• Title/Summary/Keyword: Constraints to the Transmission

Search Result 292, Processing Time 0.023 seconds

A Dynamic Transmission Rate Allocation Algorithm for Multiplexing Delay-sensitive VBR-coded Streams (VBR로 부호화된 지연 민감 서비스의 다중화를 위한 동적인 전송률 할당 알고리즘)

  • 김진수;유국열;이문노
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.628-637
    • /
    • 2003
  • This paper describes a novel multiplexing scheme for delay-sensitive multiple VBR-coded bit streams in live multimedia service offered to high-speed networks. The primary goal of multiplexing in this paper is to keep delay limits of each bit streams and to enhance network resource utilization when they no multiplexed and transmitted over network. For this aim, this paper presents a dynamical control scheme which does not cause violation of any delay constraints to each bit steam. The scheme is based on the assumption that recent behavior of the each bit scream has high correlation with near-term future behavior. Such property is used to make as flat as possible by both temporal averaging on a stream-by-stream and spatial averaging is introduced when multiple VBR-coded bit streams are multiplexed. The effectiveness of the scheme is evaluated by several simulation using an MPEG-coded video trace of Star_wars and it is shown that the proposed scheme can effectively reduce the feat rate md coefficient of variation of the multiplexed transmission rate.

Maximum Delay-Aware Admission Control for Machine-to-Machine Communications in LTE-Advanced Systems (LTE-Advanced 시스템에서 M2M 통신의 최대 지연시간을 고려한 호 수락 방법)

  • Jun, Kyungkoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1113-1118
    • /
    • 2012
  • Smart grid and intelligent transportation system draw significant interest since they are considered as one of the green technologies. These systems require a large number of sensors, actuators, and controllers. Also, machine-to-machine (M2M) communications is important because of the automatic control. The LTE-Advanced networks is preparing a set of functions that facilitate the M2M communications, and particularly the development of an efficient call admission control mechanism is critical. A method that groups MTC devices according to QoS constraints and determines the admission depending on the QoS satisfaction is limitedly applied only if the data transmission period and the maximum delay are identical. This paper proposed a call admission control that is free from such limitation and also optimizes the admission process under the certain condition of the transmission period and maximum delay. The theorems regarding the proposed method are presented with the proofs. The simulations confirms its validity and shows it is better in call admission probability than existing works.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

Generalized Combined Power and Rate Adaptations in DS/CDMA Communications over Fading Channels (페이딩 채널에서 직접 대역확산 부호분할 다중접속 통신을 위한 일반화된 혼합 전력/전송률 적응화 기법)

  • Lee, Ye Hoon;Kim, Dong Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.680-687
    • /
    • 2013
  • We investigate a generalized combined power and rate adaptation scheme in direct-sequence (DS) code-division multiple-access (CDMA) communications over Nakagami fading channels. The transmission power allocated to user i is proportional to $G^p_i$, where $G_i$ is the channel gain of user i and p is a real number, and the data rate (i.e., spreading gain) is jointly adapted so that a desired QoS is maintained. We analyze the average data rate of the proposed adaptation scheme subject to fixed average and peak transmission power constraints. Our results show that the proposed joint adaptation scheme provides a significant performance improvement over power-only and rate-only adaptation.

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

The Method of Reducing the Delay Latency to Improve the Efficiency of Power Consumption in Wireless Sensor Networks

  • Ho, Jang;Son, Jeong-Bong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.199-204
    • /
    • 2008
  • Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.

  • PDF

Optimization of Long-term Generator Maintenance Scheduling considering Network Congestion and Equivalent Operating Hours (송전제약과 등가운전시간을 고려한 장기 예방정비계획 최적화에 관한 연구)

  • Shin, Hansol;Kim, Hyoungtae;Lee, Sungwoo;Kim, Wook
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.2
    • /
    • pp.305-314
    • /
    • 2017
  • Most of the existing researches on systemwide optimization of generator maintenance scheduling do not consider the equivalent operating hours(EOHs) mainly due to the difficulties of calculating the EOHs of the CCGTs in the large scale system. In order to estimate the EOHs not only the operating hours but also the number of start-up/shutdown during the planning period should be estimated, which requires the mathematical model to incorporate the economic dispatch model and unit commitment model. The model is inherently modelled as a large scale mixed-integer nonlinear programming problem and the computation time increases exponentially and intractable as the system size grows. To make the problem tractable, this paper proposes an EOH calculation based on demand grouping by K-means clustering algorithm. Network congestion is also considered in order to improve the accuracy of EOH calculation. This proposed method is applied to the actual Korean electricity market and compared to other existing methods.

