    • 2006
  • We propose a new beamforming algorithm, which is based on simplex downhill optimization method in the presence of pilot channels in cdma2000 reverse-link, for the rake structure antenna array in DS/CDMA communication system. Our approach uses the desired signal(pilot) covariance matrix and the interference covariance matrix. The beamforming weights are made according to maximum SINR criteria using simplex downhill optimization procedure. Our proposed scheme provides lower computational load, better convergence speed, better performance than existingadaptive beamforming algorithm. The simplex downhill method is well suited to finding the optimal or sub-optimal weight vector, since they require only the value of the deterministic function to be optimized. The rake beamformer performances are also evaluated under several set of practical parameter values with regard to spatial channel model. We also compare the performance between conventional rake receiver and the proposed one under same receiving power.

Substream-based out-of-sequence packet scheduling for streaming stored media (저장매체 스트리밍에서 substream에 기초한 비순차 패킷 스케줄링)

  • Choi Su Jeong;Ahn Hee June;Kang Sang Hyuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1469-1483
    • /
    • 2004
  • We propose a packet scheduling algorithms for streaming media. We assume that the receiver periodically reports back the channel throughput. From the original video data, the importance level of a video packet is determined by its relative position within its group of pictures, taking into account the motion-texture discrimination and temporal scalability. Thus, we generate a number of nested substreams. Using feedback information from the receiver and statistical characteristics of the video, we model the streaming system as a queueing system, compute the run-time decoding failure probability of a Same in each substream based on effective bandwidth approach, and determine the optimum substream to be sent at that moment in time. Since the optimum substream is updated periodically, the resulting sending order is different from the original playback order. From experiments with real video data, we show that our proposed scheduling scheme outperforms the conventional sequential sending scheme.

Tight Bounds and Invertible Average Error Probability Expressions over Composite Fading Channels

  • Wang, Qian;Lin, Hai;Kam, Pooi-Yuen
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.182-189
    • /
    • 2016
  • The focus in this paper is on obtaining tight, simple algebraic-form bounds and invertible expressions for the average symbol error probability (ASEP) of M-ary phase shift keying (MPSK) in a class of composite fading channels. We employ the mixture gamma (MG) distribution to approximate the signal-to-noise ratio (SNR) distributions of fading models, which include Nakagami-m, Generalized-K ($K_G$), and Nakagami-lognormal fading as specific examples. Our approach involves using the tight upper and lower bounds that we recently derived on the Gaussian Q-function, which can easily be averaged over the general MG distribution. First, algebraic-form upper bounds are derived on the ASEP of MPSK for M > 2, based on the union upper bound on the symbol error probability (SEP) of MPSK in additive white Gaussian noise (AWGN) given by a single Gaussian Q-function. By comparison with the exact ASEP results obtained by numerical integration, we show that these upper bounds are extremely tight for all SNR values of practical interest. These bounds can be employed as accurate approximations that are invertible for high SNR. For the special case of binary phase shift keying (BPSK) (M = 2), where the exact SEP in the AWGN channel is given as one Gaussian Q-function, upper and lower bounds on the exact ASEP are obtained. The bounds can be made arbitrarily tight by adjusting the parameters in our Gaussian bounds. The average of the upper and lower bounds gives a very accurate approximation of the exact ASEP. Moreover, the arbitrarily accurate approximations for all three of the fading models we consider become invertible for reasonably high SNR.

Modified Block Diagonalization Precoding with Greedy Approach (Greedy 기법을 이용한 수정된 블록 대각화 프리코딩 기법)

  • Kim, Sung-Tae;Seo, Woo-Hyun;Kwak, Kyung-Chul;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.79-85
    • /
    • 2008
  • Dirty Paper Coding(DPC) can achieve the sum capacity of a multiuser multiple-input multiple-output(MU MIMO) broadcast channels. However, due to the high computational complexity of the successive encoding and decoding, deploying DPC in real systems is impractical. As one of practical alternatives to DPC, Block Diagonalization(BD) was researched. BD is an extension of the zero-forcing preceding technique that eliminates interuser interference(IUI) in downlink MIMO systems. Though BD has lower complexity than DPC, BD shows poor sum capacity performance. We show that sum capacity performance of BD is degraded due to no IUI constraint. Then, we modify BD to improve its sum capacity performance with relaxing the constraint and sub optimal channel set searching. With simulation results, it can be verified that our modification in BD induces some improvement in sum capacity performance.

Charisma: Trimble's Modernized Differential GPS Reference Station and Integrity Monitor Software

  • Remondi, Benjamin W.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.221-226
    • /
    • 2006
  • Around 2002, the United States Coast Guard (USCG) identified a need to re-capitalize their Reference Station (RS) and Integrity Monitor (IM) equipment used in the Nationwide Differential Global Position System (NDGPS). Commercially available off-the-shelf differential RS and IM equipment lacked the open architecture required to support long-term goals that include future system improvements such as use of new civil frequencies on L2 and L5 and realization of a higher rate NDGPS beacon data channel intended to support RTK. The first step in preparing for this future NDGPS was to port current RTCM SC-104 compatible RS and IM functionality onto an open architecture PC-based platform. Trimble's product Charisma is a PC-based RS and IM software designed to meet these USCG goals. In fact USCG engineers provided key designs and design insights throughout the development. We cannot overstate the contribution of the USCG engineers. Fundamental requirements for this effort were that it be sufficiently flexible in hardware and software design to support fluid growth and exploitation of new signals and technologies as they become available, yet remain backward compatible with legacy user receivers and existing site hardware and system architecture. These fundamental goals placed an implicit adaptability requirement on the design of the replacement RS and IM. Additionally, project engineers were to remain focused on sustaining the high level of differential GPS service that 1.5 million legacy users have come to depend on. This paper will present new hardware and software (i.e., Trimble's Charisma software) architecture for the next generation NDGPS RS and IM. This innovative approach to engineering on an open architecture PC-based platform allows the system to continue to fulfill legacy NDGPS system requirements and allows the USCG and others to pursue a scalable hardware re-capitalization strategy. We will use the USCG's recapitalization project to explain the essential role of the Charisma software.

