• Title/Summary/Keyword: Multiple Users

Search Result 1,605, Processing Time 0.023 seconds

Degrees of Freedom of Two-Cluster MIMO Multiway Relay Interference Channels Using Blind Interference Neutralization

  • Zhang, Bowei;Feng, Wenjiang;Dong, Tingting;Deng, Yina
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.168-186
    • /
    • 2016
  • In this paper, we investigate the degrees of freedom (DoF) of a two-cluster multiple-input multiple-output (MIMO) multiway relay interference channel (mRIC), where there are two relays and two users per cluster. In this channel, users within the same cluster exchange messages among themselves with the help of two relays.We first obtain the DoF upper bound of the considered MIMO mRIC based on cut-set bound. Then, we propose a novel transmission strategy, blind interference neutralization (BIN), to approach the DoF upper bound. This new method utilizes the overheard information at two relays and focuses on the beamforming matrix designs at two relays so that the channel state information (CSI) at users is not required. Through theoretical analysis and numerical simulations, we show that the DoF upper bound can be obtained by using the BIN scheme. From simulation results, we show that the proposed BIN scheme can provide significant performance gain over the conventional time division multiple access (TDMA) scheme in terms of DoF. In addition, we show that the BIN scheme is a superior approach to the existing signal space alignment (SSA) schemes for the considered mRIC.

Tangible Cooperation in Shared Virtual Environment

  • Irawati, Sylvia;Kim, Jong-Phil;Kim, Jin-Wook;Ko, Hee-Dong
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.214-220
    • /
    • 2009
  • Recent advanced technologies enable multiple users to share the virtual environment and work together as they are collocated. Additional sensory information such as haptic could improve the cooperation. In this paper, we propose a server-client architecture with multi-rate haptic control to support a tangible cooperation. Using our approach, the system is able to maintain a consistent simulation state across multiple users as well as to provide a highfidelity stable haptic interaction. To verify our approach, we have developed an experimental application and tested the cooperation among multiple users. The results confirm that our system is able to provide coherency among clients as well as haptic transparency.

  • PDF

Performance Enhancement of 2-dimensional optical CDMA systems by using error-correction codes (에러정정코드를 이용한 2차원 광CDMA 시스템에서의 성능향상)

  • Seo, Ik-Su;Lee, Tae-Hoon;Park, Jin-Bae;Yoon, Tae-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.3163-3165
    • /
    • 2000
  • In code division multiple access systems using all-optical signal processing, the optical multiple access interference by simultaneous multiple users degrades the system performance and eventually can limit the number of active users. To reduce the effect of the interference, error-correction codes are used in 2-dimensional FO-CDMA systems. In this paper we propose a method of applying product code to 2-dimensional FO-CDMA systems. The proposed coding scheme can correct a random error and burst errors with small redundancy to the conventional case. In result we show significant performance enhancement of the system in terms of HER, the number of active users.

  • PDF

User Selection Algorithms for MU-MIMO Systems with Coordinated Beamforming

  • Maciel-Barboza, Fermin Marcelo;Soriano-Equigua, Leonel;Sanchez-Garcia, Jaime;Castillo-Soria, Francisco Ruben;Topete, Victor Hugo Castillo
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.62-69
    • /
    • 2016
  • In this paper, we propose two novel user selection algorithms for multiuser multiple-input and multiple-output downlink wireless systems, in which both a base station (BS) and mobile stations (MSs) are equipped with multiple antennas. Linear transmit beamforming at the BS and receive combining at the MSs are used to avoid interference between users and find a better sum-rate capacity performance. An optimal technique for selecting users would entail an exhaustive search, which in practice becomes computationally complex for a realistic number of users. Suboptimal algorithms with low complexity are proposed for a coordinated beamforming scheme. Simulation results show that the performance of the proposed algorithms is better than that provided by previous algorithms and is very close to an optimal approach with reduced complexity.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Spectral and Energy Efficient Spatially Modulated Non-Orthogonal Multiple Access (NOMA) For 5G (5G를 위한 주파수 및 에너지 효율적인 공간 변조 비-직교 다중 접속 기법)