Robotics for Advanced Therapeutic Colonoscopy

  • Wong, Jennie YY;Ho, Khek Yu
    • Clinical Endoscopy
    • /
    • v.51 no.6
    • /
    • pp.552-557
    • /
    • 2018
  • Although colonoscopy was originally a diagnostic imaging procedure, it has now expanded to include an increasing range of therapeutic interventions. These procedures require precise maneuvers of instruments, execution of force, efficient transmission of force from the operator to the point of application, and sufficient dexterity in the mobilization of endoscopic surgical instruments. The conventional endoscope is not designed to support technically demanding endoscopic procedures. In case of colonoscopy, the tortuous anatomy of the colon makes inserting, moving, and orientating the endoscope difficult. Exerting excessive pressure can cause looping of the endoscope, pain to the patient, and even perforation of the colon. To mitigate the technical constraints, numerous technically enhanced systems have been developed to enable better control of instruments and precise delivery of force in the execution of surgical tasks such as apposing, grasping, traction, counter-traction, and cutting of tissues. Among the recent developments are highly dexterous robotic master and slave systems, computer-assisted or robotically enhanced conventional endoscopes, and autonomously driven locomotion devices that can effortlessly traverse the colon. Developments in endoscopic instrumentations have overcome technical barriers and opened new horizons for further advancements in therapeutic interventions. This review describes examples of some of these systems in the context of their applications to advanced therapeutic colonoscopy.

A Multicast Regrouping Method for Efficient Utilization of Bandwidth (효율적 대역폭 이용을 위한 멀티캐스트 재그룹 기법)

  • Noh, Ju-Yi;Ku, Myung-Mo;Kim, Sang-Bok
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1078-1085
    • /
    • 2004
  • The SARLM(Source Adaptive Receiver-Driven Multi-Layered Multicast) has been proposed to address heterogeneous bandwidth constraints through layer merging and splitting. However, this method causes that receivers subscribing to the higher layer drop down to the lower layer and hence may decrease utilization of available bandwidth after layer merging. In this paper, we proposed a multicast regrouping method considering distributive status of receivers according to loss rates. The proposed method weights receivers according to loss rates. And then it groups higher layer with receivers subscribing to lower layer have extra bandwidth and lower layer with receivers subscribing to higher layer have high loss rate. Experimental results show that receivers subscribing to higher layer can receive in high transmission rate and consequently the proposed method effectively improves utilization of available bandwidth.

  • PDF

Block-Level Resource Allocation with Limited Feedback in Multicell Cellular Networks

  • Yu, Jian;Yin, Changchuan
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.420-428
    • /
    • 2016
  • In this paper, we investigate the scheduling and power allocation for coordinated multi-point transmission in downlink long term evolution advanced (LTE-A) systems, where orthogonal frequency division multiple-access is used. The proposed scheme jointly optimizes user selection, power allocation, and modulation and coding scheme (MCS) selection to maximize the weighted sum throughput with fairness consideration. Considering practical constraints in LTE-A systems, the MCSs for the resource blocks assigned to the same user need to be the same. Since the optimization problem is a combinatorial and non-convex one with high complexity, a low-complexity algorithm is proposed by separating the user selection and power allocation into two subproblems. To further simplify the optimization problem for power allocation, the instantaneous signal-to-interference-plus-noise ratio (SINR) and the average SINR are adopted to allocate power in a single cell and multiple coordinated cells, respectively. Simulation results show that the proposed scheme can improve the average system throughput and the cell-edge user throughput significantly compared with the existing schemes with limited feedback.