• Title/Summary/Keyword: Ministry of Information and Communication

Search Result 318, Processing Time 0.03 seconds

Resource Allocation in Multi-User MIMO-OFDM Systems with Double-objective Optimization

  • Chen, Yuqing;Li, Xiaoyan;Sun, Xixia;Su, Pan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2063-2081
    • /
    • 2018
  • A resource allocation algorithm is proposed in this paper to simultaneously minimize the total system power consumption and maximize the system throughput for the downlink of multi-user multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems. With the Lagrange dual decomposition method, we transform the original problem to its convex dual problem and prove that the duality gap between the two problems is zero, which means the optimal solution of the original problem can be obtained by solving its dual problem. Then, we use convex optimization method to solve the dual problem and utilize bisection method to obtain the optimal dual variable. The numerical results show that the proposed algorithm is superior to traditional single-objective optimization method in both the system throughput and the system energy consumption.

A Novel Cross-Layer Dynamic Integrated Priority-Computing Scheme for 3G+ Systems

  • Wang, Weidong;Wang, Zongwen;Zhao, Xinlei;Zhang, Yinghai;Zhou, Yao
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.15-20
    • /
    • 2012
  • As Internet protocol and wireless communications have developed, the number of different types of mobile services has increased gradually. Existing priority-computing schemes cannot satisfy the dynamic requirements of supporting multiple services in future wireless communication systems, because the currently used factors, mainly user priority, are relatively simple and lack relevancy. To solve this problem and provide the desired complexity, dynamic behavior, and fairness features of 3G and beyond 3G mobile communication systems, this paper proposes a novel cross-layer dynamic integrated priority-computing scheme that computes the priority based on a variety of factors, including quality of service requirements, subscriber call types, waiting time, movement mode, and traffic load from the corresponding layers. It is observed from simulation results that the proposed dynamic integrated priority scheme provides enhanced performance.

A Perspective of Mobile Communication in future (이동통신의 금후의 전망)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.27 no.1
    • /
    • pp.5-12
    • /
    • 1994
  • In the high degree information society of the 21st century, along with the social activity becoming much more closer, our life style will also be very much changed. Recognition for obtaining various informations rapidly will be anticipated to enhance and the progress of a mobile communication system is greatly expected. This will enable the system to give and receive ″whenever, wherever, whomever, whatsever information.″ In our country, the car telephone and personal mobile communication services of radio calling etc. are diversified by the telecommunication system reformation and by the introduction of competive principle of the hereafter of 1988. Moreover, in accordance with the tariff, the number of subscrier is rapidly increasing. On the other hand, on the utility side of business, for the realization of a mobile communication which is abundant in functional nature, not only the hitherto voice but also non voice system of data communication is being introduced. The Ministry of Communications of Korea has been expediting the effective utilization of limited frequency band of qusai microwave band etc. as a concrete measures for an ever increasing demand. At the same time, to disseminate and promote a mobile communication most effectively, convenience, economic, and safety nature of the system, and in addition to these, international standardization is considered. For constitution of a new mobile communication, the Ministry has been promoting various policies designed for the digitalization of system, utility extention for home. personal level.

  • PDF

Analysis of the Government New Technology Certification System (정부의 신기술 인증 정책의 비교 분석)

  • 송학현;최세하;김하식;김윤호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.35-38
    • /
    • 2003
  • The subject of the national new Technology certification system is in which domestic enterprise have competition above international market. Rep. of the korea Government, Ministry of Information and communication(MIC), Ministry of science and technology(MOST), Ministry of Commerce, Industry and energy(MOCIE), ministry of Construction and Transportation(MOCT), Ministry of Marin and fishery(MOAf) excutive the certification Regulations. These Ministry have the new Technology certification rules each of the scope of the their main job. These rules same the subject, proposal qualification and the property, but difference certification reference. So, this article suggestions about new Technology certification system.

  • PDF

Performance Analysis and Evaluation of Deployment in Small Cell Networks

  • Zheng, Kan;Li, Yue;Zhang, Yingkai;Jiang, Zheng;Long, Hang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.886-900
    • /
    • 2015
  • Small cells are deployed in Heterogeneous Networks (HetNet) to improve overall performance. These access points can provide high-rate mobile services at hotspots to users. In a Small Cell Network (SCN), the good deployment of small cells can guarantee the performance of users on the basis of average and cell edge spectrum efficiency. In this paper, the performance of small cell deployment is analyzed by using system-level simulations. The positions of small cells can be adjusted according to the deployment radius and angle. Moreover, different Inter-Cell Interference Coordination (ICIC) techniques are also studied, which can be implemented either in time domain or in frequency domain. The network performances are evaluated under different ICIC techniques when the locations of Small evolved Nodes (SeNBs) vary. Simulation results show that the average throughput and cell edge throughput can be greatly improved when small cells are properly deployed with the certain deployment radius and angle. Meanwhile, how to optimally configure the parameters to achieve the potential of the deployment is discussed when applying different ICIC techniques.

