• Title/Summary/Keyword: Information transmission way

Search Result 420, Processing Time 0.024 seconds

Backscatter Communication for Wireless-Powered Communication Networks (무선전력 통신네트워크를 위한 Backscatter 통신)

  • Choi, Shin Hyuk;Kim, Dong In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1900-1911
    • /
    • 2015
  • In this paper, we introduce backscatter communication for power-limited sensors to enable long-range transmission in wireless sensor networks, and envision a way to avoid doubly near-far problem in wireless-powered communication network (WPCN) with this technology. In backscatter based WPCN, users harvest energy from both the signal broadcasted by the hybrid access point and the carrier signal transmitted by the carrier emitter in the downlink, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation in the uplink. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in backscatter based WPCN. Further, we propose backscatter based harvest-then-transmit protocol to maximize the sum-throughput of the backscatter based WPCN by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN increases significantly the transmission range and diminishes greatly the SNR outage zone.

A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays

  • Li, Guosheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.365-382
    • /
    • 2021
  • This paper proposes a novel two-way relaying (TWR) approach for a two-relay wireless network based on non-orthogonal multiple access (NOMA), where two terminals exchange messages with a cellular base station (BS) via two intermediate relay stations (RSs). We propose a NOMA-based TWR approach with two relaying schemes, i.e., amplify-and-forward (AF) and decode-and-forward (DF), referred to as NOMA-AF and NOMA-DF. The sum-rate performance of our proposed NOMA-AF and NOMA-DF is analyzed. A closed-form sum-rate upper bound for the NOMA-AF is obtained, and the exact ergodic sum-rate of NOMA-DF is also derived. The asymptotic sum-rate of NOMA-AF and NOMA-DF is also analyzed. Simulation results show that the proposed scheme outperforms conventional orthogonal multiple access based transmission schemes. It is also shown that increasing the transmit power budget of the relays only cannot always improve the sum-rates.

A Mobile Agent System for Meaningful Information Filtering of XML Documents

  • Kong, Yong-Hae;Park, In-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.246-249
    • /
    • 2002
  • A mobile agent system that searches for meaningful information from web XML documents is developed. For this, a domain information was conceptualized and a universal DTD generator is developed. A mobile agent with the universal DTD is dispatched to remote sites, extracts meaning information, and transmits the information back to a host. This way of information filtering is able to enhance the quality of information and reduce the network transmission overhead.

  • PDF

A Novel Transmission Scheme for Compressed Health Data Using ISO/IEEE11073-20601

  • Kim, Sang-Kon;Kim, Tae-Kon;Lee, Hyungkeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5855-5877
    • /
    • 2017
  • In view of personal health and disease management based on cost effective healthcare services, there is a growing need for real-time monitoring services. The electrocardiogram (ECG) signal is one of the most important of health information and real-time monitoring of the ECG can provide an efficient way to cope with emergency situations, as well as assist in everyday health care. In this system, it is essential to continuously collect and transmit large amount of ECG data within a given time and provide maximum user convenience at the same time. When considering limited wireless capacity and unstable channel conditions, appropriate signal processing and transmission techniques such as compression are required. However, ISO/IEEE 11073 standards for interoperability between personal health devices cannot properly support compressed data transmission. Therefore, in the present study, the problems for handling compressed data are specified and new extended agent and manager are proposed to address the problems while maintaining compatibility with existing devices. Extended devices have two PM-stores enabling compression and a novel transmission scheme. A variety of compression techniques can be applied; in this paper, discrete cosine transformation (DCT) is used. And the priority of information after DCT compression enables new transmission techniques for performance improvement. The performance of the compressed signal and the original uncompressed signal transmitted over the noisy channel are compared in terms of percent root mean square difference (PRD) using our simulation results. Our transmission scheme shows a better performance and complies with 11073 standards.

