• Title/Summary/Keyword: Dimensional Error Rate

Search Result 213, Processing Time 0.022 seconds

Performance Analysis of a Novel Distributed C-ARQ Scheme for IEEE 802.11 Wireless Networks

  • Wang, Fan;Li, Suoping;Dou, Zufang;Hai, Shexiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3447-3469
    • /
    • 2019
  • It is well-known that the cooperative communication and error control technology can improve the network performance, but most existing cooperative MAC protocols have not focused on how to cope with the contention process caused by cooperation and how to reduce the bad influence of channel packet error rate on the system performance. Inspired by this, this paper first modifies and improves the basic rules of the IEEE 802.11 Medium Access Control (MAC) protocol to optimize the contention among the multi-relay in a cooperative ARQ scheme. Secondly, a hybrid ARQ protocol with soft combining is adopted to make full use of the effective information in the error data packet and hence improve the ability of the receiver to decode the data packet correctly. The closed expressions of network performance including throughput and average packet transmission delay in a saturated network are then analyzed and derived by establishing a dedicated two-dimensional Markov model and solving its steady-state distribution. Finally, the performance evaluation and superiority of the proposed protocol are validated in different representative study cases through MATLAB simulations.

Kernel Regression Estimation for Permutation Fixed Design Additive Models

  • Baek, Jangsun;Wehrly, Thomas E.
    • Journal of the Korean Statistical Society
    • /
    • v.25 no.4
    • /
    • pp.499-514
    • /
    • 1996
  • Consider an additive regression model of Y on X = (X$_1$,X$_2$,. . .,$X_p$), Y = $sum_{j=1}^pf_j(X_j) + $\varepsilon$$, where $f_j$s are smooth functions to be estimated and $\varepsilon$ is a random error. If $X_j$s are fixed design points, we call it the fixed design additive model. Since the response variable Y is observed at fixed p-dimensional design points, the behavior of the nonparametric regression estimator depends on the design. We propose a fixed design called permutation fixed design, and fit the regression function by the kernel method. The estimator in the permutation fixed design achieves the univariate optimal rate of convergence in mean squared error for any p $\geq$ 2.

  • PDF

SRAM소자의 SER 및 Latchup 신뢰성 연구

  • Lee Jun-Ha;Lee Heung-Ju;Jo Hyeon-Chan;Lee Gang-Hwan;Gwon O-Geun
    • Proceedings of the Korean Society Of Semiconductor Equipment Technology
    • /
    • 2005.05a
    • /
    • pp.63-66
    • /
    • 2005
  • A soft error rate neutrons is a growing problem for integrated circuits with technology scaling. In the acceleration test with high-density neutron beam, a latch-up prohibits accurate estimations of the soft error rate (SER). This paper presents results of analysis for the latch-up characteristics in the circumstance corresponding to the acceleration SER test for SRAM. Simulation results, using a two-dimensional device simulator, show that the deep p-well structure has better latch-up Immunity compared to normal twin and triple well structures. In addition, it is more effective to minimize the distance to ground power compared with controlling a path to the $V_{DD}$ power.

  • PDF

Analysis of Cell Latch-up Effect in SRAM Device (SRAM 소자의 Cell Latch-up 현상 분석)

  • Lee Jun-Ha;Lee Hoong-Joo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2004.11a
    • /
    • pp.203-205
    • /
    • 2004
  • A soft error rate neutrons is a growing problem for terrestrial integrated circuits with technology scaling. In the acceleration test with high-density neutron beam, a latch-up prohibits accurate estimations of the soft error rate (SER). This paper presents results of analysis for the latch-up characteristics in the circumstance corresponding to the acceleration SER test for SRAM. Simulation results, using a two-dimensional device simulator, show that the deep p-well structure has better latch-up immunity compared to normal twin and triple well structures. In addition, it is more effective to minimize the distance to ground power compared with controlling a path to the $V_{DD}$ power.

  • PDF

Performance of LDPC Product Code According to Error Factors on Holographic Data Storage System (홀로그래픽 데이터 저장장치 시스템에서 오류요인에 따른 LDPC 곱부호의 성능)

  • Jeong, Seongkwon;Lee, Jaejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.5
    • /
    • pp.3-7
    • /
    • 2017
  • Holographic data storage system (HDSS) features short access times, high storage capacities, and fast transfer rates, since the data is recorded and read not by lines but by pages within a volume of holographic material. Burst error caused by physical impact on the high density storage system becomes very longer than that of conventional storage systems. This paper proposes an LDPC product code using two LDPC code to resolve burst error. When a total code rate is similar, the performance of two LDPC code having high code rate is better than that of one LDPC code having low code rate. Also, with error factors of two-dimensional intersysbol interference and misalignment, the proposed scheme can improve the performance in holographic data storage system.

