• Title/Summary/Keyword: Dual Connectivity

Search Result 24, Processing Time 0.025 seconds

A New Dual Connective Network Resource Allocation Scheme Using Two Bargaining Solution (이중 협상 해법을 이용한 새로운 다중 접속 네트워크에서 자원 할당 기법)

  • Chon, Woo Sun;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.8
    • /
    • pp.215-222
    • /
    • 2021
  • In order to alleviate the limited resource problem and interference problem in cellular networks, the dual connectivity technology has been introduced with the cooperation of small cell base stations. In this paper, we design a new efficient and fair resource allocation scheme for the dual connectivity technology. Based on two different bargaining solutions - Generalizing Tempered Aspiration bargaining solution and Gupta and Livne bargaining solution, we develop a two-stage radio resource allocation method. At the first stage, radio resource is divided into two groups, such as real-time and non-real-time data services, by using the Generalizing Tempered Aspiration bargaining solution. At the second stage, the minimum request processing speeds for users in both groups are guaranteed by using the Gupta and Livne bargaining solution. These two-step approach can allocate the 5G radio resource sequentially while maximizing the network system performance. Finally, the performance evaluation confirms that the proposed scheme can get a better performance than other existing protocols in terms of overall system throughput, fairness, and communication failure rate according to an increase in service requests.

Strengthened connections between engrams encode specific memories

  • Kim, Ji-il;Choi, Dong Il;Kaang, Bong-Kiun
    • BMB Reports
    • /
    • v.51 no.8
    • /
    • pp.369-370
    • /
    • 2018
  • In previous studies, memory storage was localized to engram cells distributed across the brain. While these studies have provided an individual cellular profile of engram cells, their synaptic connectivity, or whether they follow Hebbian mechanisms, remains uncertain. Therefore, our recent study investigated whether synapses between engram cells exhibit selectively enhanced structural and functional properties following memory formation. This was accomplished using a newly developed technique called "dual-eGRASP". We found that the number and size of spines on CA1 engram cells that receive inputs from CA3 engram cells were larger than at other synapses. We further observed that this enhanced connectivity correlated with induced memory strength. CA3 engram synapses exhibited increased release probability, while CA1 engram synapses produced enhanced postsynaptic responses. CA3 engram to CA1 engram projections showed strong occlusion of long-term potentiation. We demonstrated that the synaptic connectivity of CA3 to CA1 engram cells was strengthened following memory formation. Our results suggest that Hebbian plasticity occurs during memory formation among engram cells at the synapse level.

Decimation Chain Modeling for Dual-Band Radio Receiver and Its Operation for Continuous Packet Connectivity

  • Park, Chester Sungchung;Park, Sungkyung
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.235-240
    • /
    • 2015
  • A decimation chain for multi-standard reconfigurable radios is presented for 900-MHz and 1,900-MHz dual-band cellular standards with a data interpolator based on the Lagrange method for adjusting the variable data rate to a fixed data rate appropriate for each standard. The two proposed configurations are analyzed and compared to provide insight into aliasing and the signal bandwidth by means of a newly introduced measure called interpolation error. The average interpolation error is reduced as the ratio of the sampling frequency to the signal BW is increased. The decimation chain and the multi-rate analog-to-digital converter are simulated to compute the interpolation error and the output signal-to-noise ratio. Further, a method to operate the above-mentioned chain under a compressed mode of operation is proposed in order to guarantee continuous packet connectivity for inter-radio-access technologies. The presented decimation chain can be applied to LTE, WCDMA, GSM multi-mode multi-band digital front-end which will ultimately lead to the software-defined radio.

Modeling and SINR Analysis of Dual Connectivity in Downlink Heterogeneous Cellular Networks

  • Wang, Xianling;Xiao, Min;Zhang, Hongyi;Song, Sida
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5301-5323
    • /
    • 2017
  • Small cell deployment offers a low-cost solution for the boosted traffic demand in heterogeneous cellular networks (HCNs). Besides improved spatial spectrum efficiency and energy efficiency, future HCNs are also featured with the trend of network architecture convergence and feasibility for flexible mobile applications. To achieve these goals, dual connectivity (DC) is playing a more and more important role to support control/user-plane splitting, which enables maintaining fixed control channel connections for reliability. In this paper, we develop a tractable framework for the downlink SINR analysis of DC assisted HCN. Based on stochastic geometry model, the data-control joint coverage probabilities under multi-frequency and single-frequency tiering are derived, which involve quick integrals and admit simple closed-forms in special cases. Monte Carlo simulations confirm the accuracy of the expressions. It is observed that the increase in mobility robustness of DC is at the price of control channel SINR degradation. This degradation severely worsens the joint coverage performance under single-frequency tiering, proving multi-frequency tiering a more feasible networking scheme to utilize the advantage of DC effectively. Moreover, the joint coverage probability can be maximized by adjusting the density ratio of small cell and macro cell eNBs under multi-frequency tiering, though changing cell association bias has little impact on the level of the maximal coverage performance.

