• Title/Summary/Keyword: Coverage Simulation

Search Result 466, Processing Time 0.028 seconds

Resource Allocation in Two Hop Relay Network based on PB/MC-CDMA System (PB/MC-CDMA 기반 two-hop 중계 망에서의 자원 할당 방식)

  • Sun, Yan;Lee, Kye-San
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.1
    • /
    • pp.94-99
    • /
    • 2010
  • In this paper, we discuss a proposed two hop relay network with PB/MC-CDMA(partial block MC-CDMA) technique. The main advantages of PB/MC-CDMA system are the increased cell capacity and the high quality of performances. In the system, we employ relay scheme to focus on the coverage reduction and hotspot problem, hotspot is a location where a cluster of users are blocked or dropped for the reason of insufficient frequency resources. Frequency resource allocation scheme is put forward in a three cells system according to each problem. The simulation result shows the performance of the two hop transmission is better than the direct transmission and the proposed network can support much more users to relief hotspot effect compared to the conventional one.

Design of Window Applicable Blind-type Frequency Selective Surface

  • Lee, In-Gon;Hong, Ic-Pyo
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.682-685
    • /
    • 2014
  • In this paper, we presented the window applicable blind-type frequency selective surface to control the coverage area of wireless communication in secure building or conference room. The proposed frequency selective structure has the reconfigurable frequency range depends on its blind rotation angle. To verify the proposed structure, we fabricated the window blind-type frequency selective surface with four-legged loaded element and ring-type element as a unit cell and performed measurements of the transmission characteristics for different blind rotation angles to prove the feasibility. The measurement results show good agreements with the simulation results. One of the advantages is that the proposed structure does not need to have a bias circuit, so it is very easy to implement at low cost and also can be applied to any planar surface for wireless security applications.

A High-Frequency Signal Test Method for Embedded CMOS Op-amps

  • Kim Kang Chul;Han Seok Bung
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.28-32
    • /
    • 2005
  • In this paper, we propose a novel test method to effectively detect hard and soft faults in CMOS 2-stage op-amps. The proposed method uses a very high frequency sinusoidal signal that exceeds unit gain bandwidth to maximize the fault effects. Since the proposed test method doesn't require any complex algorithms to generate the test pattern and uses only a single test pattern to detect all target faults, therefore test costs can be much reduced. The area overhead is also very small because the CUT is converted to a unit gain amplifier. Using HSPICE simulation, the results indicated a high degree of fault coverage for hard and soft faults in CMOS 2-stage op-amps. To verify this proposed method, we fabricated a CMOS op-amp that contained various short and open faults through the Hyundai 0.65-um 2-poly 2-metal CMOS process. Experimental results for the fabricated chip have shown that the proposed test method can effectively detect hard and soft faults in CMOS op-amps.

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.

Theoretical Interpretation of Interference Arising Between Closely Spaced Dual Polarized Geostationary Satellites

  • Choi, Won Jun;Lee, Dong-Won;Eun, Jong Won;Lee, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.131-135
    • /
    • 2021
  • The interference between closely placed co-coverage satellites was analyzed. In general, a satellite network may use different orthogonal polarizations and frequencies to increase the throughput of a satellite. However, when orthogonal linear polarization (horizontal polarization and vertical polarization) or orthogonal circular polarization (left-handed circular polarization and right-handed circular polarization) is used, the signal from one polarization sense to another may be coupled, resulting in cross-polarization interference. This signal-coupling arises due to the finite value of the cross-polarization discrimination of the earth station. In this study, field equations were used to analyze the interference between adjacent satellites using co-frequency. The level of interference was compared to that when two adjacent satellites used the same polarization. The simulation results show that the interference mainly depends on the off-axis co-polar pattern and the cross-polar pattern of the earth station antenna.

Impact of Parameters of Nonlinear Breach Progression Curve on Outflow Rate (저수지 붕괴함수의 매개변수 결정이 유량과 침수범위에 미치는 영향)

  • Lee, Khil-Ha
    • Journal of Environmental Science International
    • /
    • v.28 no.2
    • /
    • pp.211-217
    • /
    • 2019
  • A Numerical modeling approach is usually applied to reproduce the physical phenomena of a fill dam-break. The accuracy of the dam-break model depends on the physical structure that defines input variables such as the storage volume, breach formation and progress, and the parameters of the model, which are subjective as they are prescribed by users. In this study, a sensitivity analysis was performed for the nonlinear breach progression curve that was already developed, which includes four parameters. The study focuses on the two of the parameters which control the breach forming time and peak discharge. The model is coupled with a two-dimensional flood simulation model (FLO-2D) to examine flood coverage and depth. It is generally observed that the parameter ${\beta}$ controls only the breach forming time, the parameter ${\gamma}$ is particularly sensitive to the peak flow.

Discrete bacterial foraging optimization for resource allocation in macrocell-femtocell networks

  • Lalin, Heng;Mustika, I Wayan;Setiawan, Noor Akhmad
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.726-735
    • /
    • 2018
  • Femtocells are good examples of the ultimate networking technology, offering enhanced indoor coverage and higher data rate. However, the dense deployment of femto base stations (FBSs) and the exploitation of subcarrier reuse between macrocell base stations and FBSs result in significant co-tier and cross-tier interference, thus degrading system performance. Therefore, appropriate resource allocations are required to mitigate the interference. This paper proposes a discrete bacterial foraging optimization (DBFO) algorithm to find the optimal resource allocation in two-tier networks. The simulation results showed that DBFO outperforms the random-resource allocation and discrete particle swarm optimization (DPSO) considering the small number of steps taken by particles and bacteria.

Gateway Channel Hopping to Improve Transmission Efficiency in Long-range IoT Networks

  • Kim, Dae-Young;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1599-1610
    • /
    • 2019
  • Intelligent services have expanded as Internet of Things (IoT) technology has evolved and new requirements emerge to accommodate various services. One new requirement is transmitting data over long distances with low-power. Researchers have developed low power wide area (LPWA) network technology to satisfy the requirement; this can improve IoT network infrastructure and increase the range of services. However, network coverage expansion causes several problems. The traffic load is concentrated at a specific gateway, which causes network congestion and leads to decreased transmission efficiency. Therefore, the approach proposed in this paper attempts to recognize and then avoid congestion through gateway channel hopping. The LPWA network employs multiple channels, so wireless channel hopping is available in a gateway. Devices that are not delay sensitive wait for the gateway to reappear on their wireless channel; delay sensitive devices change the wireless channel along the hopping gateway. Thus, the traffic load and congestion in each wireless channel can be reduced improving transmission efficiency. The proposed approach's performance is evaluated by computer simulation and verified in terms of transmission efficiency.

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

Auto-Configuration Downlink Transmission Power Approach For Femtocell Base Station

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.223-228
    • /
    • 2022
  • Femtocells are being incorporated into heterogeneous networks in order to increase the network capacity. However, intensive deployment of femtocells results in undesired interference, which lowers the system's performance. Controlling the femtocell transmission power is one of of the aspects that can be addressed in order to mitigate the negative effects of the interference. It may also be utilized to facilitate the auto-configuration of the network's conductance, if necessary. This paper proposes the use of an auto-configuration technique for transmission power. The suggested technique is based on the transmission power of macrocells and the coverage provided by femtocells. The simulation findings show that the network's capacity has increased, and the amount of interference has decreased.