• Title/Summary/Keyword: High-throughput analysis

Search Result 553, Processing Time 0.028 seconds

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

A new merging-zone flow injection system for the quantification of ferrous and ferric ions in aqueous solution and sludge of wastewater

  • Farhood, Ahmed Saleh;Taha, Dakhil Nassir
    • Analytical Science and Technology
    • /
    • v.35 no.5
    • /
    • pp.218-227
    • /
    • 2022
  • A simple and fast throughput flow injection (FI) system with a merging-zone technique was designed to determine ferrous and ferric in an aqueous solution. The method is based on the direct reaction of ferrous with a Bathophenanthroline reagent (Bphen) in acidic media. The forming red complex absorbs light at 533 nm. All conditions of the flow injection system were investigated. The analytical curve of ferrous was linear in the range of 0.07 to 4 mg/L with an r2 value of 0.9968. The detection and quantification limits were 0.02 and 0.04 mg/L, respectively. The molar absorptivity and Sandell's sensitivity were 4.0577 × 106 L/mol cm and 25 × 10-5 ㎍/cm2, respectively. The homemade valve was low-cost with high repeatability (n = 7) at an RSD of 1.26 % and zero dead volume. The values of the dispersion coefficient were 2.318, 2.022, and 1.636 for the concentrations of 0.2, 1, and 3 mg/L, respectively. The analysis throughput of the designed flow injection unit was 57 sample per hour.

Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU (CUDA GPGPU 상에서 경량 블록 암호 PIPO의 최적 구현)

  • Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1035-1043
    • /
    • 2022
  • With the spread of the Internet of Things (IoT), cloud computing, and big data, the need for high-speed encryption for applications is emerging. GPU optimization can be used to validate cryptographic analysis results or reduced versions theoretically obtained by the GPU in a reasonable time. In this paper, PIPO lightweight encryption implemented in various environments was implemented on GPU. Optimally implemented considering the brute force attack on PIPO. In particular, the optimization implementation applying the bit slicing technique and the GPU elements were used as much as possible. As a result, the implementation of the proposed method showed a throughput of about 19.5 billion per second in the RTX 3060 environment, achieving a throughput of about 122 times higher than that of the previous study.

A Secure, Hierarchical and Clustered Multipath Routing Protocol for Homogenous Wireless Sensor Networks: Based on the Numerical Taxonomy Technique

  • Hossein Jadidoleslamy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.121-136
    • /
    • 2023
  • Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. Some problems of WSNs are: severe resources' constraints, low reliability and fault tolerant, low throughput, low scalability, low Quality of Service (QoS) and insecure operational environments. One significant solution against mentioned problems is hierarchical and clustering-based multipath routing. But, existent algorithms have many weaknesses such as: high overhead, security vulnerabilities, address-centric, low-scalability, permanent usage of optimal paths and severe resources' consumption. As a result, this paper is proposed an energy-aware, congestion-aware, location-based, data-centric, scalable, hierarchical and clustering-based multipath routing algorithm based on Numerical Taxonomy technique for homogenous WSNs. Finally, performance of the proposed algorithm has been compared with performance of LEACH routing algorithm; results of simulations and statistical-mathematical analysis are showing the proposed algorithm has been improved in terms of parameters like balanced resources' consumption such as energy and bandwidth, throughput, reliability and fault tolerant, accuracy, QoS such as average rate of packet delivery and WSNs' lifetime.

A Steady State Analysis of TCP Rate Control Mechanism on Packet loss Environment (전송 에러를 고려한 TCP 트래픽 폭주제어 해석)

  • Kim, Dong-Whee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.33-40
    • /
    • 2017
  • In this Paper, Analyse the Steady State Behavior of TCP and TFRC with Packet Error when both TCP and TFRC Flows Co-exist in the Network. First, Model the Network with TCP and TFRC Connections as a Discrete Time System. Second, Calculate Average Round Trip Time of the Packet Between Source and Destination on Packet Loss Environment. Then Derive the Steady State Performance i.e. Throughput of TCP and TFRC, and Average Buffer Size of RED Router Based on the Analytic Network Model. The Throughput of TCP and TFRC Connection Decrease Rapidly with the Growth of Sending Window Size and Their Transmission Rate but Their Declines become Smoothly when the Number of Sending Window Arrives on Threshold Value. The Average Queue Length of RED Router Increases Slowly on Low Transmission Rate but Increases Rapidly on High Transmission Rate.