Personal Identification Using One Dimension Iris Signals (일차원 홍채 신호를 이용한 개인 식별)

  • Park, Yeong-Gyu;No, Seung-In;Yun, Hun-Ju;Kim, Jae-Hui
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.1
    • /
    • pp.70-76
    • /
    • 2002
  • In this paper, we proposed a personal identification algorithm using the iris region which has discriminant features. First, we acquired the eye image with the black and white CCD camera and extracted the iris region by using a circular edge detector which minimizes the search space for real center and radius of the iris. And then, we localized the iris region into several circles and extracted the features by filtering signals on the perimeters of circles with one dimensional Gabor filter We identified a person by comparing ,correlation values of input signals with the registered signals. We also decided threshold value minimizing average error rate for FRR(Type I)error rate and FAR(Type II)error rate. Experimental results show that proposed algorithm has average error rate less than 5.2%.

Generalized BER Performance Analysis for Uniform M-PSK with I/Q Phase Unbalance (I/Q 위상 불균형을 고려한 Uniform M-PSK의 일반화된 BER 성능 분석)

  • Lee Jae-Yoon;Yoon Dong-Weon;Hyun Kwang-Min;Park Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.237-244
    • /
    • 2006
  • I/Q phase unbalance caused by non-ideal circuit components is inevitable physical phenomenons and leads to performance degradation when we implement a practical coherent M-ary phase shift keying(M-PSK) demodulator. In this paper, we present an exact and general expression involving two-dimensional Gaussian Q-functions for the bit error rate(BER) of uniform M-PSK with I/Q phase unbalance over an additive white Gaussian noise(AWGN) channel. First we derive a BER expression for the k-th bit of 8, 16-PSK signal constellations when Gray code bit mapping is employed. Then, from the derived k-th bit BER expression, we present the exact and general average BER expression for M-PSK with I/Q phase unbalance. This result can readily be applied to numerical evaluation for various cases of practical interest in an I/Q unbalanced M-PSK system, because the one- and two-dimensional Gaussian Q-functions can be easily and directly computed using commonly available mathematical software tools.

Study On the Robustness Of Four Different Face Authentication Methods Under Illumination Changes (얼굴인증 방법들의 조명변화에 대한 견인성 연구)

  • 고대영;천영하;김진영;이주헌
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2036-2039
    • /
    • 2003
  • This paper focuses on the study of the robustness of face authentication methods under illumination changes. Four different face authentication methods are tried. These methods are as follows; Principal Component Analysis, Gaussian Mixture Models, 1-Dimensional Hidden Markov Models, 2-Dimensional Hidden Markov Models. Experiment results involving an artificial illumination change to face images are compared with each others. Face feature vector extraction method based on the 2-Dimensional Discrete Cosine Transform is used. Experiments to evaluate the above four different face authentication methods are carried out on the Olivetti Research Laboratory(ORL) face database. For the pseudo 2D HMM, the best EER (Equal Error Rate) performance is observed.

  • PDF

Two-Dimensional Symmetric Balance Incomplete Block Design Codes for Small Input Power (작은 입력신호를 위한 Two-Dimensional Symmetric Balance Incomplete Block Design Code)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.121-127
    • /
    • 2013
  • When input power is small, nonideal symmetric balance incomplete block design(BIBD) code design is effective in the spectral-amplitude-code(SAC) optical code-division multiple-access (OCDMA) system. But the number of simultaneous users is not sufficient. To overcome this property, we propose 2-D BIBD codes, where nonideal BIBD codes are used as spectral code and ideal BIBD codes are used as spatial codes. Analytical results show that the number of simultaneous users increases significantly.

An Efficient Algorithm for Performance Analysis of Multi-cell and Multi-user Wireless Communication Systems

  • Wang, Aihua;Lu, Jihua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2035-2051
    • /
    • 2011
  • Theoretical Bit Error Rate (BER) and channel capacity analysis are always of great interest to the designers of wireless communication systems. At the center of such analyses people are often encountered with a high-dimensional multiple integrals with quite complex integrands. Conventional Gaussian quadrature is inefficient in handling problems like this, as it tends to entail tremendous computational overhead, and the principal order of its error term increase rapidly with the dimension of the integral. In this paper, we propose a new approach to calculate complex multi-fold integrals based on the number theory. In contrast to Gaussian quadrature, the proposed approach requires less computational effort, and the principal order of its error term is independent of the dimension. The effectiveness of the number theory based approach is examined in BER and capacity analyses for practical systems. In particular, the results generated by numerical computation turn out in good match with that of Monte-Carlo simulations.