Architectures and Connection Probabilities forWireless Ad Hoc and Hybrid Communication Networks

  • Chen, Jeng-Hong;Lindsey, William C.
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.161-169
    • /
    • 2002
  • Ad hoc wireless networks involving large populations of scattered communication nodes will play a key role in the development of low power, high capacity, interactive, multimedia communication networks. Such networks must support arbitrary network connections and provide coverage anywhere and anytime. This paper partitions such arbitrarily connected network architectures into three distinct groups, identifies the associated dual network architectures and counts the number of network architectures assuming there exist N network nodes. Connectivity between network nodes is characterized as a random event. Defining the link availability P as the probability that two arbitrary network nodes in an ad hoc network are directly connected, the network connection probability $ \integral_n$(p) that any two network nodes will be directly or indirectly connected is derived. The network connection probability $ \integral_n$(p) is evaluated and graphically demonstrated as a function of p and N. It is shown that ad hoc wireless networks containing a large number of network nodes possesses the same network connectivity performance as does a fixed network, i.e., for p>0, $lim_{N\to\infty} Integral_n(p)$ = 1. Furthermore, by cooperating with fixed networks, the ad hoc network connection probability is used to derive the global network connection probability for hybrid networks. These probabilities serve to characterize network connectivity performance for users of wireless ad hoc and hybrid networks, e.g., IEEE 802.11, IEEE 802.15, IEEE 1394-95, ETSI BRAN HIPERLAN, Bluetooth, wireless ATM and the world wide web (WWW).

Study on the impact fracture behavior with the ferrite-martensite dual phase steels (페라이트-마르텐사이트 複合組織鋼의 衝擊破壞擧動)

  • 송삼홍;오택렬
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.12 no.1
    • /
    • pp.19-27
    • /
    • 1988
  • The mechanical properties of Ferrite-Martensite dual phase steels are affected by microstructural factors, such as, martensite volume fractions, grain size of ferrite, hardness ratio of Ferrite-Martensite, connectivity and chemical components etc. Therefore, this study has been made on the influence of Impact fracture behavior which changes the hardness ratio of Ferrite-Martensite by mean of heat treatment of low carbon Mn-Steels. In order to analyze and examine the effect of fracture behavior under impact load, this study investigated the impact strength, the impact loading time, the absorbed energy on the fracture ductility of Ferrite-Martensite dual phase steels, the formation of micro crack and slip, and plastic restraint of martensite on the plastic deformation.

The Theoretical and Experimental Value on the Stress-Strain Behavior of Dual Phase Steels (복합조직강의 응력-변형 거동에 관한 이론치와 실험치)

  • 오택열;김석환;유용석
    • Journal of the Korean institute of surface engineering
    • /
    • v.26 no.2
    • /
    • pp.63-70
    • /
    • 1993
  • The mechanical properties of ferrite-martensited dual phases steels are affected by the microstructural factors, such as martensited volume fractions, ferrite grain size, strength ratio, connectivity, etc. Two phase alloys are technologically important. However, there is a lack of understanding as to stress-strain behavior of dual phase alloy in terms of stress-strain behavior of each component phases. The lack of the understanding stems from the complex deformation behavior of two phase alloys. The aim of this study is to rationalize stress-strain behavior of dual phase alloy in terms of the stress-strain behavior of component phase by systematically considering all the factors listed above. It was found that for a given martensite volume fraction, the calculated stress-strain curve was higher for a finer particles size than for a coarse particle sized within the range of the strains considered, and this behavior was seen for all the different volume fraction alloys considered. The calculated stress-strain curves were compared with corresponding experimental curves, and in general, good agreement was found. The maximum difference in flow stress between the calculated and the experimental results occurs at the nearly beginning of the plastic deformation.

  • PDF

Estimating Telephone Network Structure and Investment Cost Changes (교환/전송 기술진화에 따른 전화교환망 구조변화-시뮬레이션 모형에 의한 사례 분석-)

  • 송석재;장석권;전용수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1997.10a
    • /
    • pp.138-141
    • /
    • 1997
  • In this study, a simulation model is developed to analyze the effects of routing and scale-economy of transmission facilities on the traffic network topology and investment cost changes in a metropolitan telephone network. Computational experiments showed that the wide deployment of bifurcated routing in a dual-homing configuration reduces significantly the traffic network connectivity and the investment cost. Its enhanced version, when combined with the subscriber network cost model, can be used as a prototype cost proxy model for figuring out the access charges in a multi-operator environment.

  • PDF

Dual Coalescent Energy-Efficient Algorithm for Wireless Mesh Networks

  • Que, Ma. Victoria;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.760-769
    • /
    • 2007
  • In this paper, we consider a group mobility model to formulate a clustering mechanism called Dual Coalescent Energy-Efficient Algorithm (DCEE) which is scalable, distributed and energy-efficient for wireless mesh network. The differences of the network nodes will be distinguished to exploit heterogeneity of the network. Furthermore, a topology control, that is, adjusting the transmission range to further reduce power consumption will be integrated with the cluster formation to improve network lifetime and connectivity. Along with network lifetime and power consumption, clusterhead changes will be measured as a performance metric to evaluate the. effectiveness and robustness of the algorithm.

  • PDF

An optimal security management framework for backhaul-aware 5G- Vehicle to Everything (V2X)

  • Vishal Sharma;Jiyoon Kim;Yongho Ko;Ilsun You;Jung Taek Seo
    • Journal of Internet Technology
    • /
    • v.21 no.1
    • /
    • pp.249-264
    • /
    • 2020
  • Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.