Distributed Power and Rate Control for Cognitive Radio Networks

  • Wang, Wei;Wang, Wenbo;Zhu, Yajun;Peng, Tao
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.166-174
    • /
    • 2009
  • In this paper, a distributed power and end-to-end rate control algorithm is proposed in the presence of licensed users. By Lagrangian duality theory, the optimal power and rate control solution is given for the unlicensed users while satisfying the interference temperature limits to licensed users. It is obtained that transmitting with either 0 or the maximum node power is the optimal scheme. The synchronous and asynchronous distributed algorithms are proposed to be implemented at the nodes and links. The convergence of the proposed algorithms are proved. Finally, further discussion on the utility-based fairness is provided for the proposed algorithms. Numerical results show that the proposed algorithm can limit the interference to licensed user under a predefined threshold.

Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network

  • Tang, Yanan;Gao, Hui;Su, Xin;Lv, Tiejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2831-2847
    • /
    • 2017
  • In this paper, a joint destination-relay selection and antenna mode selection scheme for full-duplex (FD) relay network is investigated, which consists of one source node, N FD amplify-and-forward (AF) relays and M destination nodes. Multiple antennas are configured at the source node, and beamforming technique is adopted. Two antennas are employed at each relay, one for receiving and the other for transmitting. Only one antenna is equipped at each destination node. In the proposed scheme, the best destination node is firstly selected according to the direct links between the source node and destination nodes. Then the transmit and receive mode of two antennas at each relay is adaptively selected based on the relaying link condition. Meanwhile, the best relay with the optimal Tx/Rx antenna configuration is selected to forward the signals. To characterize the performance of the proposed scheme, the closed-form expression of the outage probability is derived; meanwhile, the simple asymptotic expressions are also obtained. Our analysis shows that the proposed scheme obtains the benefits of multi-relay diversity and multi-destination diversity. Moreover, extra space diversity in the medium SNR region can be achieved due to the antenna selection at the relay. Finally, Monte-Carlo simulations are provided to consolidate the analytical results, and show the effectiveness of the proposed scheme.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

  • Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4305-4323
    • /
    • 2014
  • In this paper, we investigate the degrees of freedom (DOF) of the Y channel consisting of three single-antenna users and a two-antenna common access relay, where each user intends to exchange independent messages with the other two users with the assistance of the relay. We show that the DOF of this particular scenario is 1.5. In order to prove this result, we firstly derive a DOF upper bound based on cut-set bound by allowing cooperation among users, which shows that the total DOF is upper bounded by 1.5. Then we propose a novel transmission scheme based on asymmetric signal space alignment (ASSA) to demonstrate the achievability of the upper bound. Theoretical evaluation and numerical results confirm that the upper bound can be achieved by utilizing ASSA, which also proves the optimality of the ASSA-based scheme in terms of DOF. Combining the upper bound and achievability, we conclude that the exact DOF is 1.5. Moreover, we present a novel iterative joint beamforming optimization (I-JBO) algorithm to further improve the sum rate. Numerical simulations have been provided to demonstrate the convergence speed and performance advantage of the I-JBO algorithm.

Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access

  • Xu, Ding;Feng, Zhiyong;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1777-1791
    • /
    • 2012
  • This paper considers a downlink cognitive radio (CR) network where one secondary user (SU) and one primary user (PU) share the same base station (BS). The spectrum of interest is divided into a set of independent, orthogonal subchannels. The communication of the PU is of high priority and the quality of service (QoS) is guaranteed by the minimum rate constraint. On the other hand, the communication of the SU is of low priority and the SU opportunistically accesses the subchannels that were previously discarded by the PU during power allocation. The BS assigns fractions ?? and 1 ?? of the total available transmit power to the PU and the SU respectively. Two power allocation schemes with opportunistic subchannel access are proposed, in which the optimal values of ??'s are also obtained. The objective of one scheme is to maximize the rate of the SU, and the objective of the other scheme is to maximize the sum rate of the SU and the PU, both under the PU minimum rate constraint and the total transmit power constraint. Extensive simulation results are obtained to verify the effectiveness of the proposed schemes.