An Analysis on Data Throughput of PicoCast Affected by Piconet Mutual Interference (피코넷 상호 간섭이 PicoCast 데이터 전송량에 미치는 영향 분석)

  • Chung, Jae-Kyong;Jeon, Sang-Yeop;Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.40-49
    • /
    • 2015
  • PicoCast is a recently proposed short-range wireless communications technology that supports both low rate sensor/control data and high speed data such as voice and video traffic in the personal space, defined by the user-centric space of radius tens of meters, with one unified protocol. When the users are in the same area, personal spaces defined by each user may overlap. Since these PicoCast piconets may simultaneously operate, mutual interference is unavoidable. It is necessary to investigate the effect of mutual interference on data transmission and to conduct research on minimizing the interference among PicoCast devices. In this paper we analyze the effect of mutual interference between PicoCast piconets based on data throughput using OPNET network simulator. We have implemented the PicoCast protocol and measured the average throughput and packet loss rate.

Implementation of Adaptive MCS in The IEEE 802.11ac/ad Wireless LAN (IEEE 802.11ac/ad 무선 LAN의 적응형 MCS 구현 연구)

  • Lee, Ha-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1613-1621
    • /
    • 2015
  • This paper analyzes the rate adaptation scheme and suggests applicable strategy of the MCS(Modulation and Coding Scheme) for improving DCF throughput in the IEEE 802.11ad and 802.11ad wireless LAN. IEEE 802.11ac and 802.11ad wireless LAN provide MCS technique that dynamically adjusts modulation level and code rate to the time-varying channel conditions in order to obtain considerably high data rates. But these standards did not provide rate adaptation algorithm, so this paper surveyes rate adaptation algorithm and suggests MCS scheme applied to IEEE 802.11ac and 802.11ad wireless LAN. Specially A MAC(Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables.

An Analytic Model for the Optimal Number of Relay Stations in IEEE 802.16j Cooperative Networks (IEEE 802.16j 협력 전송 네트워크에서 최적의 중계국 수를 위한 분석 모델)

  • Jin, Zilong;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.758-766
    • /
    • 2011
  • Cooperative communications are adopted as a promising solution to achieve high data rate over large areas in the future 40 wireless system and the relay station (RS) is the key concept in cooperative communications. However, most existing works in this area focus only on optimal RS selections. In addition, there are only few works consider another crucial issue: how many relay stations we need to place. Only when the number of relay stations is defined, the relay station selection can be performed well. In this paper we derive a formula which describes the impact of varying number of RS on end-to-end link throughput assuming a clustering scheme which is based on Voronoi tessellation. In addition to mathematical analysis on the feasibility of the formula, we also examine its performance through a set of simulations under the Erceg path loss model. Simulation results verify that the link throughput gain of our proposed scheme is promising.

PSPM System for Low Power Communication and Performance Analysis in Multipath Channel (저전력 통신을 위한 PSPM(Phase Shift Position Modulation) 방식과 다중 경로 채널에서 성능 분석)

  • Choi, Jae-Hoon;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.12
    • /
    • pp.1394-1400
    • /
    • 2010
  • In this paper, we analyze performance of PSPM(Phase Shift Position Modulation) modulation scheme in multi-path channel. A PSPM modulation method transmits the information data by both PSK symbol data and symbol position data, so that we can significantly improve the power efficiency. The bandwidth efficiency of PSPM is quarter than PSK but improve BER performance, because increasing symbol hamming distance. In this results, a PSPM scheme is bandwidth efficiency better than FSK and power efficiency better than PSK. This characteristic can be useful in WBAN and wireless sensor networks also PSPM modulation method can be expected high throughput than existing FSK. In this paper, we compare PSPM, PSSK and PSK regard to BER performance and throughput in multi-path channel.

Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node

  • Pappas, Nikolaos;Jeon, Jeong-Ho;Ephremides, Anthony;Traganitis, Apostolos
    • Journal of Communications and Networks
    • /
    • v.14 no.2
    • /
    • pp.162-168
    • /
    • 2012
  • This paper considers the scenario in which a set of nodes share a common channel. Some nodes have a rechargeable battery and the others are plugged to a reliable power supply and, thus, have no energy limitations. We consider two source-destination pairs and apply the concept of cognitive radio communication in sharing the common channel. Specifically, we give high-priority to the energy-constrained source-destination pair, i.e., primary pair, and low-priority to the pair which is free from such constraint, i.e., secondary pair. In contrast to the traditional notion of cognitive radio, in which the secondary transmitter is required to relinquish the channel as soon as the primary is detected, the secondary transmitter not only utilizes the idle slots of primary pair but also transmits along with the primary transmitter with probability p. This is possible because we consider the general multi-packet reception model. Given the requirement on the primary pair's throughput, the probability p is chosen to maximize the secondary pair's throughput. To this end, we obtain two-dimensional maximum stable throughput region which describes the theoretical limit on rates that we can push into the network while maintaining the queues in the network to be stable. The result is obtained for both cases in which the capacity of the battery at the primary node is infinite and also finite.