• Title/Summary/Keyword: Relay Model

Search Result 233, Processing Time 0.02 seconds

A Study of Coverage Extension and Minimum Deployment Cost in NBTC and WBTC Structures based WiBro System Using Multi-hop Relay (NBTC와 WBTC 구조를 갖는 WiBro 시스템에서 멀티홉 중계기를 이용한 커버리지 확장과 최소 설치비용 연구)

  • Kim, Se-Jin;Kim, Seung-Yeon;Lee, Byung-Bog;Ryu, Seung-Wan;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.911-918
    • /
    • 2008
  • In this paper, we propose new cell structures using multi-hop Relay Station(RS) based on IEEE802.16j in Narrow-Beam Trisector Cell (NBTC) and Wide-Beam Trisector Cell (WBTC), which are two methods for cell sectorization using 3-sector directional antennas. Then, we analyze our proposed structures compared with the existing system which does not use any RS about the numbers of optimized Base Station (BS) and multi-hop relay, the extended BS coverage, and the deployment cost according to the traffic density using optimization model. According to the results, we know the reduction of total deployment cost of the proposed systems and that WBTC is suitable when the traffic density is high and NBTC is suitable when the traffic density is low in our proposed multi-hop based NBTC and WBTC structures.

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.

Energy Efficiency Maximization for Energy Harvesting Bidirectional Cooperative Sensor Networks with AF Mode

  • Xu, Siyang;Song, Xin;Xia, Lin;Xie, Zhigang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2686-2708
    • /
    • 2020
  • This paper investigates the energy efficiency of energy harvesting (EH) bidirectional cooperative sensor networks, in which the considered system model enables the uplink information transmission from the sensor (SN) to access point (AP) and the energy supply for the amplify-and-forward (AF) relay and SN using power-splitting (PS) or time-switching (TS) protocol. Considering the minimum EH activation constraint and quality of service (QoS) requirement, energy efficiency is maximized by jointly optimizing the resource division ratio and transmission power. To cope with the non-convexity of the optimizations, we propose the low complexity iterative algorithm based on fractional programming and alternative search method (FAS). The key idea of the proposed algorithm first transforms the objective function into the parameterized polynomial subtractive form. Then we decompose the optimization into two convex sub-problems, which can be solved by conventional convex programming. Simulation results validate that the proposed schemes have better output performance and the iterative algorithm has a fast convergence rate.

Security Analysis on NFC-based M-coupon Protocols and its Countermeasure (NFC에 기반한 모바일 쿠폰 프로토콜에 대한 안전성 분석 및 대응 방안)

  • Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1388-1397
    • /
    • 2015
  • Recently, an application business model was proposed to implement an M-coupon system using the NFC-based mobile devices. In this paper, the security requirements were surveyed for a secure M-coupon system and to analyze the threats on the existing NFC-based M-coupon protocols. After considering the implementation efficiency and security, this paper presents a novel M-coupon protocol based on the Diffie-Hellman key agreement scheme. This protocol can be an alternative to solve the security problems related to the PKI (Public Key Infrastructure) and secret key distribution. Furthermore, this M-coupon protocol is designed to provide user authentication and counteract the relay attack.

A QoS-aware Adaptive Coloring Scheduling Algorithm for Co-located WBANs

  • Wang, Jingxian;Sun, Yongmei;Luo, Shuyun;Ji, Yuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5800-5818
    • /
    • 2018
  • Interference may occur when several co-located wireless body area networks (WBANs) share the same channel simultaneously, which is compressed by resource scheduling generally. In this paper, a QoS-aware Adaptive Coloring (QAC) scheduling algorithm is proposed, which contains two components: interference sets determination and time slots assignment. The highlight of QAC is to determine the interference graph based on the relay scheme and adapted to the network QoS by multi-coloring approach. However, the frequent resource assignment brings in extra energy consumption and packet loss. Thus we come up with a launch condition for the QAC scheduling algorithm, that is if the interference duration is longer than a threshold predetermined, time slots rescheduling is activated. Furthermore, based on the relative distance and moving speed between WBANs, a prediction model for interference duration is proposed. The simulation results show that compared with the state-of-the-art approaches, the QAC scheduling algorithm has better performance in terms of network capacity, average delay and resource utility.