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

The present status and future perspective of the latest communication transmission technology (최신의 통신전송기술의 현황과 전망-( I ))

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.24 no.1
    • /
    • pp.95-103
    • /
    • 1991
  • The communication transmission engineering plays the most important role in electrical communications engineering. Recently, it has been making remarkable progress as an infrastructure supporting informationaged society. Specially, the start of television conference and service of high speed digital transmission can be said it is announcing a raising curtain of high speed broad band age. Together with high speed broad band service needs a capacity as much as several or several hundred times of telephone with one circuit, various kinds of service forms are anticipated to emerge, it is anticipated to give a big impact to the way of future communications newtork. At present, telecommunication network is transforming telephone voice information by analog technology into a flexible higher system disposable of a variety of information such as pictures or data other than telephone by the introduction of digital technology. Consequently, the development of hereafter for the following respective technologies is desired.

  • PDF

The present status and future perspective of the latest communication transmission technology (최신의 통신전송기술의 현황과 전망-(II))

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.24 no.2
    • /
    • pp.127-136
    • /
    • 1991
  • The communication transmission engineering plays the most important role in electrical communications engineering. Recently, it has been making remarkable progress as an infrastructure supporting informationaged society. Specially, the start of television conference and service of high speed digital transmission can be said it is announcing a raising curtain of high speed broad band age. Together with high speed broad band service needs a capacity as much as several or several hundred times of telephone with one circuit, various kinds of service forms are anticipated to emerge, it is anticipated to give a big impact to the way of future communications network. At present, telecommunication network is transforming telephone voice information by analog technology into a flexible higher system disposable of a variety of information such as pictures or data other than telephone by the introduction of digital technology. Consequently, the development of the hereafter for the following respective technologies is desired.

  • PDF

A Transformation of Image Density making a Method of Plate in Printing a Gravure (제판방식에 의해 구분된 Gravure 인쇄의 농도 변화)

  • Jun, Joon-Bae;Shin Joong-Soon;Kang, Young-Reep
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.20 no.2
    • /
    • pp.69-83
    • /
    • 2002
  • This research attempts on plate making for gravure. Direct Hard Dot Method, Helio Kliso Graph, and Laser TB Dot; these three method are the most popular in Korea. For examining ink transmission, three plates were made in the above three different way for the same manuscript and were printed under the same condition. After printing speed was also varied into 150line/inch, 175line/inch, and 200line/inch, ink transmission was examined too. After printing the same manuscript with the above three method then the researcher examined level of ink transmission. Printing lines shows that Laser TB Dot Method and Direct Hard Dot Method were favorable level, while there was big differences of state of Helio Kliso Graph plate.

  • PDF

Using Double Photon Transmission of Quantum Cryptography (이중광자 전송을 통한 양자비밀통신)

  • Seol, Jung-Ja;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1857-1864
    • /
    • 2013
  • In this paper, we improve the quantum cryptography system using a dual photon transmission plaintext user password algorithmwas designed to implementthe exchange. Existing quantum cryptographic key transport protocols, algorithms, mainly as a quantum cryptography system using the paper, but it improved the way the dual photon transmission through the quantum algorithm re not getting transmitted plaintext.

A Study on the Secure Prescription Transmission System based on the XML (XML기반의 안전한 처방전 전송 시스템에 관한 연구)

  • Lee Sang-Beom;Lee Seong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1777-1782
    • /
    • 2004
  • I propose a prescription transmission system based on XML in this paper, and it is not to attach a former signature to only a XML document for encoding of XML/EDI, and it is construction, one with the prescription transmission system which is safer with what use a way to attach a digital signature to DTD. I defined sub element to manage information prescription DTD defined prescription information, patient information, medical care organ information, prescription details information, compounding of medicines details information element according to for each a component of a prescription I went along, and to have looked up, and to have obeyed information transmission at he low rank. I read a DTD file for safe prescription transmission, and I do element or property, the entity which I do it, and is extracted here, and Pasing is saved in a table while being a field. If Pasing is finished, I read and lift a hash table and carry out message a digest. I compose it with an early private key and create a digital signature.