  • PDF

Uruguay ? Brazil Inland Waterway Transportation System Defining the Right Vessel

  • Petrocelli, Gaston L.;Hayashi, Yuji;Murai, Koji;Kubo, Masayoshi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.211-216
    • /
    • 2006
  • Within the frame of the MERCOSUR (South Common Market), one of the most important goals to achieve by its member states is a better cost effective international cargo transportation system. For this purpose the project of developing a commercial waterway linking the east region of Uruguay with the south of Brazil has been under study for a number of years now. Because of the high costs involved on the development of such waterway, the project has been indefinitely delayed. It is our intention to show an alternative way to reduce the present obstacles by using a budget oriented approach in order to determine the vessel best suited to use on the proposed waterway. So far, every study related to the project has been focused on the amount of work needed to modify the environment in order to accommodate the hardware already available in the region. The conclusions show that the cost of opening and maintaining the required navigation channel is high enough to discourage investment; the added responsibility to take care of any environmental damage incurred during the building and/or operation of the waterway makes searching for a less costly and hazardous option an interesting challenge. The proposed terminal on the Cebollat? River would be located at the heart of the Uruguayan rice growing region. Uruguay exports 90% of its rice production, being Brazil its biggest buyer. Wood chips and clinker are the other types of cargo considered to use the proposed waterway in route to either Brazil or to overseas destinations through the deep water port of Rio Grande. Through the analysis of local data by a Geographical Information System, international regulations regarding inland waterways and shallow draught vessel characteristics, we seek to propose a cost efficient alternative to apply on this particular scenario.

  • PDF

A Communication Protocol Based on Safety Zone for Solving Hidden Node Problem in Cognitive Radio Networks (Cognitive Radio 네트워크에서 Hidden Node 문제 해결을 위한 Safety Zone 기반의 통신 프로토콜)

  • Jeong, Pil-Jung;Shin, Yo-An;Lee, Won-Cheol;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.8-15
    • /
    • 2008
  • Cognitive radio technology enables to share the spectrum dedicated to primary users. In CR network, it is of primary concern to protect the primary users. Thus, it is required to periodically sense the spectrums occupied by primary users and adapt the communication parameters used by CR users to protect the primary users. However, it is inevitable to experience the hidden node problem due to the primary users, that are not detected by spectrum sensing. To perfectly protect the primary users, it is essential to address the hidden node problem in CR network. In this paper, we propose a new approach to handle the hidden node problem and evaluate the performance of proposed scheme.

Feature-Strengthened Gesture Recognition Model Based on Dynamic Time Warping for Multi-Users (다중 사용자를 위한 Dynamic Time Warping 기반의 특징 강조형 제스처 인식 모델)

  • Lee, Suk Kyoon;Um, Hyun Min;Kwon, Hyuck Tae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.10
    • /
    • pp.503-510
    • /
    • 2016
  • FsGr model, which has been proposed recently, is an approach of accelerometer-based gesture recognition by applying DTW algorithm in two steps, which improved recognition success rate. In FsGr model, sets of similar gestures will be produced through training phase, in order to define the notion of a set of similar gestures. At the 1st attempt of gesture recognition, if the result turns out to belong to a set of similar gestures, it makes the 2nd recognition attempt to feature-strengthened parts extracted from the set of similar gestures. However, since a same gesture show drastically different characteristics according to physical traits such as body size, age, and sex, FsGr model may not be good enough to apply to multi-user environments. In this paper, we propose FsGrM model that extends FsGr model for multi-user environment and present a program which controls channel and volume of smart TV using FsGrM model.

A Study on the Minimum Error Entropy - related Criteria for Blind Equalization (블라인드 등화를 위한 최소 에러 엔트로피 성능기준들에 관한 연구)

  • Kim, Namyong;Kwon, Kihyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.3
    • /
    • pp.87-95
    • /
    • 2009
  • As information theoretic learning techniques, error entropy minimization criterion (MEE) and maximum cross correntropy criterion (MCC) have been studied in depth for supervised learning. MEE criterion leads to maximization of information potential and MCC criterion leads to maximization of cross correlation between output and input random processes. The weighted combination scheme of these two criteria, namely, minimization of Error Entropy with Fiducial points (MEEF) has been introduced and developed by many researchers. As an approach to unsupervised, blind channel equalization, we investigate the possibility of applying constant modulus error (CME) to MEE criterion and some problems of the method. Also we study on the application of CME to MEEF for blind equalization and find out that MEE-CME loses the information of the constant modulus. This leads MEE-CME and MEEF-CME not to converge or to converge slower than other algorithms dependent on the constant modulus.

  • PDF

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.