Performance Analysis of DS-CDMA Signal through MZ Modulator in optical SCM Signal Transmission (광 SCM 전송방식에서 MZ 변조기를 통과한 DS-CDMA 신호의 성능분석)

  • 김회준;임명섭
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.77-80
    • /
    • 2001
  • In this paper, it is analyzed the statistical characteristics on the transmission performance of the optical SCM transmission in the CDMA RF signal relay system. Using Mach-Zehnder modulator, optical signal is regenerated into CDMA RF signal. Transfer function model of mach-Zehnder modulator is approximated to the third power of the input signal using Taylor series. BER results are analyzed under the multiple access interference and multi-path fading environment.

  • PDF

Design of Energy Harvesting Optimization Model for TSR Protocol based on Interference Channel in Wireless Relay Networks (무선 중계 네트워크에서 간섭 채널 기반의 TSR 프로토콜을 위한 에너지 하베스팅 최적화 모델 설계)

  • Kim, hyun-tae;Ra, in-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.45-46
    • /
    • 2017
  • 본 논문에서는 간섭신호가 존재하는 무선 에너지 중계 네트워크 환경에서 중계 노드의 에너지 수확률을 결정하는 TSR 기반 에너지 하베스팅 기법의 성능을 향상시키기 위하여 간섭을 고려한 전송채널 분석 모델과 에너지 하베스팅 최적화 기법을 제안한다. 특히, 간섭 신호를 고려한 최적의 수신기 모드 스위칭 메커니즘 설계를 위한 최적의 에너지 수확률(energy harvesting ratio) 결정 기법을 제안하여 RF 에너지 하베시팅 시스템의 처리율을 최대화 할 수 있도록 하였다.

  • PDF

A Study on Power Cable Fault Using PSCAD/EMTDC (PSCAD/EMTDC를 이용한 전력케이블 고장현상에 판한 연구)

  • Kim, Jeom-Sik;Lee, Jong-Beom
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.868-870
    • /
    • 1996
  • This paper describes the faun phenomena by the simulation in power system including underground transmission power cable. Studying on fault phenomena is a very important part to decide the circuit breaker, protective relay and system configuration. Simulation was carried out in several different model system depended upon cable kinds using PSCAD/EMTDC, which is one of the transient program. The simulated results show the possibility to analyze transient phenomena for the cable system.

  • PDF

From the Absorption Profile to the Potential by a Time-dependent Inversion Method

  • 김화중;김영식
    • Bulletin of the Korean Chemical Society
    • /
    • v.18 no.12
    • /
    • pp.1281-1285
    • /
    • 1997
  • The time-dependent tracking inversion method is developed to extract the potential of the excited state from frequency-domain measurements, such as the absorption profile. Based on the relay of the regularized inversion procedure and time-dependent wave-packet propagation, the algorithm extract the underlying potential piece by piece by tracking the time-dependent data which can be synthesized from frequency-domain measurements. We have demonstrated the algorithm to extract the potential of excited state for a model diatomic molecule. Finally, we describe the merits of the time-dependent tracking inversion method compared to the time-dependent inversion and discuss several extensions of the algorithm.

High Impedance Fault Detection using Wavelet Transform (Wavelet 변환을 이용한 고저항 지락고장 검출)

  • Kim, Hyun;Kim, Chul-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.12
    • /
    • pp.1492-1497
    • /
    • 1999
  • High impedance fault(HIF) is defined as fault the general overcurrent relay can not detect or interrupt. Especially when HIF occur in residential areas, energized high voltage conductor results in fire hazard, equipment damage or personal threat. This paper proposes the model of the high impedance fault in transmission line using the ZnO arrester and resistance to be implemented within EMTP. The performance of the proposed model is tested on a typical 154[kV] korean transmission line system under various fault conditions. Wavelet transform is efficient and useful for the detection of high impedance fault in power system, because it uses variable windows according to frequency. In this paper, HIF detection method using wavelet transform can distinguish HIF form similar fault like arcfurance load, capacitor bank switching and line switching.

  • PDF