  • Irfan, Mohammad;Kim, Jin Woo;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1507-1514
    • /
    • 2015
  • Non-orthogonal multiple access (NOMA) is a promising candidate for 5G networks. NOMA achieves superior spectral efficiency than conventional orthogonal multiple access (OMA), as in NOMA multiple users uses the same time and frequency resources. Multiple-input-multiple-output (MIMO) is one another promising technique that can enhance system performance. In this paper we present a spectral and energy efficient multiple antenna based NOMA scheme, known as spatially modulated NOMA. In the proposed scheme the cell edge users are multiplexed in spatial domain, which means the information to cell edge users is conveyed using the transmit antenna indices. In NOMA the performance of cell edge users are deeply effected as it treats signals of others as noise. The proposed scheme achieves superior spectral efficiency than the conventional NOMA. The number of decoding steps involved in decoding NOMA signal reduces by one as cell edge user is multiplexed in spatial domain. The proposed scheme is more energy efficient as compare to conventional NOMA. All of the three gains high spectral, energy efficiency and one step reduction in decoding comes at cost of multiple transmit antennas at base station.

Malicious Users Detection and Nullifying their Effects on Cooperative Spectrum Sensing

  • Prasain, Prakash;Choi, Dong-You
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.167-178
    • /
    • 2016
  • Spectrum sensing in cognitive radio (CR) has a great role in order to utilize idle spectrum opportunistically, since it is responsible for making available dynamic spectrum access efficiently. In this research area, collaboration among multiple cognitive radio users has been proposed for the betterment of detection reliability. Even though cooperation among them improves the spectrum sensing performance, some falsely reporting malicious users may degrade the performance rigorously. In this article, we have studied the detection and nullifying the harmful effects of such malicious users by applying some well known outlier detection methods based on Grubb's test, Boxplot method and Dixon's test in cooperative spectrum sensing. Initially, the performance of each technique is compared and found that Boxplot method outperforms both Grubb's and Dixon's test for the case where multiple malicious users are present. Secondly, a new algorithm based on reputation and weight is developed to identify malicious users and cancel out their negative impact in final decision making. Simulation results demonstrate that the proposed scheme effectively identifies the malicious users and suppress their harmful effects at the fusion center to decide whether the spectrum is idle.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Space-Polarization Division Multiple Access System with Limited Feedback

  • Joung, Heejin;Jo, Han-Shin;Mun, Cheol;Yook, Jong-Gwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1292-1306
    • /
    • 2014
  • This paper proposes a space-polarization division multiple access (SPDMA) system that has limited feedback channels. The system simultaneously serves data streams to multiple mobile users through dual-polarized antenna arrays, by using pre-determined sets of precoding vectors that are orthogonal in both space and polarization domains. To this end, a codebook whose elements are sets of the precoding vectors is systematically designed based on the discrete Fourier transform (DFT) matrix and considering the power imbalance of polarized channels. Throughput of the SPDMA system is evaluated and compared to that of space division multiple access (SDMA) system, according to the various parameters including cross polarization discrimination (XPD). The results show that the throughput of SPDMA system outperforms that of SDMA in the environments of high XPD with many mobile users.

Beamforming Matrix Transformation and User Scheduling for MIMO Systems (다중 안테나 빔형성 메트릭스 변환 기법 및 사용자 선택 기법)

  • Park, Jong-Rok;Lee, Sang-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1A
    • /
    • pp.25-33
    • /
    • 2012
  • Random beamforming (RBF) uses the signal to interference plus noise ratio (SINR) feedback to select users in multiple-input multiple-output (MIMO) systems. A large number of users are required to obtain the gain of multi-user diversity for a downlink transmission. However, if the number is not large enough, it may be difficult to obtain multi-user diversity, leading to a rapid degradation in performance. To resolve this problem, we propose the beamforming matrix transformation and the user scheduling method. The beamforming matrix transformation scheme uses the SINRs of each users and have a better performance than conventional schemes over a small number of users. In addition, we propose the user scheduling scheme corresponding to the beamforming matrix transformation. In simulation results, we demonstrate that the sum-rate can be improved according to the number of users.